Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe
Analysis ID:1431843
MD5:99aa185a295411f72303fa9b7a497795
SHA1:04cbab9197165b1648ef6fcbf0d1b60d2e0f7a95
SHA256:4c00a2f66bb1d2470b17ef277f5f12a90ff2fc86a258cb82bf294835b87d4e02
Tags:exe
Infos:

Detection

Score:26
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Contains functionality to detect virtual machines (IN, VMware)
Detected VMProtect packer
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample is a service DLL but no service has been registered
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64
  • SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe (PID: 3484 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe" MD5: 99AA185A295411F72303FA9B7A497795)
    • SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp (PID: 6208 cmdline: "C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp" /SL5="$20446,6484768,412160,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe" MD5: A5E43FF07BF378503CF45D6EE7778021)
      • _setup64.tmp (PID: 1308 cmdline: helper 105 0x544 MD5: E4211D6D009757C078A9FAC7FF4F03D4)
        • conhost.exe (PID: 7104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • SoundBoosterTaskHost.exe (PID: 5596 cmdline: "C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe" -InstallAPO MD5: 674B5BE99C119416895FED6B4B54CD85)
        • conhost.exe (PID: 1700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • regsvr32.exe (PID: 4324 cmdline: "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll" MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
          • regsvr32.exe (PID: 6304 cmdline: /s "C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll" MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
      • SoundBoosterService.exe (PID: 5796 cmdline: "C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exe" -install MD5: E45BFFA942994D7921E37BCAA900740F)
        • conhost.exe (PID: 4208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • SoundBoosterTaskHost.exe (PID: 5920 cmdline: "C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe" -Activate MD5: 674B5BE99C119416895FED6B4B54CD85)
        • conhost.exe (PID: 916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 6496 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 1712 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p, CommandLine: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p, ProcessId: 6496, ProcessName: svchost.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C4211DA __EH_prolog3_GS,BCryptOpenAlgorithmProvider,SetLastError,15_2_6C4211DA
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C42138B __EH_prolog3_GS,BCryptGenRandom,SetLastError,15_2_6C42138B
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C44CE90 CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,15_2_6C44CE90
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C45A850 CertGetNameStringW,CertFindExtension,CryptDecodeObjectEx,15_2_6C45A850
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C45A541 GetLastError,CreateFileW,GetLastError,GetFileSizeEx,GetLastError,ReadFile,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,15_2_6C45A541
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C44D94F CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,15_2_6C44D94F
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C491B8B BCryptCloseAlgorithmProvider,15_2_6C491B8B
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C45D04E CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,15_2_6C45D04E
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C45D004 CryptAcquireContextW,CryptCreateHash,15_2_6C45D004
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C45D036 CryptHashData,15_2_6C45D036
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C42134F BCryptCloseAlgorithmProvider,15_2_6C42134F
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_61adbb9d-5
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Users\user\AppData\Local\Temp\Setup Log 2024-04-25 #001.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\ProgramData\Letasoft\Sound Booster\Logs\Setup Log 2024-04-25 #001.txt.logJump to behavior
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Wyatt\Documents\Visual Studio 2005\Projects\limelm-native-clients\bin\Release\TurboActivate.pdb source: is-470JU.tmp.1.dr
Source: Binary string: C:\pre\soft\compress\x64\CompressGainLimiter.pdb source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BE5B90 _wcslen,FindFirstFileW,FindNextFileW,FindClose,8_2_00BE5B90
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BE3C78 __EH_prolog3_GS,FindFirstFileW,_wcslen,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,8_2_00BE3C78
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C43EFB1 recv,WSAGetLastError,15_2_6C43EFB1
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmp, is-VDVIU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: http://.css
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmp, is-VDVIU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: http://.jpg
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-1AQ6S.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-1AQ6S.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2HighAssuranceCodeSigningCA.crt0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://ccsca2021.crl.certum.pl/ccsca2021.crl0s
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://ccsca2021.ocsp-certum.com05
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: http://crl.comodoca.com/COMODORSAExtendedValidationCodeSigningCA.crl0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-1AQ6S.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0O
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-1AQ6S.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl3.digicert.com/sha2-ha-cs-g1.crl00
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-1AQ6S.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: is-VDV7H.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-1AQ6S.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://crl4.digicert.com/sha2-ha-cs-g1.crl0L
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmp, is-VDVIU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: http://html4/loose.dtd
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: http://ocsp.comodoca.com0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: http://ocsp.comodoca.com02
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0A
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-1AQ6S.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0I
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-1AQ6S.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0O
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0P
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0R
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://repository.certum.pl/ccsca2021.cer0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://repository.certum.pl/ctnca.cer09
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://subca.ocsp-certum.com01
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://subca.ocsp-certum.com02
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://subca.ocsp-certum.com05
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: http://www.certum.pl/CPS0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: http://www.digicert.com/CPS0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.2065768674.0000000002226000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1637946717.0000000002400000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2062141734.0000000002247000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.1641431576.00000000031F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.dk-soft.org/
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1639199932.000000007FCE0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1638705530.0000000002400000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000000.1640080224.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-EMCVK.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.drString found in binary or memory: http://www.innosetup.com/
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: http://www.letasoft.com
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1639199932.000000007FCE0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1638705530.0000000002400000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000000.1640080224.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-EMCVK.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
Source: SoundBoosterTaskHost.exe, 0000000F.00000002.2048357672.0000000000978000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://wyday.com/limelm/api/rest/
Source: is-UT7AG.tmp.1.drString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: SoundBoosterTaskHost.exeString found in binary or memory: https://curl.se/docs/alt-svc.html#
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: https://sectigo.com/CPS0U
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: https://secure.comodo.com/CPS0L
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: https://www.certum.pl/CPS0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-1AQ6S.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.dr, is-VDV7H.tmp.1.drString found in binary or memory: https://www.digicert.com/CPS0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.2065768674.000000000228D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2062141734.00000000022ED000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.letasoft.com
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.2065768674.000000000228D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2062141734.00000000022ED000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.letasoft.com)
Source: is-A00SO.tmp.1.dr, is-Q7VFD.tmp.1.drString found in binary or memory: https://www.letasoft.com/help/#b1
Source: is-A00SO.tmp.1.dr, is-Q7VFD.tmp.1.drString found in binary or memory: https://www.letasoft.com/help/#b5
Source: is-0B8RS.tmp.1.drString found in binary or memory: https://www.letasoft.com/ru/help/#b1
Source: is-0B8RS.tmp.1.drString found in binary or memory: https://www.letasoft.com/ru/help/#b5
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drString found in binary or memory: https://www.letasoft.com0
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1637946717.0000000002400000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.1641431576.00000000031F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.letasoft.com0https://www.letasoft.com0https://www.letasoft.com
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.2065768674.000000000228D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2062141734.00000000022ED000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.letasoft.comq
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, SoundBoosterTaskHost.exe, SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmp, SoundBoosterTaskHost.exe, 0000000F.00000002.2048357672.0000000000978000.00000004.00000020.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: https://wyday.com/limelm/api/rest/
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmp, is-VDVIU.tmp.1.dr, is-UT7AG.tmp.1.drString found in binary or memory: https://wyday.com/limelm/api/rest/httpsSignature
Source: is-470JU.tmp.1.drString found in binary or memory: https://wyday.com/limelm/buy-redirect/%u/admin
Source: is-A00SO.tmp.1.dr, is-Q7VFD.tmp.1.dr, is-0B8RS.tmp.1.drString found in binary or memory: https://wyday.com/limelm/help/faq/#fix-broken-wmi
Source: is-470JU.tmp.1.drString found in binary or memory: https://wyday.com/limelm/help/faq/#fix-broken-wmivalTranslationtitlestartstitlepluralstitlesingleact

System Summary

barindex
Source: is-VDVIU.tmp.1.drStatic PE information: .vmp0 and .vmp1 section names
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C3F5929: SHGetFolderPathW,GetVolumePathNameW,GetVolumeNameForVolumeMountPointW,CreateFileW,DeviceIoControl,DeviceIoControl,CloseHandle,15_2_6C3F5929
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_0042359F OpenSCManagerW,GetLastError,GetLastError,GetLastError,OpenServiceW,GetLastError,GetLastError,ControlService,Sleep,Sleep,QueryServiceStatus,DeleteService,GetLastError,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,13_2_0042359F
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BEA8308_2_00BEA830
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BF21B08_2_00BF21B0
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00C011DC8_2_00C011DC
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BE99A08_2_00BE99A0
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BFC2AE8_2_00BFC2AE
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BE9DB08_2_00BE9DB0
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BF1D528_2_00BF1D52
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BFBE008_2_00BFBE00
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BE9FA08_2_00BE9FA0
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BF1F818_2_00BF1F81
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_0042984313_2_00429843
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_004368DC13_2_004368DC
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_0043194013_2_00431940
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_004293B713_2_004293B7
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_004295E613_2_004295E6
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_00431DEE13_2_00431DEE
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C3E601A15_2_6C3E601A
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C480C6915_2_6C480C69
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C42ACA415_2_6C42ACA4
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C430CBC15_2_6C430CBC
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C428F3015_2_6C428F30
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C426F8D15_2_6C426F8D
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C42A84915_2_6C42A849
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C41097915_2_6C410979
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C45E92015_2_6C45E920
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C428BDD15_2_6C428BDD
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C428BEA15_2_6C428BEA
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C42A40615_2_6C42A406
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C46E4D015_2_6C46E4D0
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C44248415_2_6C442484
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C46C56815_2_6C46C568
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C48462915_2_6C484629
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C43270615_2_6C432706
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C43214615_2_6C432146
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C42A1E215_2_6C42A1E2
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C45C1F615_2_6C45C1F6
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C48821815_2_6C488218
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C3F629615_2_6C3F6296
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C48833815_2_6C488338
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C44BC0415_2_6C44BC04
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C475CC115_2_6C475CC1
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C3F1F8C15_2_6C3F1F8C
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C45380115_2_6C453801
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C3E185915_2_6C3E1859
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C46183E15_2_6C46183E
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C42989915_2_6C429899
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C40F98115_2_6C40F981
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C3F747115_2_6C3F7471
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C46907F15_2_6C46907F
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C3F711B15_2_6C3F711B
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C43D13015_2_6C43D130
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C43B20615_2_6C43B206
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C45523715_2_6C455237
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: String function: 0042243D appears 35 times
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: String function: 00BE19BD appears 47 times
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: String function: 00BEDA80 appears 35 times
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: String function: 6C43350C appears 149 times
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: String function: 6C43EEAA appears 152 times
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: String function: 6C433AC0 appears 67 times
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: String function: 6C3E9279 appears 70 times
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: String function: 6C432EF2 appears 42 times
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: String function: 6C4334D8 appears 303 times
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: is-EMCVK.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-EMCVK.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: is-HCK3C.tmp.1.drStatic PE information: No import functions for PE file found
Source: is-3TFGO.tmp.1.drStatic PE information: No import functions for PE file found
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1639199932.000000007FE39000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1638705530.000000000255D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: is-UT7AG.tmp.1.drBinary string: ASSOCIATORS OF {Win32_LogicalDisk.DeviceID="WQLDeviceID"} WHERE AssocClass = Win32_LogicalDiskToPartition KEYSONLY"} WHERE AssocClass = Win32_DiskDriveToDiskPartition KEYSONLYASSOCIATORS OF {Win32_DiskPartition.DeviceID=""Select Model, SerialNumber from Win32_DiskDrive WHERE DeviceID="SerialNumberModelPnpInstanceIDSYSTEM\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}\%s\Connectionroot\wmi OR DeviceName="\\DEVICE\\SELECT InstanceName, DeviceName FROM MSNdis_EnumerateAdapter WHERE DeviceName="\\DEVICE\\InstanceNameDeviceName OR InstanceName="SELECT InstanceName, NdisPermanentAddress FROM MSNdis_EthernetPermanentAddress WHERE InstanceName="AddressNdisPermanentAddressWin32_NetworkAdapter.DeviceID="EnableDisableReturnValueTRUESELECT DeviceID, PermanentAddress FROM MSFT_NetAdapter WHERE (Virtual = OR PNPDeviceID LIKE "XEN%\\%" OR PNPDeviceID LIKE "VMBUS\\%") AND (InterfaceType = 6 OR InterfaceType = 71) AND NOT NdisPhysicalMedium = 10FALSEroot\StandardCimv2PermanentAddressGUIDSELECT GUID, DeviceID FROM Win32_NetworkAdapter WHERE PhysicalAdapter = TRUE AND (PNPDeviceID LIKE "PCI\\%" OR PNPDeviceID LIKE "USB\\%" OR PNPDeviceID LIKE "SD\\%" OR PNPDeviceID LIKE "XEN%\\%" OR PNPDeviceID LIKE "VMBUS\\%" OR PNPDeviceID LIKE "%BDRV\\%") AND NOT ServiceName LIKE "usbrndis%"Winmgmtroot\cimv2Select Name, SerialNumber, SMBIOSBIOSVersion, Manufacturer, Version from Win32_BIOSSelect Model from Win32_DiskDriveParallelsVMwareSMBIOSBIOSVersionNameManufacturerVirtualBoxVersionXenProductSelect Product, Manufacturer from Win32_BaseBoardProcessorIdSelect ProcessorId, Name, Manufacturer from Win32_ProcessorCapacitySelect Capacity from Win32_PhysicalMemorySbieDll.dll
Source: classification engineClassification label: sus26.evad.winEXE@21/57@0/0
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: GetModuleFileNameW,GetLastError,GetLastError,GetLastError,OpenSCManagerW,GetLastError,GetLastError,GetLastError,CreateServiceW,GetLastError,GetLastError,ChangeServiceConfig2W,GetLastError,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,13_2_004232C3
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C3F6F7F __EH_prolog3_GS,CoCreateInstance,SysFreeString,CoSetProxyBlanket,15_2_6C3F6F7F
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_00423A4B __EH_prolog3_GS,EnterCriticalSection,LeaveCriticalSection,CreateWellKnownSid,StartServiceCtrlDispatcherW,GetLastError,GetLastError,GetLastError,13_2_00423A4B
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_00423A4B __EH_prolog3_GS,EnterCriticalSection,LeaveCriticalSection,CreateWellKnownSid,StartServiceCtrlDispatcherW,GetLastError,GetLastError,GetLastError,13_2_00423A4B
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound BoosterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7104:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:916:120:WilError_03
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpMutant created: \Sessions\1\BaseNamedObjects\SetupMutex{6C6CF38B-11DD-45C6-A15E-A3A0C4CE60F8}
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1700:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4208:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeFile created: C:\Users\user\AppData\Local\Temp\is-VT15G.tmpJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCommand line argument: ^oC13_2_00436EB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile read: C:\Program Files (x86)\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: SoundBoosterTaskHost.exeString found in binary or memory: -InstallAPO
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-RARHB.tmp\_isetup\_setup64.tmpEvasive API call chain: GetCommandLine,DecisionNodes,ExitProcessgraph_5-67
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeProcess created: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp "C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp" /SL5="$20446,6484768,412160,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe"
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-RARHB.tmp\_isetup\_setup64.tmp helper 105 0x544
Source: C:\Users\user\AppData\Local\Temp\is-RARHB.tmp\_isetup\_setup64.tmpProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess created: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe "C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe" -InstallAPO
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll"
Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe /s "C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll"
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess created: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exe "C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exe" -install
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess created: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe "C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe" -Activate
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeProcess created: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp "C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp" /SL5="$20446,6484768,412160,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-RARHB.tmp\_isetup\_setup64.tmp helper 105 0x544Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess created: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe "C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe" -InstallAPOJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess created: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exe "C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exe" -installJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess created: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe "C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe" -ActivateJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll"Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe /s "C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: msftedit.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: windows.globalization.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: bcp47mrm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: globinputhost.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: windows.ui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: windowmanagementapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-RARHB.tmp\_isetup\_setup64.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: apocontrol.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: version.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: edputil.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: slc.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: sppc.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: audioeng.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: avrt.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: audiosrv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: audiosrvpolicymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: hrtfapo.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.media.devices.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: comppkgsup.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coreaudiopolicymanagerext.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: audioses.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: windows.applicationmodel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: turboactivate.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: secur32.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: Letasoft Sound Booster.lnk.1.drLNK file: ..\..\..\..\..\..\Program Files (x86)\Letasoft Sound Booster\SoundBooster.exe
Source: Diagnostics Report Creator.lnk.1.drLNK file: ..\..\..\..\..\..\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe
Source: Letasoft Sound Booster.lnk0.1.drLNK file: ..\..\..\Program Files (x86)\Letasoft Sound Booster\SoundBooster.exe
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpWindow found: window name: TSelectLanguageFormJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: OK
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: Install
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: I accept the agreement
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeStatic file information: File size 6973352 > 1048576
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\Wyatt\Documents\Visual Studio 2005\Projects\limelm-native-clients\bin\Release\TurboActivate.pdb source: is-470JU.tmp.1.dr
Source: Binary string: C:\pre\soft\compress\x64\CompressGainLimiter.pdb source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BE20D3 __EH_prolog3_GS,LoadLibraryW,GetProcAddress,FreeLibrary,8_2_00BE20D3
Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp1
Source: is-9OI0H.tmp.1.drStatic PE information: section name: RT_CODE
Source: is-9OI0H.tmp.1.drStatic PE information: section name: RT_CONST
Source: is-VDV7H.tmp.1.drStatic PE information: section name: .text1
Source: is-VDV7H.tmp.1.drStatic PE information: section name: .data1
Source: is-VDV7H.tmp.1.drStatic PE information: section name: .trace
Source: is-1AQ6S.tmp.1.drStatic PE information: section name: _RDATA
Source: is-4PLJA.tmp.1.drStatic PE information: section name: .giats
Source: is-4PLJA.tmp.1.drStatic PE information: section name: .vmp0
Source: is-4PLJA.tmp.1.drStatic PE information: section name: .vmp1
Source: is-VDVIU.tmp.1.drStatic PE information: section name: .vmp0
Source: is-VDVIU.tmp.1.drStatic PE information: section name: .vmp1
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll"
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BEDAC6 push ecx; ret 8_2_00BEDAD9
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BED5A7 push ecx; ret 8_2_00BED5BA
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_00424932 push ecx; ret 13_2_00424945
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_00424F66 push ecx; ret 13_2_00424F79
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C43390F push ecx; ret 15_2_6C433932
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C4334A1 push ecx; ret 15_2_6C4334B4
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\SBH.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-EMCVK.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\SoundBooster.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Users\user\AppData\Local\Temp\is-RARHB.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\UltraActivate.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-P02PU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-470JU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\Logger64.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-HJ5VT.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterHelper.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-UT7AG.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\SBH64.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\Filters\gain.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\TurboActivate.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-U6OVG.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\Logger32.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\Filters\limit.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeFile created: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-FO5GS.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-GVBLF.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\Lang\is-HCK3C.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\Lang\is-3TFGO.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\TurboActivate.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-M1S53.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\Filters\is-1AQ6S.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-4PLJA.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-VDVIU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\Filters\is-VDV7H.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\Lang\SoundBoosterRU.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\Lang\SoundBoosterBR.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-V5IV6.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-9OI0H.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\ApoControl.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Program Files (x86)\Letasoft Sound Booster\is-Q41UV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\Users\user\AppData\Local\Temp\Setup Log 2024-04-25 #001.txtJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\ProgramData\Letasoft\Sound Booster\Logs\Setup Log 2024-04-25 #001.txt.logJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Letasoft Sound BoosterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Letasoft Sound Booster\Letasoft Sound Booster.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Letasoft Sound Booster\Diagnostics Report Creator.lnkJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_00423A4B __EH_prolog3_GS,EnterCriticalSection,LeaveCriticalSection,CreateWellKnownSid,StartServiceCtrlDispatcherW,GetLastError,GetLastError,GetLastError,13_2_00423A4B
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C4080C1 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,15_2_6C4080C1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C3F555F in eax, dx15_2_6C3F555F
Source: SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: ?LASSOCIATORS OF {WIN32_LOGICALDISK.DEVICEID="WQLDEVICEID"} WHERE ASSOCCLASS = WIN32_LOGICALDISKTOPARTITION KEYSONLY"} WHERE ASSOCCLASS = WIN32_DISKDRIVETODISKPARTITION KEYSONLYASSOCIATORS OF {WIN32_DISKPARTITION.DEVICEID=""SELECT MODEL, SERIALNUMBER FROM WIN32_DISKDRIVE WHERE DEVICEID="SERIALNUMBERMODELPNPINSTANCEIDSYSTEM\CURRENTCONTROLSET\CONTROL\NETWORK\{4D36E972-E325-11CE-BFC1-08002BE10318}\%S\CONNECTIONROOT\WMI OR DEVICENAME="\\DEVICE\\SELECT INSTANCENAME, DEVICENAME FROM MSNDIS_ENUMERATEADAPTER WHERE DEVICENAME="\\DEVICE\\INSTANCENAMEDEVICENAME OR INSTANCENAME="SELECT INSTANCENAME, NDISPERMANENTADDRESS FROM MSNDIS_ETHERNETPERMANENTADDRESS WHERE INSTANCENAME="ADDRESSNDISPERMANENTADDRESSWIN32_NETWORKADAPTER.DEVICEID="ENABLEDISABLERETURNVALUETRUESELECT DEVICEID, PERMANENTADDRESS FROM MSFT_NETADAPTER WHERE (VIRTUAL = OR PNPDEVICEID LIKE "XEN%\\%" OR PNPDEVICEID LIKE "VMBUS\\%") AND (INTERFACETYPE = 6 OR INTERFACETYPE = 71) AND NOT NDISPHYSICALMEDIUM = 10FALSEROOT\STANDARDCIMV2PERMANENTADDRESSGUIDSELECT GUID, DEVICEID FROM WIN32_NETWORKADAPTER WHERE PHYSICALADAPTER = TRUE AND (PNPDEVICEID LIKE "PCI\\%" OR PNPDEVICEID LIKE "USB\\%" OR PNPDEVICEID LIKE "SD\\%" OR PNPDEVICEID LIKE "XEN%\\%" OR PNPDEVICEID LIKE "VMBUS\\%" OR PNPDEVICEID LIKE "%BDRV\\%") AND NOT SERVICENAME LIKE "USBRNDIS%"WINMGMTROOT\CIMV2SELECT NAME, SERIALNUMBER, SMBIOSBIOSVERSION, MANUFACTURER, VERSION FROM WIN32_BIOSSELECT MODEL FROM WIN32_DISKDRIVEPARALLELSVMWARESMBIOSBIOSVERSIONNAMEMANUFACTURERVIRTUALBOXVERSIONXENPRODUCTSELECT PRODUCT, MANUFACTURER FROM WIN32_BASEBOARDPROCESSORIDSELECT PROCESSORID, NAME, MANUFACTURER FROM WIN32_PROCESSORCAPACITYSELECT CAPACITY FROM WIN32_PHYSICALMEMORYSBIEDLL.DLL
Source: SoundBoosterTaskHost.exeBinary or memory string: SBIEDLL.DLL
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-UT7AG.tmp.1.drBinary or memory string: ASSOCIATORS OF {WIN32_LOGICALDISK.DEVICEID="WQLDEVICEID"} WHERE ASSOCCLASS = WIN32_LOGICALDISKTOPARTITION KEYSONLY"} WHERE ASSOCCLASS = WIN32_DISKDRIVETODISKPARTITION KEYSONLYASSOCIATORS OF {WIN32_DISKPARTITION.DEVICEID=""SELECT MODEL, SERIALNUMBER FROM WIN32_DISKDRIVE WHERE DEVICEID="SERIALNUMBERMODELPNPINSTANCEIDSYSTEM\CURRENTCONTROLSET\CONTROL\NETWORK\{4D36E972-E325-11CE-BFC1-08002BE10318}\%S\CONNECTIONROOT\WMI OR DEVICENAME="\\DEVICE\\SELECT INSTANCENAME, DEVICENAME FROM MSNDIS_ENUMERATEADAPTER WHERE DEVICENAME="\\DEVICE\\INSTANCENAMEDEVICENAME OR INSTANCENAME="SELECT INSTANCENAME, NDISPERMANENTADDRESS FROM MSNDIS_ETHERNETPERMANENTADDRESS WHERE INSTANCENAME="ADDRESSNDISPERMANENTADDRESSWIN32_NETWORKADAPTER.DEVICEID="ENABLEDISABLERETURNVALUETRUESELECT DEVICEID, PERMANENTADDRESS FROM MSFT_NETADAPTER WHERE (VIRTUAL = OR PNPDEVICEID LIKE "XEN%\\%" OR PNPDEVICEID LIKE "VMBUS\\%") AND (INTERFACETYPE = 6 OR INTERFACETYPE = 71) AND NOT NDISPHYSICALMEDIUM = 10FALSEROOT\STANDARDCIMV2PERMANENTADDRESSGUIDSELECT GUID, DEVICEID FROM WIN32_NETWORKADAPTER WHERE PHYSICALADAPTER = TRUE AND (PNPDEVICEID LIKE "PCI\\%" OR PNPDEVICEID LIKE "USB\\%" OR PNPDEVICEID LIKE "SD\\%" OR PNPDEVICEID LIKE "XEN%\\%" OR PNPDEVICEID LIKE "VMBUS\\%" OR PNPDEVICEID LIKE "%BDRV\\%") AND NOT SERVICENAME LIKE "USBRNDIS%"WINMGMTROOT\CIMV2SELECT NAME, SERIALNUMBER, SMBIOSBIOSVERSION, MANUFACTURER, VERSION FROM WIN32_BIOSSELECT MODEL FROM WIN32_DISKDRIVEPARALLELSVMWARESMBIOSBIOSVERSIONNAMEMANUFACTURERVIRTUALBOXVERSIONXENPRODUCTSELECT PRODUCT, MANUFACTURER FROM WIN32_BASEBOARDPROCESSORIDSELECT PROCESSORID, NAME, MANUFACTURER FROM WIN32_PROCESSORCAPACITYSELECT CAPACITY FROM WIN32_PHYSICALMEMORYSBIEDLL.DLL
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: __EH_prolog3_GS_align,GetAdaptersInfo,GetAdaptersInfo,GetAdaptersInfo,CoInitializeEx,CoCreateInstance,OpenSCManagerW,OpenServiceW,QueryServiceConfigW,GetLastError,LocalAlloc,QueryServiceConfigW,ChangeServiceConfigW,LocalFree,CloseServiceHandle,CloseServiceHandle,CoSetProxyBlanket,SysFreeString,SysFreeString,SysFreeString,SysFreeString,VariantClear,SysStringLen,VariantClear,VariantClear,SysStringLen,VariantClear,VariantClear,VariantClear,VariantClear,SysFreeString,VariantClear,VariantClear,SysFreeString,SysStringLen,VariantClear,SysFreeString,SysStringLen,VariantClear,VariantClear,VariantClear,VariantClear,SysFreeString,SysFreeString,SysFreeString,VariantClear,CoUninitialize,15_2_6C3F7471
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\SBH.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\SoundBooster.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\UltraActivate.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\is-P02PU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\is-470JU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\Logger64.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\is-HJ5VT.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterHelper.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\is-UT7AG.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\SBH64.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\Filters\gain.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\TurboActivate.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\is-U6OVG.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\Logger32.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\Filters\limit.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\is-FO5GS.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\Lang\is-HCK3C.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\Lang\is-3TFGO.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\Filters\is-1AQ6S.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\is-4PLJA.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\is-VDVIU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\Filters\is-VDV7H.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\Lang\SoundBoosterBR.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\Lang\SoundBoosterRU.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\is-V5IV6.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\is-9OI0H.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpDropped PE file which has not been started: C:\Program Files (x86)\Letasoft Sound Booster\is-Q41UV.tmpJump to dropped file
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_15-71498
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_8-15778
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_13-12292
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BE5B90 _wcslen,FindFirstFileW,FindNextFileW,FindClose,8_2_00BE5B90
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BE3C78 __EH_prolog3_GS,FindFirstFileW,_wcslen,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,8_2_00BE3C78
Source: is-Q41UV.tmp.1.drBinary or memory string: Hooks\HookEngineLhook.cppCHookEngineLhook::InstallHookALREADY INSTALLEDLhook_SetHook() FAILEDCHookEngineLhook::RemoveHookLhook_Unhook() FAILED SOFTWARE\Letasoft\Sound BoosterMLSCKLHookSharedSoundBoosterdbgmondevenvdwwinjs7jitvsjitdebuggermonitortaskmgrdxerrdllhostsndvoltaskengrundll32werfaultwuauclttsvncachedwmsndvol32errlookconhostexplorerravcpl642gistraynotifiersyntphelpermssecessyntpenhsidebarregeditnotepad++wcouriersourcetreeasscrprotaskhostsvchostwidgetstaskhostwtaskhostexsoftware_reporter_toolsihostcoresyncagsserviceadobeipcbrokeradobe desktop servicemsvsmonrtkngui64dexploresrspremiumpanelvmware-unity-helpervmplayervmware-vmxqt5appwrapperrarextloaderRadeonSettingsunins000turboactivatedbgviewmsascuilmsascuismartscreenKLHookDll.cppCKLHookProcess::AttachAPIsAttachAPIs: m_bIsProcessIgnoredAttaching to api failed more than allowed number of times. api=.exeCKLHookProcess::OnDllProcessDetachDLL_PROCESS_DETACH starting=DetachAPIs() completedSound BoosterCKLHookProcess::Initializecalled for process id=CreateGlobalStructs() FAILEDIVSTManager::Initialize SUCCEEDED FAILEDInitShared FAILEDFAILED TO GET PROCESS START TIME`H
Source: SoundBoosterTaskHost.exeBinary or memory string: VMware
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2063898887.000000000077D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: SoundBoosterTaskHost.exe, 0000000F.00000002.2048357672.0000000000978000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
Source: SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2063898887.000000000077D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\{
Source: is-UT7AG.tmp.1.drBinary or memory string: ASSOCIATORS OF {Win32_LogicalDisk.DeviceID="WQLDeviceID"} WHERE AssocClass = Win32_LogicalDiskToPartition KEYSONLY"} WHERE AssocClass = Win32_DiskDriveToDiskPartition KEYSONLYASSOCIATORS OF {Win32_DiskPartition.DeviceID=""Select Model, SerialNumber from Win32_DiskDrive WHERE DeviceID="SerialNumberModelPnpInstanceIDSYSTEM\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}\%s\Connectionroot\wmi OR DeviceName="\\DEVICE\\SELECT InstanceName, DeviceName FROM MSNdis_EnumerateAdapter WHERE DeviceName="\\DEVICE\\InstanceNameDeviceName OR InstanceName="SELECT InstanceName, NdisPermanentAddress FROM MSNdis_EthernetPermanentAddress WHERE InstanceName="AddressNdisPermanentAddressWin32_NetworkAdapter.DeviceID="EnableDisableReturnValueTRUESELECT DeviceID, PermanentAddress FROM MSFT_NetAdapter WHERE (Virtual = OR PNPDeviceID LIKE "XEN%\\%" OR PNPDeviceID LIKE "VMBUS\\%") AND (InterfaceType = 6 OR InterfaceType = 71) AND NOT NdisPhysicalMedium = 10FALSEroot\StandardCimv2PermanentAddressGUIDSELECT GUID, DeviceID FROM Win32_NetworkAdapter WHERE PhysicalAdapter = TRUE AND (PNPDeviceID LIKE "PCI\\%" OR PNPDeviceID LIKE "USB\\%" OR PNPDeviceID LIKE "SD\\%" OR PNPDeviceID LIKE "XEN%\\%" OR PNPDeviceID LIKE "VMBUS\\%" OR PNPDeviceID LIKE "%BDRV\\%") AND NOT ServiceName LIKE "usbrndis%"Winmgmtroot\cimv2Select Name, SerialNumber, SMBIOSBIOSVersion, Manufacturer, Version from Win32_BIOSSelect Model from Win32_DiskDriveParallelsVMwareSMBIOSBIOSVersionNameManufacturerVirtualBoxVersionXenProductSelect Product, Manufacturer from Win32_BaseBoardProcessorIdSelect ProcessorId, Name, Manufacturer from Win32_ProcessorCapacitySelect Capacity from Win32_PhysicalMemorySbieDll.dll
Source: SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: ?lASSOCIATORS OF {Win32_LogicalDisk.DeviceID="WQLDeviceID"} WHERE AssocClass = Win32_LogicalDiskToPartition KEYSONLY"} WHERE AssocClass = Win32_DiskDriveToDiskPartition KEYSONLYASSOCIATORS OF {Win32_DiskPartition.DeviceID=""Select Model, SerialNumber from Win32_DiskDrive WHERE DeviceID="SerialNumberModelPnpInstanceIDSYSTEM\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}\%s\Connectionroot\wmi OR DeviceName="\\DEVICE\\SELECT InstanceName, DeviceName FROM MSNdis_EnumerateAdapter WHERE DeviceName="\\DEVICE\\InstanceNameDeviceName OR InstanceName="SELECT InstanceName, NdisPermanentAddress FROM MSNdis_EthernetPermanentAddress WHERE InstanceName="AddressNdisPermanentAddressWin32_NetworkAdapter.DeviceID="EnableDisableReturnValueTRUESELECT DeviceID, PermanentAddress FROM MSFT_NetAdapter WHERE (Virtual = OR PNPDeviceID LIKE "XEN%\\%" OR PNPDeviceID LIKE "VMBUS\\%") AND (InterfaceType = 6 OR InterfaceType = 71) AND NOT NdisPhysicalMedium = 10FALSEroot\StandardCimv2PermanentAddressGUIDSELECT GUID, DeviceID FROM Win32_NetworkAdapter WHERE PhysicalAdapter = TRUE AND (PNPDeviceID LIKE "PCI\\%" OR PNPDeviceID LIKE "USB\\%" OR PNPDeviceID LIKE "SD\\%" OR PNPDeviceID LIKE "XEN%\\%" OR PNPDeviceID LIKE "VMBUS\\%" OR PNPDeviceID LIKE "%BDRV\\%") AND NOT ServiceName LIKE "usbrndis%"Winmgmtroot\cimv2Select Name, SerialNumber, SMBIOSBIOSVersion, Manufacturer, Version from Win32_BIOSSelect Model from Win32_DiskDriveParallelsVMwareSMBIOSBIOSVersionNameManufacturerVirtualBoxVersionXenProductSelect Product, Manufacturer from Win32_BaseBoardProcessorIdSelect ProcessorId, Name, Manufacturer from Win32_ProcessorCapacitySelect Capacity from Win32_PhysicalMemorySbieDll.dll
Source: is-HJ5VT.tmp.1.drBinary or memory string: Hooks\HookEngineLhook.cppCHookEngineLhook::InstallHookALREADY INSTALLEDLhook_SetHook() FAILEDCHookEngineLhook::RemoveHookLhook_Unhook() FAILED %s%sSOFTWARE\Letasoft\Sound BoosterMLSCKLHookSharedSoundBoosterdbgmondevenvdwwinjs7jitvsjitdebuggermonitortaskmgrdxerrdllhostsndvoltaskengrundll32werfaultwuauclttsvncachedwmsndvol32errlookconhostexplorerravcpl642gistraynotifiersyntphelpermssecessyntpenhsidebarregeditnotepad++wcouriersourcetreeasscrprotaskhostsvchostwidgetstaskhostwtaskhostexsoftware_reporter_toolsihostcoresyncagsserviceadobeipcbrokeradobe desktop servicemsvsmonrtkngui64dexploresrspremiumpanelvmware-unity-helpervmplayervmware-vmxqt5appwrapperrarextloaderRadeonSettingsunins000turboactivatedbgviewmsascuilmsascuismartscreenKLHookDll.cppCKLHookProcess::AttachAPIsAttachAPIs: m_bIsProcessIgnoredAttaching to api failed more than allowed number of times. api=.exeCKLHookProcess::OnDllProcessDetachDLL_PROCESS_DETACH starting=DetachAPIs() completedSound BoosterCKLHookProcess::Initializecalled for process id=CreateGlobalStructs() FAILEDIVSTManager::Initialize SUCCEEDED FAILEDInitShared FAILEDFAILED TO GET PROCESS START TIME
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BF0667 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00BF0667
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BE20D3 __EH_prolog3_GS,LoadLibraryW,GetProcAddress,FreeLibrary,8_2_00BE20D3
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BF3D31 mov eax, dword ptr fs:[00000030h]8_2_00BF3D31
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_0042AEAB mov eax, dword ptr fs:[00000030h]13_2_0042AEAB
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C474C77 mov eax, dword ptr fs:[00000030h]15_2_6C474C77
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C47FCF6 mov eax, dword ptr fs:[00000030h]15_2_6C47FCF6
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C47FCB2 mov eax, dword ptr fs:[00000030h]15_2_6C47FCB2
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BFA26A GetProcessHeap,8_2_00BFA26A
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BED87A SetUnhandledExceptionFilter,8_2_00BED87A
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BE7180 UnhandledExceptionFilter,SetUnhandledExceptionFilter,SetUnhandledExceptionFilter,UnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00BE7180
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BED171 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00BED171
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BF0667 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00BF0667
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BED71B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00BED71B
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_00424A45 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_00424A45
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_00427B17 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00427B17
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_00424BB8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00424BB8
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_00424D17 SetUnhandledExceptionFilter,13_2_00424D17
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C432F41 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_6C432F41
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C433B06 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_6C433B06
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C469BB2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_6C469BB2
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-RARHB.tmp\_isetup\_setup64.tmp helper 105 0x544Jump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll"Jump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C3F31FB AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,15_2_6C3F31FB
Source: C:\Users\user\AppData\Local\Temp\is-RARHB.tmp\_isetup\_setup64.tmpCode function: 5_2_0000000140001000 GetNamedSecurityInfoW,AllocateAndInitializeSid,SetEntriesInAclW,SetNamedSecurityInfoW,LocalFree,FreeSid,LocalFree,GetLastError,5_2_0000000140001000
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BED8D5 cpuid 8_2_00BED8D5
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,15_2_6C486F2A
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: GetLocaleInfoW,15_2_6C47DE7E
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: EnumSystemLocalesW,15_2_6C47D8C5
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,15_2_6C48788B
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: GetLocaleInfoW,15_2_6C487590
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,15_2_6C4876B6
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: GetLocaleInfoW,15_2_6C4877BC
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: GetLocaleInfoW,15_2_6C487125
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: EnumSystemLocalesW,15_2_6C4871CC
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: EnumSystemLocalesW,15_2_6C487217
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: EnumSystemLocalesW,15_2_6C4872B2
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,15_2_6C48733D
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmpQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeQueries volume information: C:\ProgramData\DIBsection\20986331705021ca58edc424.96250074 VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeQueries volume information: C:\ProgramData\DIBsection\20986331705021ca58edc424.96250074 VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exeCode function: 13_2_004210C4 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z,__EH_prolog3,CreateNamedPipeW,CreateThread,SetThreadPriority,ResumeThread,CloseHandle,13_2_004210C4
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BEB900 GetLocalTime,SystemTimeToFileTime,FileTimeToDosDateTime,8_2_00BEB900
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BF5576 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,8_2_00BF5576
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 8_2_00BE1EE8 NetWkstaGetInfo,NetApiBufferFree,GetVersionExW,GetVersionExW,GetVersionExW,8_2_00BE1EE8
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C448197 socket,socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,__fprintf_l,send,recv,closesocket,closesocket,closesocket,closesocket,closesocket,15_2_6C448197
Source: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exeCode function: 15_2_6C4402AC ___from_strstr_to_strchr,htons,htons,htons,bind,bind,htons,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,15_2_6C4402AC
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts4
Command and Scripting Interpreter
14
Windows Service
14
Windows Service
2
Masquerading
OS Credential Dumping2
System Time Discovery
Remote Services11
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Service Execution
1
Registry Run Keys / Startup Folder
12
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory121
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts31
Native API
1
DLL Side-Loading
1
Registry Run Keys / Startup Folder
12
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
NTDS2
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
System Network Configuration Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Regsvr32
Cached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync43
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1431843 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 25/04/2024 Architecture: WINDOWS Score: 26 53 Detected VMProtect packer 2->53 55 Contains functionality to detect virtual machines (IN, VMware) 2->55 57 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->57 9 SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe 2 2->9         started        12 svchost.exe 2->12         started        14 svchost.exe 2->14         started        process3 file4 49 SecuriteInfo.com.T...abot.14696.3514.tmp, PE32 9->49 dropped 16 SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp 31 47 9->16         started        process5 file6 41 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 16->41 dropped 43 C:\...\unins000.exe (copy), PE32 16->43 dropped 45 C:\Program Files (x86)\...\is-VDVIU.tmp, PE32 16->45 dropped 47 34 other files (none is malicious) 16->47 dropped 51 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 16->51 20 SoundBoosterTaskHost.exe 29 16->20         started        23 SoundBoosterTaskHost.exe 15 5 16->23         started        25 SoundBoosterService.exe 4 16->25         started        27 _setup64.tmp 1 16->27         started        signatures7 process8 signatures9 59 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 20->59 29 conhost.exe 20->29         started        31 regsvr32.exe 23->31         started        33 conhost.exe 23->33         started        35 conhost.exe 25->35         started        37 conhost.exe 27->37         started        process10 process11 39 regsvr32.exe 15 31->39         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe3%ReversingLabs
SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe1%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Program Files (x86)\Letasoft Sound Booster\ApoControl.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\ApoControl.dll (copy)0%VirustotalBrowse
C:\Program Files (x86)\Letasoft Sound Booster\Filters\gain.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\Filters\gain.dll (copy)0%VirustotalBrowse
C:\Program Files (x86)\Letasoft Sound Booster\Filters\is-1AQ6S.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\Filters\is-VDV7H.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\Filters\limit.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\Lang\SoundBoosterBR.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\Lang\SoundBoosterRU.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\Lang\is-3TFGO.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\Lang\is-HCK3C.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\Logger32.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\Logger64.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\SBH.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\SBH64.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\SoundBooster.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterHelper.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\TurboActivate.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\TurboActivate.exe (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\UltraActivate.dll (copy)0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-470JU.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-4PLJA.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-9OI0H.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-EMCVK.tmp4%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-FO5GS.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-GVBLF.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-HJ5VT.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-M1S53.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-P02PU.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-Q41UV.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-U6OVG.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-UT7AG.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-V5IV6.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\is-VDVIU.tmp0%ReversingLabs
C:\Program Files (x86)\Letasoft Sound Booster\unins000.exe (copy)4%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-RARHB.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp4%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.dk-soft.org/0%URL Reputationsafe
http://subca.ocsp-certum.com050%URL Reputationsafe
http://subca.ocsp-certum.com020%URL Reputationsafe
http://subca.ocsp-certum.com010%URL Reputationsafe
http://ccsca2021.ocsp-certum.com050%URL Reputationsafe
http://www.remobjects.com/ps0%URL Reputationsafe
http://www.innosetup.com/0%Avira URL Cloudsafe
https://wyday.com/limelm/help/faq/#fix-broken-wmi0%Avira URL Cloudsafe
https://wyday.com/limelm/buy-redirect/%u/admin0%Avira URL Cloudsafe
https://wyday.com/limelm/api/rest/httpsSignature0%Avira URL Cloudsafe
http://html4/loose.dtd0%Avira URL Cloudsafe
https://www.letasoft.com00%Avira URL Cloudsafe
https://www.letasoft.com)0%Avira URL Cloudsafe
https://www.letasoft.com0https://www.letasoft.com0https://www.letasoft.com0%Avira URL Cloudsafe
http://www.innosetup.com/2%VirustotalBrowse
https://wyday.com/limelm/help/faq/#fix-broken-wmi0%VirustotalBrowse
https://curl.se/docs/alt-svc.html0%Avira URL Cloudsafe
https://wyday.com/limelm/buy-redirect/%u/admin0%VirustotalBrowse
http://.css0%Avira URL Cloudsafe
http://wyday.com/limelm/api/rest/0%Avira URL Cloudsafe
https://wyday.com/limelm/help/faq/#fix-broken-wmivalTranslationtitlestartstitlepluralstitlesingleact0%Avira URL Cloudsafe
https://sectigo.com/CPS0U0%Avira URL Cloudsafe
https://www.letasoft.comq0%Avira URL Cloudsafe
https://curl.se/docs/alt-svc.html0%VirustotalBrowse
https://curl.se/docs/alt-svc.html#0%Avira URL Cloudsafe
https://wyday.com/limelm/api/rest/httpsSignature0%VirustotalBrowse
http://.jpg0%Avira URL Cloudsafe
https://wyday.com/limelm/api/rest/0%Avira URL Cloudsafe
https://wyday.com/limelm/help/faq/#fix-broken-wmivalTranslationtitlestartstitlepluralstitlesingleact0%VirustotalBrowse
https://sectigo.com/CPS0U0%VirustotalBrowse
https://curl.se/docs/alt-svc.html#0%VirustotalBrowse
https://wyday.com/limelm/api/rest/0%VirustotalBrowse
http://wyday.com/limelm/api/rest/0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.innosetup.com/SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1639199932.000000007FCE0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1638705530.0000000002400000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000000.1640080224.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-EMCVK.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.drfalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://html4/loose.dtdSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmp, is-VDVIU.tmp.1.dr, is-UT7AG.tmp.1.drfalse
  • Avira URL Cloud: safe
low
https://wyday.com/limelm/help/faq/#fix-broken-wmiis-A00SO.tmp.1.dr, is-Q7VFD.tmp.1.dr, is-0B8RS.tmp.1.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://crl.certum.pl/ctsca2021.crl0oSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
    high
    http://repository.certum.pl/ctnca.cer09SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
      high
      https://wyday.com/limelm/api/rest/httpsSignatureSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmp, is-VDVIU.tmp.1.dr, is-UT7AG.tmp.1.drfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://wyday.com/limelm/buy-redirect/%u/adminis-470JU.tmp.1.drfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://crl.certum.pl/ctnca.crl0kSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
        high
        http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exefalse
          high
          https://www.letasoft.comSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.2065768674.000000000228D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2062141734.00000000022ED000.00000004.00001000.00020000.00000000.sdmpfalse
            high
            http://ccsca2021.crl.certum.pl/ccsca2021.crl0sSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
              high
              https://www.letasoft.com0SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
              • Avira URL Cloud: safe
              unknown
              https://www.letasoft.com)SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.2065768674.000000000228D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2062141734.00000000022ED000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://www.letasoft.com0https://www.letasoft.com0https://www.letasoft.comSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1637946717.0000000002400000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.1641431576.00000000031F0000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://curl.se/docs/alt-svc.htmlis-UT7AG.tmp.1.drfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.certum.pl/CPS0SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
                high
                http://.cssSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmp, is-VDVIU.tmp.1.dr, is-UT7AG.tmp.1.drfalse
                • Avira URL Cloud: safe
                low
                http://wyday.com/limelm/api/rest/SoundBoosterTaskHost.exe, 0000000F.00000002.2048357672.0000000000978000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://wyday.com/limelm/help/faq/#fix-broken-wmivalTranslationtitlestartstitlepluralstitlesingleactis-470JU.tmp.1.drfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://repository.certum.pl/ccsca2021.cer0SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
                  high
                  https://sectigo.com/CPS0USecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.letasoft.comqSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.2065768674.000000000228D000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2062141734.00000000022ED000.00000004.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.dk-soft.org/SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.2065768674.0000000002226000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1637946717.0000000002400000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2062141734.0000000002247000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.1641431576.00000000031F0000.00000004.00001000.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://curl.se/docs/alt-svc.html#SoundBoosterTaskHost.exefalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.letasoft.com/ru/help/#b1is-0B8RS.tmp.1.drfalse
                    high
                    https://www.letasoft.com/ru/help/#b5is-0B8RS.tmp.1.drfalse
                      high
                      http://repository.certum.pl/ctsca2021.cer0SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
                        high
                        http://subca.ocsp-certum.com05SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
                        • URL Reputation: safe
                        unknown
                        http://subca.ocsp-certum.com02SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
                        • URL Reputation: safe
                        unknown
                        http://subca.ocsp-certum.com01SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
                        • URL Reputation: safe
                        unknown
                        http://www.letasoft.comSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-1AQ6S.tmp.1.dr, is-VDV7H.tmp.1.drfalse
                          high
                          http://crl.certum.pl/ctnca2.crl0lSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
                            high
                            http://repository.certum.pl/ctnca2.cer09SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
                              high
                              https://www.letasoft.com/help/#b5is-A00SO.tmp.1.dr, is-Q7VFD.tmp.1.drfalse
                                high
                                https://secure.comodo.com/CPS0LSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-470JU.tmp.1.dr, is-UT7AG.tmp.1.drfalse
                                  high
                                  http://ccsca2021.ocsp-certum.com05SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.letasoft.com/help/#b1is-A00SO.tmp.1.dr, is-Q7VFD.tmp.1.drfalse
                                    high
                                    http://www.remobjects.com/psSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1639199932.000000007FCE0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, 00000000.00000003.1638705530.0000000002400000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000000.1640080224.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-EMCVK.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://.jpgSecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmp, is-VDVIU.tmp.1.dr, is-UT7AG.tmp.1.drfalse
                                    • Avira URL Cloud: safe
                                    low
                                    http://www.certum.pl/CPS0SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe, is-U6OVG.tmp.1.dr, is-FO5GS.tmp.1.dr, is-V5IV6.tmp.1.dr, is-EMCVK.tmp.1.dr, is-Q41UV.tmp.1.dr, is-VDVIU.tmp.1.dr, is-P02PU.tmp.1.dr, is-HCK3C.tmp.1.dr, is-GVBLF.tmp.1.dr, is-4PLJA.tmp.1.dr, is-M1S53.tmp.1.dr, SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp.0.dr, is-HJ5VT.tmp.1.dr, is-3TFGO.tmp.1.dr, is-9OI0H.tmp.1.drfalse
                                      high
                                      https://wyday.com/limelm/api/rest/SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp, 00000001.00000003.2056520577.00000000064ED000.00000004.00001000.00020000.00000000.sdmp, SoundBoosterTaskHost.exe, SoundBoosterTaskHost.exe, 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmp, SoundBoosterTaskHost.exe, 0000000F.00000002.2048357672.0000000000978000.00000004.00000020.00020000.00000000.sdmp, is-VDVIU.tmp.1.dr, is-UT7AG.tmp.1.drfalse
                                      • 0%, Virustotal, Browse
                                      • Avira URL Cloud: safe
                                      unknown
                                      No contacted IP infos
                                      Joe Sandbox version:40.0.0 Tourmaline
                                      Analysis ID:1431843
                                      Start date and time:2024-04-25 21:28:05 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 7m 2s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:20
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe
                                      Detection:SUS
                                      Classification:sus26.evad.winEXE@21/57@0/0
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 97%
                                      • Number of executed functions: 102
                                      • Number of non-executed functions: 321
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      No simulations
                                      No context
                                      No context
                                      No context
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Program Files (x86)\Letasoft Sound Booster\Filters\gain.dll (copy)3ud5fWWHHP.exeGet hashmaliciousSocks5SystemzBrowse
                                        mDxw0fYXcL.exeGet hashmaliciousSocks5SystemzBrowse
                                          3AJpLa42W3.exeGet hashmaliciousSocks5SystemzBrowse
                                            4KYzwbWhyI.exeGet hashmaliciousSocks5SystemzBrowse
                                              Ty0li34KWE.exeGet hashmaliciousSocks5SystemzBrowse
                                                JtgFhcZpcx.exeGet hashmaliciousSocks5SystemzBrowse
                                                  pucZFJ63d7.exeGet hashmaliciousSocks5SystemzBrowse
                                                    SecuriteInfo.com.Trojan.Win32.Crypt.13970.25752.exeGet hashmaliciousSocks5SystemzBrowse
                                                      SecuriteInfo.com.Trojan.Win32.Crypt.8779.30796.exeGet hashmaliciousSocks5SystemzBrowse
                                                        SecuriteInfo.com.Trojan.Win32.Crypt.1178.11191.exeGet hashmaliciousSocks5SystemzBrowse
                                                          C:\Program Files (x86)\Letasoft Sound Booster\ApoControl.dll (copy)SecuriteInfo.com.Trojan.Win32.Crypt.13970.25752.exeGet hashmaliciousSocks5SystemzBrowse
                                                            SecuriteInfo.com.Trojan.Win32.Crypt.8779.30796.exeGet hashmaliciousSocks5SystemzBrowse
                                                              SecuriteInfo.com.Trojan.Win32.Crypt.1178.11191.exeGet hashmaliciousSocks5SystemzBrowse
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):208816
                                                                Entropy (8bit):6.646069643453431
                                                                Encrypted:false
                                                                SSDEEP:6144:gwOh40q7GA3GjisAO70m3nIx0IjvaDvvD:K4d77mVSxBjvaDv7
                                                                MD5:18CC066A5DAF36920CEA0094FAD8EE2F
                                                                SHA1:624A394DDEF12E8CE588626DF20199565CCF1715
                                                                SHA-256:B7EFD8423A3DAF6CE666AB52BCE1205D703069387678686849AC7E93AED061F6
                                                                SHA-512:26715F812B36D0783017579C2D0A47171AEFB533B75193D87870DBA6273718100AAE966F653FA7353207078363D4E12CD35D81C1CF08878C992A9DA60330B420
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                Joe Sandbox View:
                                                                • Filename: SecuriteInfo.com.Trojan.Win32.Crypt.13970.25752.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.Trojan.Win32.Crypt.8779.30796.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.Trojan.Win32.Crypt.1178.11191.exe, Detection: malicious, Browse
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............y..y..y.U....y.U...d.y.U.....y...z...y...|..y...}...y.<c...y..x.h.y.v.p..y.v.y...y.s....y......y.v.{...y.Rich.y.................PE..L.....ab...........!.........L......,........................................p............@.............................T............0..8................)...@..."......................................@............................................text............................... ..`.rdata..............................@..@.data...............................@....gfids..D...........................@..@.tls......... ......................@....rsrc...8....0......................@..@.reloc..."...@...$..................@..B........................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):597688
                                                                Entropy (8bit):6.6797399445991426
                                                                Encrypted:false
                                                                SSDEEP:12288:BaxfsiWQaokdQWLemvDWiBaJmq0OWvhSCQGwzRTFWOapLHaYT3paQfz:ExfsiPmhSCQ7tT5oHaC3pa2z
                                                                MD5:0CEF09D078FF9367B418384D57B145DB
                                                                SHA1:3041BF7F8EB4C04318B91270FE712F0EFE23F99F
                                                                SHA-256:7B74B2E74A484E25954839A9DEF5F39E7DD03269B93A8577BF8E76D4BC16A766
                                                                SHA-512:BAB9C045457415863A49684EBB2ADFFF84A2AC41A199943A6362E267FB7C8ACBE4B1F68E281C581B72B7E19CD1642E9C880688999B5730E5B0CBAB9C8EAD0F2A
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                Joe Sandbox View:
                                                                • Filename: 3ud5fWWHHP.exe, Detection: malicious, Browse
                                                                • Filename: mDxw0fYXcL.exe, Detection: malicious, Browse
                                                                • Filename: 3AJpLa42W3.exe, Detection: malicious, Browse
                                                                • Filename: 4KYzwbWhyI.exe, Detection: malicious, Browse
                                                                • Filename: Ty0li34KWE.exe, Detection: malicious, Browse
                                                                • Filename: JtgFhcZpcx.exe, Detection: malicious, Browse
                                                                • Filename: pucZFJ63d7.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.Trojan.Win32.Crypt.13970.25752.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.Trojan.Win32.Crypt.8779.30796.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.Trojan.Win32.Crypt.1178.11191.exe, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<5R>xT<mxT<mxT<m}X3m{T<m.H2mmT<m.K6m.T<m.K7mrT<m.K/mqT<mxT=m.T<mxT<m[T<m.R:myT<m.t8myT<mRichxT<m........................PE..L...g[.V...........!.........*.......l....... ......................................................................`4..O....(..d.... ...................:...0...>................................................... ..4............................text............................... ..`.text1.............................. ..`.rdata....... ......................@..@.data........@...>..................@....data1...............V..............@....trace..`%.......&...j..............@..@.rsrc........ ......................@..@.reloc...P...0...R..................@..B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):315064
                                                                Entropy (8bit):6.503201411592494
                                                                Encrypted:false
                                                                SSDEEP:6144:yqNvComP+VN+f8+OlfoubbTjCNzTNj1AOXIoFoTwjfW:Tdfo6sF4ocwbW
                                                                MD5:ABB08E6024CC803FF0BCA0095282DAEF
                                                                SHA1:A090596845595DFBF31CC2A7F0804E70ABC37A7F
                                                                SHA-256:6FFA2975FDE93C5764DA2E4CA2FCE35E1D30D1517233BE3371F917C1D2A13424
                                                                SHA-512:F8CC34070190672160062957B5D237EDE55D09574CE4697B56F51250F1307B296FB2BA79618FBC331E795BD9050F9F047ACF80CDAB5A8D10312725BA7062381D
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e.Q!...!...!...g.=.....g.<.Z...g...?....}..(...!.......\.9. ...\... ...,... ...!.K. ...\... ...Rich!...........PE..d....Y.V.........." .....0..........`........................................0.......)....`..........................................2..X...h2..d................ .......:... ......0E..8...............................p............@...............................text..../.......0.................. ..`.rdata..d....@.......4..............@..@.data...xc...P.......6..............@....pdata... ......."...P..............@..@_RDATA..P............r..............@..@.rsrc...............................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):597688
                                                                Entropy (8bit):6.6797399445991426
                                                                Encrypted:false
                                                                SSDEEP:12288:BaxfsiWQaokdQWLemvDWiBaJmq0OWvhSCQGwzRTFWOapLHaYT3paQfz:ExfsiPmhSCQ7tT5oHaC3pa2z
                                                                MD5:0CEF09D078FF9367B418384D57B145DB
                                                                SHA1:3041BF7F8EB4C04318B91270FE712F0EFE23F99F
                                                                SHA-256:7B74B2E74A484E25954839A9DEF5F39E7DD03269B93A8577BF8E76D4BC16A766
                                                                SHA-512:BAB9C045457415863A49684EBB2ADFFF84A2AC41A199943A6362E267FB7C8ACBE4B1F68E281C581B72B7E19CD1642E9C880688999B5730E5B0CBAB9C8EAD0F2A
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<5R>xT<mxT<mxT<m}X3m{T<m.H2mmT<m.K6m.T<m.K7mrT<m.K/mqT<mxT=m.T<mxT<m[T<m.R:myT<m.t8myT<mRichxT<m........................PE..L...g[.V...........!.........*.......l....... ......................................................................`4..O....(..d.... ...................:...0...>................................................... ..4............................text............................... ..`.text1.............................. ..`.rdata....... ......................@..@.data........@...>..................@....data1...............V..............@....trace..`%.......&...j..............@..@.rsrc........ ......................@..@.reloc...P...0...R..................@..B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):315064
                                                                Entropy (8bit):6.503201411592494
                                                                Encrypted:false
                                                                SSDEEP:6144:yqNvComP+VN+f8+OlfoubbTjCNzTNj1AOXIoFoTwjfW:Tdfo6sF4ocwbW
                                                                MD5:ABB08E6024CC803FF0BCA0095282DAEF
                                                                SHA1:A090596845595DFBF31CC2A7F0804E70ABC37A7F
                                                                SHA-256:6FFA2975FDE93C5764DA2E4CA2FCE35E1D30D1517233BE3371F917C1D2A13424
                                                                SHA-512:F8CC34070190672160062957B5D237EDE55D09574CE4697B56F51250F1307B296FB2BA79618FBC331E795BD9050F9F047ACF80CDAB5A8D10312725BA7062381D
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e.Q!...!...!...g.=.....g.<.Z...g...?....}..(...!.......\.9. ...\... ...,... ...!.K. ...\... ...Rich!...........PE..d....Y.V.........." .....0..........`........................................0.......)....`..........................................2..X...h2..d................ .......:... ......0E..8...............................p............@...............................text..../.......0.................. ..`.rdata..d....@.......4..............@..@.data...xc...P.......6..............@....pdata... ......."...P..............@..@_RDATA..P............r..............@..@.rsrc...............................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):17328
                                                                Entropy (8bit):6.467854152012464
                                                                Encrypted:false
                                                                SSDEEP:192:zCoSPU8+fLLfUl96+PBo21ZtDYNDxEdRkVV/LkghFbr9LB+HPTSofousUwz2T3+y:9kU9vWI2mNDOQ/osFFBaSofousWu4zV
                                                                MD5:04836C4C3228B9E5FCD8A995D38030C5
                                                                SHA1:2D0E8049ED5392A2FE072E0FCDC30328B3CCA62F
                                                                SHA-256:FAAA95455F9C516CBDB02E233533A7D44E7F6FFB3F850A2ED0482E553FF18E71
                                                                SHA-512:38D1B94CB990120B5C846977BDC7109E62EE994241A2F84774C27395D6153DBD1F08562C08DAD3E66D8EC73C31AB9B18071308BAD7360AE4AC2A42E3A7E2AAE2
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7.<.s.R.s.R.s.R...r.R...P.r.R.Richs.R.........PE..L.....ab...........!.........................................................@......sk....@.......................................... ...................)..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@..............ab........T...8...8.........ab....................GCTL....8....rdata..8...T....rdata$zzzdbg.... .......rsrc$01....."..8....rsrc$02................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):17328
                                                                Entropy (8bit):6.676071373993445
                                                                Encrypted:false
                                                                SSDEEP:384:FtzAeV53Ic52mNDOQafElFFBaSofousWu4vFt:FtzJ53Ic5h0Q0El1aSoQuSM
                                                                MD5:56916EA3B9A10D00FEB9818C3068F4A8
                                                                SHA1:16976619882AA3E1BE24AAACC775C16AA2AB5963
                                                                SHA-256:C64E4820A0B8A29ECC71B4EF43C318D7CF2682270D39C53CB3980BEF0E24D2CC
                                                                SHA-512:FA8BF43756F4C4E6A1951E566FB585C05B0CD2C89EE93B92212B9C14C36DE3FDA9D9F9C00B0F2729F4EEB4C2182436560BE271B48ED897375D115A68D9EB437D
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7.<.s.R.s.R.s.R...r.R...P.r.R.Richs.R.........PE..L.....ab...........!.........................................................@............@.......................................... ...................)..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@..............ab........T...8...8.........ab....................GCTL....8....rdata..8...T....rdata$zzzdbg.... .......rsrc$01....."..P....rsrc$02................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:XML 1.0 document, ASCII text, with very long lines (307), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):5928
                                                                Entropy (8bit):4.941433138906401
                                                                Encrypted:false
                                                                SSDEEP:96:xHd59ENEuceB3e5g7M8xvkeFwnnxOmp/T9eqsDYzPYFFWKDs9QxhkmEwIkmxI9GL:5d59ENEuJI5g7Vv7kxB/5PYFFWKY07de
                                                                MD5:4D50E1FDE63F8505865CB6C9ED40F1C2
                                                                SHA1:392D085138BE9959DF9DF40477D275A6D291EC7B
                                                                SHA-256:A4D3E7E3BCC79045581CEF6D1A86F651C43834567DBFB0A1F0F87ECBBE7984B2
                                                                SHA-512:01055014611B4E2E60F43DF9F2692A9B059903BA0C2EDF8C3C1213EBFABBBDE0F8A90E2762127BD0B8C832C662DE34F0E357193AA552B69F8A2E16DD022B6E17
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<Translation>...<title val="Activation"/>...<start>....<title val="Activate %1 now"/>....<stitleplural val="You must activate %1 within %2 days to continue using it."/>....<stitlesingle val="You must activate %1 within 1 day to continue using it."/>....<activate val="&amp;Activate %1 online now"/>....<asklater val="Activate &amp;later"/>...</start>...<startexp>....<stitle val="Your trial period has expired and %1 is no longer working. To continue using this software you must activate it."/>....<buy val="&amp;Buy a new product key online"/>....<newpkey val="&amp;Retype your product key"/>....<manualact val="&amp;Manually activate %1 offline"/>....<otheropts val="Other options (trial extension, offline activation)"/>...</startexp>...<otheropts>....<title val="Other options"/>....<stitle val="Either manually activate %1 or extend your trial."/>....<extend val="Extend your trial"/>...</otheropts>...<trial>....<title val="Extend your trial"/>....<stit
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with very long lines (362), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):6885
                                                                Entropy (8bit):4.992604235635313
                                                                Encrypted:false
                                                                SSDEEP:96:1e2z4Ya1lp0rwCJSX748QbchJ/D0QC3A28tjeR8qYMUiZMlDD62WckK7GjB7kK75:Jec0b1CkLqMM2bGtRVk8
                                                                MD5:3F329982989AD24E151F51F513284C12
                                                                SHA1:E744D34F2A85807A32D79960BD3C47488783E8E9
                                                                SHA-256:400B886854892F976A8E327D66F895DC71C3C9CCE42C0E576A69D0A7D129FA88
                                                                SHA-512:365ED067DE73C4C1B27D30BD41D9DAECF5926A1A3D7F6766ABD499A73EB3E6471B8F6BD21C259C91192B1262D03FC9E47905A4D5C295CA99F981D360AB26DBBC
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<Translation>...<title val="Ativando"/>...<start>....<title val="Ativar o %1 agora"/>....<stitleplural val="Voc. tem que ativar o %1 em %2 dias para continuar a usu.-lo."/>....<stitlesingle val="Voc. precisa ativar o %1 em 1 dia para continuar a us.-lo."/>....<activate val="&amp;Ativar o %1 online agora"/>....<asklater val="Ativar &amp;depois"/>...</start>...<startexp>....<stitle val="Seu per.odo de teste expirou e o %1 n.o funcionar. mais. Para continuar a usar este programa, voc. precisa licenci.-lo."/>....<buy val="&amp;Comprar um licen.a do produto online"/>....<newpkey val="&amp;Redigite sua licen.a"/>....<manualact val="&amp;Licenciar o %1 offline"/>....<otheropts val="Outras op..es (estender a avalia..o, licenciar offline)"/>...</startexp>...<otheropts>....<title val="Outras Op..es"/>....<stitle val="Licenciar o %1 ou estender seu per.odo de teste."/>....<extend val="Estender minha avalia..o"/>...</otheropts>...<trial>.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with very long lines (322), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):9798
                                                                Entropy (8bit):4.8452059295897865
                                                                Encrypted:false
                                                                SSDEEP:192:d3EVlV2jLtsgL8J7MWcrIAsIcIJsaL/r7gB9iez6KsuAPdwkjbT2FhDWYLJGVyfa:d3hjLt38J7MWcrIAsIcIJlLHQx+uydwe
                                                                MD5:9D478BEA4276BF33D8556701E8E4045C
                                                                SHA1:5E58309576B8D27C8999818AACB12D061F5328A5
                                                                SHA-256:70972039E093BD7201A01DC8D9EF315A788752E274D3F6DF433E4196AF1DC67C
                                                                SHA-512:ED7ADA8E78E0A858D1A075A4DB620F139FF171995F2C254F320FB6CE797B1717268964690D580A1EB3B240A647578D49D57D973E3CCCDA8A8B5F6CCC3D0FB8ED
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<Translation>...<title val="........."/>...<start>....<title val="........... %1 ......"/>....<stitleplural val=".. ...... ............ %1 . ....... %2 ...., ..... .......... ............ ... ....... %1."/>....<stitlesingle val=".. ...... ............ %1 . ....... 1 ..., ..... .......... ............ ... ....... %1."/>....<activate val="............ %1 ...... ..... ........"/>....<asklater val="............ ....."/>...</start>...<startexp>....<stitle val="... ....... ...... .......... . %1 ...... .. ......... ..... .......... ............ ... ......... .. ...... ............ ... ..... %1."/>....<buy val="...... ..... ..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with very long lines (322), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):9798
                                                                Entropy (8bit):4.8452059295897865
                                                                Encrypted:false
                                                                SSDEEP:192:d3EVlV2jLtsgL8J7MWcrIAsIcIJsaL/r7gB9iez6KsuAPdwkjbT2FhDWYLJGVyfa:d3hjLt38J7MWcrIAsIcIJlLHQx+uydwe
                                                                MD5:9D478BEA4276BF33D8556701E8E4045C
                                                                SHA1:5E58309576B8D27C8999818AACB12D061F5328A5
                                                                SHA-256:70972039E093BD7201A01DC8D9EF315A788752E274D3F6DF433E4196AF1DC67C
                                                                SHA-512:ED7ADA8E78E0A858D1A075A4DB620F139FF171995F2C254F320FB6CE797B1717268964690D580A1EB3B240A647578D49D57D973E3CCCDA8A8B5F6CCC3D0FB8ED
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<Translation>...<title val="........."/>...<start>....<title val="........... %1 ......"/>....<stitleplural val=".. ...... ............ %1 . ....... %2 ...., ..... .......... ............ ... ....... %1."/>....<stitlesingle val=".. ...... ............ %1 . ....... 1 ..., ..... .......... ............ ... ....... %1."/>....<activate val="............ %1 ...... ..... ........"/>....<asklater val="............ ....."/>...</start>...<startexp>....<stitle val="... ....... ...... .......... . %1 ...... .. ......... ..... .......... ............ ... ......... .. ...... ............ ... ..... %1."/>....<buy val="...... ..... ..
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):17328
                                                                Entropy (8bit):6.467854152012464
                                                                Encrypted:false
                                                                SSDEEP:192:zCoSPU8+fLLfUl96+PBo21ZtDYNDxEdRkVV/LkghFbr9LB+HPTSofousUwz2T3+y:9kU9vWI2mNDOQ/osFFBaSofousWu4zV
                                                                MD5:04836C4C3228B9E5FCD8A995D38030C5
                                                                SHA1:2D0E8049ED5392A2FE072E0FCDC30328B3CCA62F
                                                                SHA-256:FAAA95455F9C516CBDB02E233533A7D44E7F6FFB3F850A2ED0482E553FF18E71
                                                                SHA-512:38D1B94CB990120B5C846977BDC7109E62EE994241A2F84774C27395D6153DBD1F08562C08DAD3E66D8EC73C31AB9B18071308BAD7360AE4AC2A42E3A7E2AAE2
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7.<.s.R.s.R.s.R...r.R...P.r.R.Richs.R.........PE..L.....ab...........!.........................................................@......sk....@.......................................... ...................)..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@..............ab........T...8...8.........ab....................GCTL....8....rdata..8...T....rdata$zzzdbg.... .......rsrc$01....."..8....rsrc$02................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:XML 1.0 document, Unicode text, UTF-8 text, with very long lines (362), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):6885
                                                                Entropy (8bit):4.992604235635313
                                                                Encrypted:false
                                                                SSDEEP:96:1e2z4Ya1lp0rwCJSX748QbchJ/D0QC3A28tjeR8qYMUiZMlDD62WckK7GjB7kK75:Jec0b1CkLqMM2bGtRVk8
                                                                MD5:3F329982989AD24E151F51F513284C12
                                                                SHA1:E744D34F2A85807A32D79960BD3C47488783E8E9
                                                                SHA-256:400B886854892F976A8E327D66F895DC71C3C9CCE42C0E576A69D0A7D129FA88
                                                                SHA-512:365ED067DE73C4C1B27D30BD41D9DAECF5926A1A3D7F6766ABD499A73EB3E6471B8F6BD21C259C91192B1262D03FC9E47905A4D5C295CA99F981D360AB26DBBC
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<Translation>...<title val="Ativando"/>...<start>....<title val="Ativar o %1 agora"/>....<stitleplural val="Voc. tem que ativar o %1 em %2 dias para continuar a usu.-lo."/>....<stitlesingle val="Voc. precisa ativar o %1 em 1 dia para continuar a us.-lo."/>....<activate val="&amp;Ativar o %1 online agora"/>....<asklater val="Ativar &amp;depois"/>...</start>...<startexp>....<stitle val="Seu per.odo de teste expirou e o %1 n.o funcionar. mais. Para continuar a usar este programa, voc. precisa licenci.-lo."/>....<buy val="&amp;Comprar um licen.a do produto online"/>....<newpkey val="&amp;Redigite sua licen.a"/>....<manualact val="&amp;Licenciar o %1 offline"/>....<otheropts val="Outras op..es (estender a avalia..o, licenciar offline)"/>...</startexp>...<otheropts>....<title val="Outras Op..es"/>....<stitle val="Licenciar o %1 ou estender seu per.odo de teste."/>....<extend val="Estender minha avalia..o"/>...</otheropts>...<trial>.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):17328
                                                                Entropy (8bit):6.676071373993445
                                                                Encrypted:false
                                                                SSDEEP:384:FtzAeV53Ic52mNDOQafElFFBaSofousWu4vFt:FtzJ53Ic5h0Q0El1aSoQuSM
                                                                MD5:56916EA3B9A10D00FEB9818C3068F4A8
                                                                SHA1:16976619882AA3E1BE24AAACC775C16AA2AB5963
                                                                SHA-256:C64E4820A0B8A29ECC71B4EF43C318D7CF2682270D39C53CB3980BEF0E24D2CC
                                                                SHA-512:FA8BF43756F4C4E6A1951E566FB585C05B0CD2C89EE93B92212B9C14C36DE3FDA9D9F9C00B0F2729F4EEB4C2182436560BE271B48ED897375D115A68D9EB437D
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7.<.s.R.s.R.s.R...r.R...P.r.R.Richs.R.........PE..L.....ab...........!.........................................................@............@.......................................... ...................)..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@..............ab........T...8...8.........ab....................GCTL....8....rdata..8...T....rdata$zzzdbg.... .......rsrc$01....."..P....rsrc$02................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:XML 1.0 document, ASCII text, with very long lines (307), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):5928
                                                                Entropy (8bit):4.941433138906401
                                                                Encrypted:false
                                                                SSDEEP:96:xHd59ENEuceB3e5g7M8xvkeFwnnxOmp/T9eqsDYzPYFFWKDs9QxhkmEwIkmxI9GL:5d59ENEuJI5g7Vv7kxB/5PYFFWKY07de
                                                                MD5:4D50E1FDE63F8505865CB6C9ED40F1C2
                                                                SHA1:392D085138BE9959DF9DF40477D275A6D291EC7B
                                                                SHA-256:A4D3E7E3BCC79045581CEF6D1A86F651C43834567DBFB0A1F0F87ECBBE7984B2
                                                                SHA-512:01055014611B4E2E60F43DF9F2692A9B059903BA0C2EDF8C3C1213EBFABBBDE0F8A90E2762127BD0B8C832C662DE34F0E357193AA552B69F8A2E16DD022B6E17
                                                                Malicious:false
                                                                Preview:<?xml version="1.0" encoding="utf-8"?>..<Translation>...<title val="Activation"/>...<start>....<title val="Activate %1 now"/>....<stitleplural val="You must activate %1 within %2 days to continue using it."/>....<stitlesingle val="You must activate %1 within 1 day to continue using it."/>....<activate val="&amp;Activate %1 online now"/>....<asklater val="Activate &amp;later"/>...</start>...<startexp>....<stitle val="Your trial period has expired and %1 is no longer working. To continue using this software you must activate it."/>....<buy val="&amp;Buy a new product key online"/>....<newpkey val="&amp;Retype your product key"/>....<manualact val="&amp;Manually activate %1 offline"/>....<otheropts val="Other options (trial extension, offline activation)"/>...</startexp>...<otheropts>....<title val="Other options"/>....<stitle val="Either manually activate %1 or extend your trial."/>....<extend val="Extend your trial"/>...</otheropts>...<trial>....<title val="Extend your trial"/>....<stit
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):260528
                                                                Entropy (8bit):6.697233046928663
                                                                Encrypted:false
                                                                SSDEEP:3072:nD+1kCmZf1p43zi/wFOVoO0bSiZOkfGwLHpB2L0tjb1vpoLBl9Ag0Fubr4Vsk8TY:nD+1BmVui/Q8oeaHX2Atp+AO4i1Tnp+f
                                                                MD5:862CA43FD8CCEA3E00A41E177CAA957B
                                                                SHA1:8888EBBFCC1462A4F253217DB1A112AF2699F6E2
                                                                SHA-256:BB2F0854892FAE554C6C999FAD1DDDD53A8204FFBE4AC9103001D5E2DE106AFD
                                                                SHA-512:02034C39190E7DD8A05E44AC2E394C7E298C5BD509B01C862A8ABDF7B09826C9163DA672CE914CD990B257770B66BDA40113CCD06908169B6CE13A9A985BFEC9
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......f..]".y.".y.".y..Y....y..Y....y..Y..?.y...z.5.y...|...y...}...y.+...+.y.".x.T.y...p.!.y...y.#.y.....#.y."...#.y...{.#.y.Rich".y.........................PE..L.....ab...........!.........>.......................................................}....@.............................h.......P.......8................).......&..@t..............................`t..@...............l............................text............................... ..`.rdata..p...........................@..@.data...............................@....gfids..P...........................@..@.rsrc...8...........................@..@.reloc...&.......(..................@..B........................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):317360
                                                                Entropy (8bit):6.3189859386488685
                                                                Encrypted:false
                                                                SSDEEP:6144:9c68TAPyuUPg3wi/UxynB5wnFcTCb2lUKMAQoh2vKydBZqNHZG:98TAausg3wYCSlEo8N0s
                                                                MD5:C69917647354E03FFEA016B86D3BC973
                                                                SHA1:E6385500AAEB50F3E2C36D7FC23789DFBAFBE802
                                                                SHA-256:5B273FC8597B541AD86D3650362BCBAA592CED0163D56499BADD344306CB99ED
                                                                SHA-512:DAF7E027EFF292AD39E93EC8E0BB0AF2437DE3546E1E8431A80C752FDEB1D57D2F477D45FB736B22A321B3CC4DA02B8F0E3C1F5C106CB4D4112ADC65ED0167A0
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Z..4T.4T.4T^,.T.4T^,.Td.4T^,.T.4T..7U.4T..1U.4T..0U.4T..T.4T.5T..4T}.=U.4T}.4U.4Tx..T.4T.T.4T}.6U.4TRich.4T................PE..d.....ab.........." ................................................................2.....`......................................... _..h...._..P.......8........+.......)......X...................................0................................................text............................... ..`.rdata...i.......j..................@..@.data....(...p.......Z..............@....pdata...+.......,...j..............@..@.gfids..............................@..@.rsrc...8...........................@..@.reloc..X...........................@..B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):588720
                                                                Entropy (8bit):5.6097958863819475
                                                                Encrypted:false
                                                                SSDEEP:12288:GQEMpHTqsxDaFFUf7Pzq05/M64p0g0YHn8gtgPQ9:FBTqsxDZf7PzqUEtP9
                                                                MD5:B2DFC74F0C0ED8C1B949C545315F309B
                                                                SHA1:E96D97EEA104E68EAAB215BAF08D80D5CD9084FD
                                                                SHA-256:D17B8A74494E9E9A2FEF7F469B7E78E8E4BBBAB5CA5F6723DA64116B346A54D0
                                                                SHA-512:B239AE5EDDBEAFCB73B1C1677FA9C49361ED6410C12E92FECB1A7CA891ADAA4E985145774FC0EFB87E78726ABD890FE01BA12721CBC28D9692B0902EC5DE6B35
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i*...D..D..D.-....D.-.....D.-....D......D.VG..D.V@..D.VA..D.p...D..E.P.D..VM..D..VD..D..V...D.....D..VF..D.Rich..D.................PE..L.....ab...........!.........0......W........................................ ......Er....@..........................-..H....-...........................).......I.. ...............................@...@...............l............................text............................... ..`.rdata...l.......n..................@..@.data....o...@...Z...&..............@....gfids..d...........................@..@.rsrc...............................@..@.reloc...I.......J..................@..B........................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):653232
                                                                Entropy (8bit):5.25211511018816
                                                                Encrypted:false
                                                                SSDEEP:12288:CMh6Hvxi+QyVQWCDeRRWaSS93xvqkhoHnJeI9u:2HvxiFyVQWCDeRkPS93xCkh2g
                                                                MD5:66B510D2C5FA5BCCF1062EDB55C7E957
                                                                SHA1:54073B7FE3FE8E3954623D14BAE7080251A9AD2D
                                                                SHA-256:9145177E4B4A4539E729176DCEBFD7E3BC2F49753DBBE428C7D93D77E0648979
                                                                SHA-512:C7A809976D5EE1FBDF6A82F4E55C77BB56B5FCE46DA35167A9BE45602F9F5F08692E9287346D7466FF2C5060A9EBBB9E080CA1ED8C4EBBB5018C92F919931396
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........dg.............m.......m.......m.......G.......[.......[.......[.......}..............N[......N[......K[..............N[......Rich............PE..d.....ab.........." ................H........................................@............`.............................................L.......................X8.......)... .......<...............................<...............................................text...:........................... ..`.rdata..............................@..@.data...@...........................@....pdata..X8.......:...z..............@..@.gfids..$...........................@..@.rsrc...............................@..@.reloc....... ......................@..B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2159536
                                                                Entropy (8bit):6.254542738408364
                                                                Encrypted:false
                                                                SSDEEP:49152:/UJRX/ser5Na+YpqBM1P2Cr6ehrPfYZaBXSa/5G:GrTaBPfY2XSa/I
                                                                MD5:7FBBDD31BA4CC5B2D0C230C5783274A7
                                                                SHA1:731D6CA422FEA64337D5EB52F6F5FABA9F4036A5
                                                                SHA-256:D7B991F054CD6CAB9A68EB692E4A1983DB87EF6A6B6EC95D3B9FCA553C063B70
                                                                SHA-512:721E2EE04676D3D1E7972FD6BEBFE8297A67FBF4A78A0924C2017C50CA66A131D33450F6118BBA0CC9A38B78A2A9E0C07BFA4C8372D0E2BF358C1BCDDE3CD3AF
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........R..<..<..<.Q.....<.Q...j.<.Q.....<...?..<...8..<...9..<.8}...<.8}...<.8}....<..=.z.<.r.5..<.r.<..<.w....<.r.>..<.Rich.<.................PE..d.....ab.........." .....L...................................................`!.....`.!...`.........................................P...........x.... !.x.... .d..... ..)...0!..!...;.......................;..(... ;...............p...............................text...\3.......4.................. ..`RT_CODE.4....P.......8.............. ..`.rdata...`...p...b...P..............@..@.data....;..........................@....pdata..d.... .....................@..@.gfids.. ..... ....... .............@..@.tls..........!....... .............@...RT_CONST......!....... .............@..@.rsrc...x.... !....... .............@..@.reloc...!...0!..".... .............@..B........................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2809776
                                                                Entropy (8bit):7.803245296293172
                                                                Encrypted:false
                                                                SSDEEP:49152:11stWYmRkasRDSlvxPRQWnYHKE6DPmVeiXSswDenby1xl7Puh0p3YrFh2hRPm/4l:1CYgDCJPiWnOaNJwGhRPL0V1APB
                                                                MD5:73284BAC5AE39DDC8A67EFFE040A3349
                                                                SHA1:C7253DA38CBD782822805B82AFB740712CFAA0EC
                                                                SHA-256:E0DD2F06DD96E8167168517CFB611456E3FBEA57A116916D4C4A1AA4D84D35CA
                                                                SHA-512:3AC7D8CD732D4E68CA9E27EA7BA0D242B3233415619C6E302D529FAAAD78017DDE9B4832A8EF4F68DB3E8301597464EC2678A8888F6E12A575B3F55208A9E1BC
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........*...D...D...D.Xb....D.Xb..u.D.Xb....D...A...D......D......D..G...D..@...D..A.h.D.{.E...D......D...E.y.D.{.M...D.~.....D.{.F...D.Rich..D.................PE..L.....ab..................... ......o.M...........@...........................S.......+...@...................................M.|.....O...............*..)....O.......N.....................p.(.......N.@............ *..............................text............................... ..`.rdata.............................@..@.data....R..........................@....gfids..@...........................@..@.giats..............................@..@.tls................................@....vmp0...[.!.. ......................`....vmp1.....&...(...&.................`....reloc........O......$&.............@..@.rsrc.........O......&&.............@..@................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):141744
                                                                Entropy (8bit):6.310466554679651
                                                                Encrypted:false
                                                                SSDEEP:3072:pYrytIQSxZ7F4rcDRExbMl2+b182m3opvAS3DdUZ3m0fSA2R:pY2Kz7FqcuJM8u182BBzdeW0f2R
                                                                MD5:EDDD2980547E2DD5694798E38BB1F7E3
                                                                SHA1:316FF3F4140BEB28ECC4152FA2F90D1D1C1C2C78
                                                                SHA-256:13C3EE12390F7A339C9CC6570B2480ED9537A703F6A9BBF21EF2D935FED0BA5C
                                                                SHA-512:6747B68A030BB44E6A347C2497A575801A1C4D32463886A6FD70E5BB3634C9B21B08BB9BB8F3F8386C3DE917EA880C4087ACF2E2CA925AE0A6696616AF695B41
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0...^...^...^..~....^..~....^..~....^...]...^...[...^...Z...^......^..._...^.'.W...^.".....^.'.\...^.Rich..^.................PE..d.....ab.........."......"...........,.........@.............................p.......)....`.....................................................P....P..P.......|........)...`..L...@...........................(...`................@...............................text...\!.......".................. ..`.rdata.......@.......&..............@..@.data...4...........................@....pdata..|...........................@..@.gfids.......0......................@..@.tls.........@......................@....rsrc...P....P......................@..@.reloc..L....`......................@..B................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):152496
                                                                Entropy (8bit):6.589764644303553
                                                                Encrypted:false
                                                                SSDEEP:3072:BfpNA68cNtveiWjPVbVja8VMjYzvM7kwCnV+HSm1eEmg2fS+:q68ezWjVBG8kYLMx8+yhg2H
                                                                MD5:E45BFFA942994D7921E37BCAA900740F
                                                                SHA1:E5258BC57166013C328EA4EC2CAB04196172B58A
                                                                SHA-256:5C9DB93EA5EEE603B10EC200CF92AB0CC86BF539C04DD343D94582A0DC607248
                                                                SHA-512:99E02E7CD7CB85DD6F825A6189035EB04823B200ED09FAE84D6504AF07ADD00169368913BCC9B9D5728241498675EB0D5903349794431EFBDA836E8FB2FBCE43
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1..P...P...P..".I..P..".K..P..".J..P.......P.......P.......P...(+..P...P...P.......P....G..P...P/..P.......P..Rich.P..........................PE..L.....ab.................h..........(I............@..................................;....@.....................................d....`..h............*...)...p..$...........................l...........@............................................text....g.......h.................. ..`.rdata...............l..............@..@.data........ ......................@....gfids.. ....@......................@..@.tls.........P......................@....rsrc...h....`......................@..@.reloc..$....p......................@..B........................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):203184
                                                                Entropy (8bit):6.628918274511852
                                                                Encrypted:false
                                                                SSDEEP:3072:wxqoWKbkzphHQb5pibQrvaWzO/0DPSBtwVfvy+8WbrPml33kn9ymsEZJmF21fSl:4qHNdQbLibQY/aPutAvyXE9z1ZkF6Y
                                                                MD5:674B5BE99C119416895FED6B4B54CD85
                                                                SHA1:856B482B7076CCF2FBE016970599A82108F084AB
                                                                SHA-256:EA40D34882B21D56CC9663B43065E127AC36E9A249164A7E1EFEB891F5F22B12
                                                                SHA-512:5EC42AB1B7A85D4C6AA1BDC7D1B8317A79CAF3621053239F0C8671FFF9F44117C663E6E63E107C24B00F6314E957D42D9EFB04CC788DF64879B2E65E0B12F766
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........-jt.~jt.~jt.~..D~ft.~..F~.t.~..G~rt.~..r~ht.~Q*...t.~Q*..yt.~Q*..At.~c.&~et.~jt.~.t.~.*..lt.~.*..kt.~.*J~kt.~.*..kt.~Richjt.~........PE..L.....ab.....................................0....@..........................P...........@.......................................... ..h................)...0..\.......................................@............0...............................text............................... ..`.rdata.......0......................@..@.data...............................@....gfids..$...........................@..@.tls................................@....rsrc...h.... ......................@..@.reloc..\....0......................@..B................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):4055
                                                                Entropy (8bit):7.947774952367895
                                                                Encrypted:false
                                                                SSDEEP:96:cuHmxvfZ4zvycZDIZSqAF03QC1VFz9Ore4Xx4Zl4SU5JpOwOA:cRxHZ4zjDIZFAaLVfyxCGSMJpr
                                                                MD5:3089E085B28661C439006E94C9FA6103
                                                                SHA1:A557D88969933DF3DBC5F9BE8B05D8322840C6B5
                                                                SHA-256:616295A5A4FC875BDB3AC4C05B0A782B2687C7FCB2638324FC70616912903819
                                                                SHA-512:D7E063EFDEBC1CA761A3A584C7CA851C71CCFA89D718FD3FDFF0975893A8110B16C3C3909E4D0BC8705FCE377A79B60414829EB19B6A24F4A73F0537DA44947D
                                                                Malicious:false
                                                                Preview:TAPDFV1.....0......0...*.H............0.............r..../...J..r.h....+/oXs2F'.U.....&.H.$..Ax8....?...f....kbm..L..>..Sc...k.}w.`.v.KJ.6..e...`..D..`.q...A...#:.&.....p...|...h....>.o..L./Q...........d......E.;W......A.6B.z...../w...Q..4.N.f..h....$+.s...h.N...%.*|T... 3c.....)L....-.`n/.>../.!........%...q.}q.O.)B2X.&..s4.".A.W......r....zX.o.S.`.^Y./. .=..Y..:..B..Jv.....093*|f.....$...0.r......u....A@.M....~...u!..."...p....aNn..K...~..]...c...l...\d..Xiu..qE9V.b.....iD.M....`..t6.'.u.a......R..;.......Gs..p.s\..Q.b.I...a...9P...N.l.o....}.....|.......+.ej.[a...e6.o.'.U[..cdA...l....t.R.......v...Qq.{a.S..B}.>.b<..7..h.....F.....T..$y.dT.._r.?.=..(...'.R"hYt...=......_p....}.e+...s.@...K.R>.....$z)..e.,u)....$.......EV.....M_.!...e,..R..ig|.n..x.~.D.:=d..Y......c*...l&...U....I.z.....:'............].>~..h...>V...5.........[.......yi'....t.,!.>G...n..$..H...K......nF"..$....uG....M..m...1.`/([W.7..>............D....T}.:....F.a.'?o<.dY.B.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1123424
                                                                Entropy (8bit):6.8590789183904795
                                                                Encrypted:false
                                                                SSDEEP:24576:9aP+O7H+M/0w2aGulCw87cZsAmMegOAt3ck:9aPb+M/bpwimMegB3D
                                                                MD5:D47D64E3EEAA388E4E944AF226756CF6
                                                                SHA1:F6A04D0B1C152EE0F7F5022C2405525286FE2F41
                                                                SHA-256:1DD842549904842BD3F72A8F3DDFB96E3674F1826265EB0627271143E9C4B1EB
                                                                SHA-512:0644C14AECD835FA05195B25262366818FF053D0210E74727CE83E7DBC6ECD5DC2F6F466A38C9498122B544A5B4252495F2F9E762094DA144FAEEB4ABDED3091
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$......................... ............3.......1...0....0.....3....0................3....3....3.3....[...3....Rich..........................PE..L......`...........!................~4....... ...............................P............@.............................8...............................`..............8...............................@............ ...............................text............................... ..`.rdata....... ......................@..@.data...x........x..................@....rsrc................R..............@..@.reloc...............^..............@..B................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):293472
                                                                Entropy (8bit):6.712886412345847
                                                                Encrypted:false
                                                                SSDEEP:6144:BnAsc2eGG1DZLVl2ewejQjkHLOSUiynC971ELz/E8QiufNBuCqOk:BrtG1DZLVl2ewJjkHiSV1bVVBjqOk
                                                                MD5:D9C75A5749132D77AE709C5EAE6FE9DD
                                                                SHA1:0142E7C95D4E5A691160D3330FDB626E196715A3
                                                                SHA-256:5A4A4AEBA559B86DB6D95EACC289AD27F84749E35CB51587D26355BF7732548A
                                                                SHA-512:56B4971ECD595F2198557204EEEAF05E465C31728E2DF776202199E28668C42344A7E0F52B191604B45EA0EBAA4FE050B97C7243A5F809A42C5E322F74326975
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Z.Z.Z.N...P.N.........H.....I.....n.N...O.N...J.....Y.Z......._...D.[.Z.,.[.....[.RichZ.................PE..L...y..`.....................h......I........ ....@.................................\@....@.................................4........ .. J...........^..`....p...%..h...p..............................@............ ...............................text...5........................... ..`.rdata....... ......................@..@.data...`%..........................@....rsrc... J... ...L..................@..@.reloc...%...p...&...8..............@..B........................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2488752
                                                                Entropy (8bit):7.467597033816071
                                                                Encrypted:false
                                                                SSDEEP:49152:E4ZRwT9AdAyECT11/3AOaPb+M/bpwimMegB3Dhv:xfwT9AdAydrfxaPb+M/1rZbhv
                                                                MD5:FEDE08587BCE8D2931BAECC55BF2D0C1
                                                                SHA1:F0E9A18993E3B19A94DE40A2CE77F991E9CAAC55
                                                                SHA-256:9508EEBBDBAE1FC2EB6A4D3D3CF7E12B4EA2CC05DF7F7219B259D5AFC2A7C8CC
                                                                SHA-512:382513CD2BB09EC9DE8A4D5B3E8BE55B8C6C0563754B5888C7EE4D443982B9B15C64A6F7A2565313E0F198B79E193842D8E79F710733DA18092C9EF2C262A9DC
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$......................... ............3.......1...0....0.....3....0................3....3....3.3....[...3....Rich..........................PE..L......`...........!................QG!...... ...............................P:.....2.&...@...........................!.5....g.......@:...............%..)....9..S..0.9.8....................:(.$...X.(.@............0!.|............................text............................... ..`.rdata....... ......................@..@.data...x...........................@....vmp0...............................`....vmp1..... ..0.... .................`....reloc...S....9..T...p%.............@..@.rsrc........@:.......%.............@..@................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):293472
                                                                Entropy (8bit):6.712886412345847
                                                                Encrypted:false
                                                                SSDEEP:6144:BnAsc2eGG1DZLVl2ewejQjkHLOSUiynC971ELz/E8QiufNBuCqOk:BrtG1DZLVl2ewJjkHiSV1bVVBjqOk
                                                                MD5:D9C75A5749132D77AE709C5EAE6FE9DD
                                                                SHA1:0142E7C95D4E5A691160D3330FDB626E196715A3
                                                                SHA-256:5A4A4AEBA559B86DB6D95EACC289AD27F84749E35CB51587D26355BF7732548A
                                                                SHA-512:56B4971ECD595F2198557204EEEAF05E465C31728E2DF776202199E28668C42344A7E0F52B191604B45EA0EBAA4FE050B97C7243A5F809A42C5E322F74326975
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Z.Z.Z.N...P.N.........H.....I.....n.N...O.N...J.....Y.Z......._...D.[.Z.,.[.....[.RichZ.................PE..L...y..`.....................h......I........ ....@.................................\@....@.................................4........ .. J...........^..`....p...%..h...p..............................@............ ...............................text...5........................... ..`.rdata....... ......................@..@.data...`%..........................@....rsrc... J... ...L..................@..@.reloc...%...p...&...8..............@..B........................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2809776
                                                                Entropy (8bit):7.803245296293172
                                                                Encrypted:false
                                                                SSDEEP:49152:11stWYmRkasRDSlvxPRQWnYHKE6DPmVeiXSswDenby1xl7Puh0p3YrFh2hRPm/4l:1CYgDCJPiWnOaNJwGhRPL0V1APB
                                                                MD5:73284BAC5AE39DDC8A67EFFE040A3349
                                                                SHA1:C7253DA38CBD782822805B82AFB740712CFAA0EC
                                                                SHA-256:E0DD2F06DD96E8167168517CFB611456E3FBEA57A116916D4C4A1AA4D84D35CA
                                                                SHA-512:3AC7D8CD732D4E68CA9E27EA7BA0D242B3233415619C6E302D529FAAAD78017DDE9B4832A8EF4F68DB3E8301597464EC2678A8888F6E12A575B3F55208A9E1BC
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........*...D...D...D.Xb....D.Xb..u.D.Xb....D...A...D......D......D..G...D..@...D..A.h.D.{.E...D......D...E.y.D.{.M...D.~.....D.{.F...D.Rich..D.................PE..L.....ab..................... ......o.M...........@...........................S.......+...@...................................M.|.....O...............*..)....O.......N.....................p.(.......N.@............ *..............................text............................... ..`.rdata.............................@..@.data....R..........................@....gfids..@...........................@..@.giats..............................@..@.tls................................@....vmp0...[.!.. ......................`....vmp1.....&...(...&.................`....reloc........O......$&.............@..@.rsrc.........O......&&.............@..@................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2159536
                                                                Entropy (8bit):6.254542738408364
                                                                Encrypted:false
                                                                SSDEEP:49152:/UJRX/ser5Na+YpqBM1P2Cr6ehrPfYZaBXSa/5G:GrTaBPfY2XSa/I
                                                                MD5:7FBBDD31BA4CC5B2D0C230C5783274A7
                                                                SHA1:731D6CA422FEA64337D5EB52F6F5FABA9F4036A5
                                                                SHA-256:D7B991F054CD6CAB9A68EB692E4A1983DB87EF6A6B6EC95D3B9FCA553C063B70
                                                                SHA-512:721E2EE04676D3D1E7972FD6BEBFE8297A67FBF4A78A0924C2017C50CA66A131D33450F6118BBA0CC9A38B78A2A9E0C07BFA4C8372D0E2BF358C1BCDDE3CD3AF
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........R..<..<..<.Q.....<.Q...j.<.Q.....<...?..<...8..<...9..<.8}...<.8}...<.8}....<..=.z.<.r.5..<.r.<..<.w....<.r.>..<.Rich.<.................PE..d.....ab.........." .....L...................................................`!.....`.!...`.........................................P...........x.... !.x.... .d..... ..)...0!..!...;.......................;..(... ;...............p...............................text...\3.......4.................. ..`RT_CODE.4....P.......8.............. ..`.rdata...`...p...b...P..............@..@.data....;..........................@....pdata..d.... .....................@..@.gfids.. ..... ....... .............@..@.tls..........!....... .............@...RT_CONST......!....... .............@..@.rsrc...x.... !....... .............@..@.reloc...!...0!..".... .............@..B........................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1481648
                                                                Entropy (8bit):6.478030464508085
                                                                Encrypted:false
                                                                SSDEEP:24576:9tdAm9DUi/CR3wCkCiRgoG7hBaHkbEXXeG/jFt52ZTx9MjiQ:zqTytRFk6ek12fI
                                                                MD5:A5E43FF07BF378503CF45D6EE7778021
                                                                SHA1:EF988979192938D07C4DD146FB749ED32C8F5568
                                                                SHA-256:48CC8C44E665CC3A24A1EF0807BCD87BDCC0AD9FF179C8D5C96924EBA48888F2
                                                                SHA-512:E039F2834F9ADA5BF4E0F6EA0C94C9213C433785B99D31B2C288EA29732672A60D9F213FFB4CF47403BB696E19884F18840F1C00ED3861EA7D0FE0E6028126B5
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......W.....................t......l........ ....@..........................@............@......@..............................@8...0...............r...)................................... .......................................................text............................... ..`.itext.............................. ..`.data...h0... ...2..................@....bss.....a...`.......0...................idata..@8.......:...0..............@....tls....<............j...................rdata....... .......j..............@..@.rsrc........0.......l..............@..@....................................@..@........................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):208816
                                                                Entropy (8bit):6.646069643453431
                                                                Encrypted:false
                                                                SSDEEP:6144:gwOh40q7GA3GjisAO70m3nIx0IjvaDvvD:K4d77mVSxBjvaDv7
                                                                MD5:18CC066A5DAF36920CEA0094FAD8EE2F
                                                                SHA1:624A394DDEF12E8CE588626DF20199565CCF1715
                                                                SHA-256:B7EFD8423A3DAF6CE666AB52BCE1205D703069387678686849AC7E93AED061F6
                                                                SHA-512:26715F812B36D0783017579C2D0A47171AEFB533B75193D87870DBA6273718100AAE966F653FA7353207078363D4E12CD35D81C1CF08878C992A9DA60330B420
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............y..y..y.U....y.U...d.y.U.....y...z...y...|..y...}...y.<c...y..x.h.y.v.p..y.v.y...y.s....y......y.v.{...y.Rich.y.................PE..L.....ab...........!.........L......,........................................p............@.............................T............0..8................)...@..."......................................@............................................text............................... ..`.rdata..............................@..@.data...............................@....gfids..D...........................@..@.tls......... ......................@....rsrc...8....0......................@..@.reloc..."...@...$..................@..B........................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):152496
                                                                Entropy (8bit):6.589764644303553
                                                                Encrypted:false
                                                                SSDEEP:3072:BfpNA68cNtveiWjPVbVja8VMjYzvM7kwCnV+HSm1eEmg2fS+:q68ezWjVBG8kYLMx8+yhg2H
                                                                MD5:E45BFFA942994D7921E37BCAA900740F
                                                                SHA1:E5258BC57166013C328EA4EC2CAB04196172B58A
                                                                SHA-256:5C9DB93EA5EEE603B10EC200CF92AB0CC86BF539C04DD343D94582A0DC607248
                                                                SHA-512:99E02E7CD7CB85DD6F825A6189035EB04823B200ED09FAE84D6504AF07ADD00169368913BCC9B9D5728241498675EB0D5903349794431EFBDA836E8FB2FBCE43
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1..P...P...P..".I..P..".K..P..".J..P.......P.......P.......P...(+..P...P...P.......P....G..P...P/..P.......P..Rich.P..........................PE..L.....ab.................h..........(I............@..................................;....@.....................................d....`..h............*...)...p..$...........................l...........@............................................text....g.......h.................. ..`.rdata...............l..............@..@.data........ ......................@....gfids.. ....@......................@..@.tls.........P......................@....rsrc...h....`......................@..@.reloc..$....p......................@..B........................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):588720
                                                                Entropy (8bit):5.6097958863819475
                                                                Encrypted:false
                                                                SSDEEP:12288:GQEMpHTqsxDaFFUf7Pzq05/M64p0g0YHn8gtgPQ9:FBTqsxDZf7PzqUEtP9
                                                                MD5:B2DFC74F0C0ED8C1B949C545315F309B
                                                                SHA1:E96D97EEA104E68EAAB215BAF08D80D5CD9084FD
                                                                SHA-256:D17B8A74494E9E9A2FEF7F469B7E78E8E4BBBAB5CA5F6723DA64116B346A54D0
                                                                SHA-512:B239AE5EDDBEAFCB73B1C1677FA9C49361ED6410C12E92FECB1A7CA891ADAA4E985145774FC0EFB87E78726ABD890FE01BA12721CBC28D9692B0902EC5DE6B35
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i*...D..D..D.-....D.-.....D.-....D......D.VG..D.V@..D.VA..D.p...D..E.P.D..VM..D..VD..D..V...D.....D..VF..D.Rich..D.................PE..L.....ab...........!.........0......W........................................ ......Er....@..........................-..H....-...........................).......I.. ...............................@...@...............l............................text............................... ..`.rdata...l.......n..................@..@.data....o...@...Z...&..............@....gfids..d...........................@..@.rsrc...............................@..@.reloc...I.......J..................@..B........................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):4055
                                                                Entropy (8bit):7.947774952367895
                                                                Encrypted:false
                                                                SSDEEP:96:cuHmxvfZ4zvycZDIZSqAF03QC1VFz9Ore4Xx4Zl4SU5JpOwOA:cRxHZ4zjDIZFAaLVfyxCGSMJpr
                                                                MD5:3089E085B28661C439006E94C9FA6103
                                                                SHA1:A557D88969933DF3DBC5F9BE8B05D8322840C6B5
                                                                SHA-256:616295A5A4FC875BDB3AC4C05B0A782B2687C7FCB2638324FC70616912903819
                                                                SHA-512:D7E063EFDEBC1CA761A3A584C7CA851C71CCFA89D718FD3FDFF0975893A8110B16C3C3909E4D0BC8705FCE377A79B60414829EB19B6A24F4A73F0537DA44947D
                                                                Malicious:false
                                                                Preview:TAPDFV1.....0......0...*.H............0.............r..../...J..r.h....+/oXs2F'.U.....&.H.$..Ax8....?...f....kbm..L..>..Sc...k.}w.`.v.KJ.6..e...`..D..`.q...A...#:.&.....p...|...h....>.o..L./Q...........d......E.;W......A.6B.z...../w...Q..4.N.f..h....$+.s...h.N...%.*|T... 3c.....)L....-.`n/.>../.!........%...q.}q.O.)B2X.&..s4.".A.W......r....zX.o.S.`.^Y./. .=..Y..:..B..Jv.....093*|f.....$...0.r......u....A@.M....~...u!..."...p....aNn..K...~..]...c...l...\d..Xiu..qE9V.b.....iD.M....`..t6.'.u.a......R..;.......Gs..p.s\..Q.b.I...a...9P...N.l.o....}.....|.......+.ej.[a...e6.o.'.U[..cdA...l....t.R.......v...Qq.{a.S..B}.>.b<..7..h.....F.....T..$y.dT.._r.?.=..(...'.R"hYt...=......_p....}.e+...s.@...K.R>.....$z)..e.,u)....$.......EV.....M_.!...e,..R..ig|.n..x.~.D.:=d..Y......c*...l&...U....I.z.....:'............].>~..h...>V...5.........[.......yi'....t.,!.>G...n..$..H...K......nF"..$....uG....M..m...1.`/([W.7..>............D....T}.:....F.a.'?o<.dY.B.
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):203184
                                                                Entropy (8bit):6.628918274511852
                                                                Encrypted:false
                                                                SSDEEP:3072:wxqoWKbkzphHQb5pibQrvaWzO/0DPSBtwVfvy+8WbrPml33kn9ymsEZJmF21fSl:4qHNdQbLibQY/aPutAvyXE9z1ZkF6Y
                                                                MD5:674B5BE99C119416895FED6B4B54CD85
                                                                SHA1:856B482B7076CCF2FBE016970599A82108F084AB
                                                                SHA-256:EA40D34882B21D56CC9663B43065E127AC36E9A249164A7E1EFEB891F5F22B12
                                                                SHA-512:5EC42AB1B7A85D4C6AA1BDC7D1B8317A79CAF3621053239F0C8671FFF9F44117C663E6E63E107C24B00F6314E957D42D9EFB04CC788DF64879B2E65E0B12F766
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........-jt.~jt.~jt.~..D~ft.~..F~.t.~..G~rt.~..r~ht.~Q*...t.~Q*..yt.~Q*..At.~c.&~et.~jt.~.t.~.*..lt.~.*..kt.~.*J~kt.~.*..kt.~Richjt.~........PE..L.....ab.....................................0....@..........................P...........@.......................................... ..h................)...0..\.......................................@............0...............................text............................... ..`.rdata.......0......................@..@.data...............................@....gfids..$...........................@..@.tls................................@....rsrc...h.... ......................@..@.reloc..\....0......................@..B................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):317360
                                                                Entropy (8bit):6.3189859386488685
                                                                Encrypted:false
                                                                SSDEEP:6144:9c68TAPyuUPg3wi/UxynB5wnFcTCb2lUKMAQoh2vKydBZqNHZG:98TAausg3wYCSlEo8N0s
                                                                MD5:C69917647354E03FFEA016B86D3BC973
                                                                SHA1:E6385500AAEB50F3E2C36D7FC23789DFBAFBE802
                                                                SHA-256:5B273FC8597B541AD86D3650362BCBAA592CED0163D56499BADD344306CB99ED
                                                                SHA-512:DAF7E027EFF292AD39E93EC8E0BB0AF2437DE3546E1E8431A80C752FDEB1D57D2F477D45FB736B22A321B3CC4DA02B8F0E3C1F5C106CB4D4112ADC65ED0167A0
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Z..4T.4T.4T^,.T.4T^,.Td.4T^,.T.4T..7U.4T..1U.4T..0U.4T..T.4T.5T..4T}.=U.4T}.4U.4Tx..T.4T.T.4T}.6U.4TRich.4T................PE..d.....ab.........." ................................................................2.....`......................................... _..h...._..P.......8........+.......)......X...................................0................................................text............................... ..`.rdata...i.......j..................@..@.data....(...p.......Z..............@....pdata...+.......,...j..............@..@.gfids..............................@..@.rsrc...8...........................@..@.reloc..X...........................@..B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):653232
                                                                Entropy (8bit):5.25211511018816
                                                                Encrypted:false
                                                                SSDEEP:12288:CMh6Hvxi+QyVQWCDeRRWaSS93xvqkhoHnJeI9u:2HvxiFyVQWCDeRkPS93xCkh2g
                                                                MD5:66B510D2C5FA5BCCF1062EDB55C7E957
                                                                SHA1:54073B7FE3FE8E3954623D14BAE7080251A9AD2D
                                                                SHA-256:9145177E4B4A4539E729176DCEBFD7E3BC2F49753DBBE428C7D93D77E0648979
                                                                SHA-512:C7A809976D5EE1FBDF6A82F4E55C77BB56B5FCE46DA35167A9BE45602F9F5F08692E9287346D7466FF2C5060A9EBBB9E080CA1ED8C4EBBB5018C92F919931396
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........dg.............m.......m.......m.......G.......[.......[.......[.......}..............N[......N[......K[..............N[......Rich............PE..d.....ab.........." ................H........................................@............`.............................................L.......................X8.......)... .......<...............................<...............................................text...:........................... ..`.rdata..............................@..@.data...@...........................@....pdata..X8.......:...z..............@..@.gfids..$...........................@..@.rsrc...............................@..@.reloc....... ......................@..B........................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):141744
                                                                Entropy (8bit):6.310466554679651
                                                                Encrypted:false
                                                                SSDEEP:3072:pYrytIQSxZ7F4rcDRExbMl2+b182m3opvAS3DdUZ3m0fSA2R:pY2Kz7FqcuJM8u182BBzdeW0f2R
                                                                MD5:EDDD2980547E2DD5694798E38BB1F7E3
                                                                SHA1:316FF3F4140BEB28ECC4152FA2F90D1D1C1C2C78
                                                                SHA-256:13C3EE12390F7A339C9CC6570B2480ED9537A703F6A9BBF21EF2D935FED0BA5C
                                                                SHA-512:6747B68A030BB44E6A347C2497A575801A1C4D32463886A6FD70E5BB3634C9B21B08BB9BB8F3F8386C3DE917EA880C4087ACF2E2CA925AE0A6696616AF695B41
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0...^...^...^..~....^..~....^..~....^...]...^...[...^...Z...^......^..._...^.'.W...^.".....^.'.\...^.Rich..^.................PE..d.....ab.........."......"...........,.........@.............................p.......)....`.....................................................P....P..P.......|........)...`..L...@...........................(...`................@...............................text...\!.......".................. ..`.rdata.......@.......&..............@..@.data...4...........................@....pdata..|...........................@..@.gfids.......0......................@..@.tls.........@......................@....rsrc...P....P......................@..@.reloc..L....`......................@..B................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1123424
                                                                Entropy (8bit):6.8590789183904795
                                                                Encrypted:false
                                                                SSDEEP:24576:9aP+O7H+M/0w2aGulCw87cZsAmMegOAt3ck:9aPb+M/bpwimMegB3D
                                                                MD5:D47D64E3EEAA388E4E944AF226756CF6
                                                                SHA1:F6A04D0B1C152EE0F7F5022C2405525286FE2F41
                                                                SHA-256:1DD842549904842BD3F72A8F3DDFB96E3674F1826265EB0627271143E9C4B1EB
                                                                SHA-512:0644C14AECD835FA05195B25262366818FF053D0210E74727CE83E7DBC6ECD5DC2F6F466A38C9498122B544A5B4252495F2F9E762094DA144FAEEB4ABDED3091
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$......................... ............3.......1...0....0.....3....0................3....3....3.3....[...3....Rich..........................PE..L......`...........!................~4....... ...............................P............@.............................8...............................`..............8...............................@............ ...............................text............................... ..`.rdata....... ......................@..@.data...x........x..................@....rsrc................R..............@..@.reloc...............^..............@..B................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):260528
                                                                Entropy (8bit):6.697233046928663
                                                                Encrypted:false
                                                                SSDEEP:3072:nD+1kCmZf1p43zi/wFOVoO0bSiZOkfGwLHpB2L0tjb1vpoLBl9Ag0Fubr4Vsk8TY:nD+1BmVui/Q8oeaHX2Atp+AO4i1Tnp+f
                                                                MD5:862CA43FD8CCEA3E00A41E177CAA957B
                                                                SHA1:8888EBBFCC1462A4F253217DB1A112AF2699F6E2
                                                                SHA-256:BB2F0854892FAE554C6C999FAD1DDDD53A8204FFBE4AC9103001D5E2DE106AFD
                                                                SHA-512:02034C39190E7DD8A05E44AC2E394C7E298C5BD509B01C862A8ABDF7B09826C9163DA672CE914CD990B257770B66BDA40113CCD06908169B6CE13A9A985BFEC9
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......f..]".y.".y.".y..Y....y..Y....y..Y..?.y...z.5.y...|...y...}...y.+...+.y.".x.T.y...p.!.y...y.#.y.....#.y."...#.y...{.#.y.Rich".y.........................PE..L.....ab...........!.........>.......................................................}....@.............................h.......P.......8................).......&..@t..............................`t..@...............l............................text............................... ..`.rdata..p...........................@..@.data...............................@....gfids..P...........................@..@.rsrc...8...........................@..@.reloc...&.......(..................@..B........................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):2488752
                                                                Entropy (8bit):7.467597033816071
                                                                Encrypted:false
                                                                SSDEEP:49152:E4ZRwT9AdAyECT11/3AOaPb+M/bpwimMegB3Dhv:xfwT9AdAydrfxaPb+M/1rZbhv
                                                                MD5:FEDE08587BCE8D2931BAECC55BF2D0C1
                                                                SHA1:F0E9A18993E3B19A94DE40A2CE77F991E9CAAC55
                                                                SHA-256:9508EEBBDBAE1FC2EB6A4D3D3CF7E12B4EA2CC05DF7F7219B259D5AFC2A7C8CC
                                                                SHA-512:382513CD2BB09EC9DE8A4D5B3E8BE55B8C6C0563754B5888C7EE4D443982B9B15C64A6F7A2565313E0F198B79E193842D8E79F710733DA18092C9EF2C262A9DC
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$......................... ............3.......1...0....0.....3....0................3....3....3.3....[...3....Rich..........................PE..L......`...........!................QG!...... ...............................P:.....2.&...@...........................!.5....g.......@:...............%..)....9..S..0.9.8....................:(.$...X.(.@............0!.|............................text............................... ..`.rdata....... ......................@..@.data...x...........................@....vmp0...............................`....vmp1..... ..0.... .................`....reloc...S....9..T...p%.............@..@.rsrc........@:.......%.............@..@................................................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:InnoSetup Log Letasoft Sound Booster {6C6CF38B-11DD-45C6-A15E-A3A0C4CE60F8}, version 0x418, 19535 bytes, 965969\37\user\376, C:\Program Files (x86)\Letasoft Sound Boos
                                                                Category:dropped
                                                                Size (bytes):19535
                                                                Entropy (8bit):4.171403780737048
                                                                Encrypted:false
                                                                SSDEEP:384:Y5+hkMI/MQeOB/1MZbqcwbPIx0pX8gg6lDekH3:YQfI/pey+bhwbhj
                                                                MD5:39009047ADEFE68323DE6F7ADD450880
                                                                SHA1:F09AC14AED574C6EEEE946E78B790A8CBCC74F09
                                                                SHA-256:49F52F30EF4591F0313DCD66570B7959D0291BAA274605CBDEE15DBCE41B1D86
                                                                SHA-512:04332BA0A0948701845251C24855227C2129A38666117C4EF30357342ABC7224A34E9F23FB5C4065D05C55439BF70E318BE8C18515F1642F6DF59BCF390C8375
                                                                Malicious:false
                                                                Preview:Inno Setup Uninstall Log (b)....................................{6C6CF38B-11DD-45C6-A15E-A3A0C4CE60F8}..........................................................................................Letasoft Sound Booster..............................................................................................................:...OL..%...............................................................................................................:..........1..................9.6.5.9.6.9......j.o.n.e.s......C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.e.t.a.s.o.f.t. .S.o.u.n.d. .B.o.o.s.t.e.r....................... ......+.......IFPS....#...(...........................................................................................................................................................BOOLEAN..................................................TWINDOWSVERSION..........................(................TEXECWAIT.........TSETUPSTEP.........TUNINSTALLSTEP.................!MAIN....-1....
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1481648
                                                                Entropy (8bit):6.478030464508085
                                                                Encrypted:false
                                                                SSDEEP:24576:9tdAm9DUi/CR3wCkCiRgoG7hBaHkbEXXeG/jFt52ZTx9MjiQ:zqTytRFk6ek12fI
                                                                MD5:A5E43FF07BF378503CF45D6EE7778021
                                                                SHA1:EF988979192938D07C4DD146FB749ED32C8F5568
                                                                SHA-256:48CC8C44E665CC3A24A1EF0807BCD87BDCC0AD9FF179C8D5C96924EBA48888F2
                                                                SHA-512:E039F2834F9ADA5BF4E0F6EA0C94C9213C433785B99D31B2C288EA29732672A60D9F213FFB4CF47403BB696E19884F18840F1C00ED3861EA7D0FE0E6028126B5
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......W.....................t......l........ ....@..........................@............@......@..............................@8...0...............r...)................................... .......................................................text............................... ..`.itext.............................. ..`.data...h0... ...2..................@....bss.....a...`.......0...................idata..@8.......:...0..............@....tls....<............j...................rdata....... .......j..............@..@.rsrc........0.......l..............@..@....................................@..@........................................................................................................................................
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:InnoSetup messages, version 5.5.3, 221 messages (UTF-16), &About Setup...
                                                                Category:dropped
                                                                Size (bytes):22709
                                                                Entropy (8bit):3.2704486925356004
                                                                Encrypted:false
                                                                SSDEEP:192:Q41EjXgkg3Sqf8sfr69FT0AKanzLYfMa1tzvL7Vzo+Fc51USQDztXfbKJUfvo:Q41Elvqf9r6fKVfMmRo+y1USQDztP3o
                                                                MD5:79173DA528082489A43F39CF200A7647
                                                                SHA1:AA253B477CE2BF9D886D07694CD5DDB7C7FE9EEC
                                                                SHA-256:4F36E6BE09CD12E825C2A12AB33544744E7256C9094D7149258EA926705E8FFD
                                                                SHA-512:C46EB9DD3D03A993FDC4F65AE2751ECFDCB1FB6E1FB69A119105FD40290CE5EC4427B04F813EED47415390689943D05B5432D4571B1ACA0CE37EE52391790D18
                                                                Malicious:false
                                                                Preview:Inno Setup Messages (5.5.3) (u).....................................hX..........&.A.b.o.u.t. .S.e.t.u.p.........%.1. .v.e.r.s.i.o.n. .%.2.....%.3.........%.1. .h.o.m.e. .p.a.g.e.:.....%.4.....A.b.o.u.t. .S.e.t.u.p...Y.o.u. .m.u.s.t. .b.e. .l.o.g.g.e.d. .i.n. .a.s. .a.n. .a.d.m.i.n.i.s.t.r.a.t.o.r. .w.h.e.n. .i.n.s.t.a.l.l.i.n.g. .t.h.i.s. .p.r.o.g.r.a.m.....T.h.e. .f.o.l.l.o.w.i.n.g. .a.p.p.l.i.c.a.t.i.o.n.s. .a.r.e. .u.s.i.n.g. .f.i.l.e.s. .t.h.a.t. .n.e.e.d. .t.o. .b.e. .u.p.d.a.t.e.d. .b.y. .S.e.t.u.p... .I.t. .i.s. .r.e.c.o.m.m.e.n.d.e.d. .t.h.a.t. .y.o.u. .a.l.l.o.w. .S.e.t.u.p. .t.o. .a.u.t.o.m.a.t.i.c.a.l.l.y. .c.l.o.s.e. .t.h.e.s.e. .a.p.p.l.i.c.a.t.i.o.n.s.....T.h.e. .f.o.l.l.o.w.i.n.g. .a.p.p.l.i.c.a.t.i.o.n.s. .a.r.e. .u.s.i.n.g. .f.i.l.e.s. .t.h.a.t. .n.e.e.d. .t.o. .b.e. .u.p.d.a.t.e.d. .b.y. .S.e.t.u.p... .I.t. .i.s. .r.e.c.o.m.m.e.n.d.e.d. .t.h.a.t. .y.o.u. .a.l.l.o.w. .S.e.t.u.p. .t.o. .a.u.t.o.m.a.t.i.c.a.l.l.y. .c.l.o.s.e. .t.h.e.s.e. .a.p.p.l.i.c.a.t.i.o.n.s... .A.f.
                                                                Process:C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):51
                                                                Entropy (8bit):4.391974971210587
                                                                Encrypted:false
                                                                SSDEEP:3:Qp9lrjP5LnJllllCbN:Y9ln5LnwJ
                                                                MD5:CCEF2C4D1C5615305D81C8FB68655165
                                                                SHA1:2B61831C8C244291B6E8DEC397FEF4B37FE9B01F
                                                                SHA-256:B7596AF0DB7ECC123D3115ECC8A4362E8E588EAC8FE279B343594B59777FC9C1
                                                                SHA-512:F7052FF19B4B79EF67A9DC4F2DE8ECDC0436141FED3081D98632321C4126A59ADEAF342691972D70A0BDDA0E700447634C5F9044EE86485CC049B8B9F61E1E9A
                                                                Malicious:false
                                                                Preview:TATFV1.........A.2."r2..................!........
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):11789
                                                                Entropy (8bit):5.04180614171052
                                                                Encrypted:false
                                                                SSDEEP:96:kPoo04uStArwTzOigT6AKPGs3CkfTHvHtqDTtttVlC:q3uYtTzOig+AKPGpMSRttVlC
                                                                MD5:7DB4DA641FB9C75071C7414CA1D36951
                                                                SHA1:1B1456D17887D5ADDF95CD5614758671AD1FE2D3
                                                                SHA-256:CC5F4197A9AB554640B94703C1B52D8072BE2C034C8DC1A43D9D86C1D8F7BD29
                                                                SHA-512:20F98622BEA5127216F4F91B46F1079D3E883C2C5D4DB7CE322687D491494A8739E3F47BF0146BF53F6A8DC8F5ECFC4D878E806DBB358FFDEA3C95CD2B94EB31
                                                                Malicious:false
                                                                Preview:.2024-04-25 21:28:53.077 Log opened. (Time zone: UTC+02:00)..2024-04-25 21:28:53.077 Setup version: Inno Setup version 5.5.9 (u)..2024-04-25 21:28:53.077 Original Setup EXE: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe..2024-04-25 21:28:53.077 Setup command line: /SL5="$20446,6484768,412160,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe" ..2024-04-25 21:28:53.077 Windows version: 10.0.19045 (NT platform: Yes)..2024-04-25 21:28:53.077 64-bit Windows: Yes..2024-04-25 21:28:53.077 Processor architecture: x64..2024-04-25 21:28:53.077 User privileges: Administrative..2024-04-25 21:28:53.140 64-bit install mode: No..2024-04-25 21:28:57.296 Created temporary directory: C:\Users\user\AppData\Local\Temp\is-RARHB.tmp..2024-04-25 21:29:28.687 Starting the installation process...2024-04-25 21:29:28.702 Creating directory: C:\Program Files (x86)\Letasoft Sound Booster..2024-04-25 21:29:28.702 Creating director
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Archive, ctime=Thu Apr 25 18:29:30 2024, mtime=Thu Apr 25 18:29:30 2024, atime=Thu Apr 21 12:35:52 2022, length=203184, window=hide
                                                                Category:dropped
                                                                Size (bytes):1363
                                                                Entropy (8bit):4.645385723676603
                                                                Encrypted:false
                                                                SSDEEP:24:8gPEXdOEPf208RloUAoedvO4lQdvGUU0bTzPUqyFm:8gsXdOkfgRl8oednlQdnbhyF
                                                                MD5:8B1C8983F34C4EFBC62192CEE554A1C1
                                                                SHA1:67DFE43C75AE0A87F1030316EAE16D4F6CF409AB
                                                                SHA-256:44C67C26518106A4943AA307ABE7B846250227D770394AB12A175D92F68F83EB
                                                                SHA-512:B76E13758DB1F84D04A170FFF6013CABD55B84529036C5CADFBD4F8E5C7C60C0524ECE806ACD8A8ED0629ED4C5B79F333867806595DCBAFDCF53EFB6AC8A82AB
                                                                Malicious:false
                                                                Preview:L..................F.... ...9...F...k...F....,...U...............................P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V.....y...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....v.1......X....LETASO~1..^......X...X............................@ .L.e.t.a.s.o.f.t. .S.o.u.n.d. .B.o.o.s.t.e.r.....~.2......Tzl .SOUNDB~2.EXE..b......X...X......?.........................S.o.u.n.d.B.o.o.s.t.e.r.T.a.s.k.H.o.s.t...e.x.e.......u...............-.......t...................C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe..U.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.e.t.a.s.o.f.t. .S.o.u.n.d. .B.o.o.s.t.e.r.\.S.o.u.n.d.B.o.o.s.t.e.r.T.a.s.k.H.o.s.t...e.x.e.-.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.e.t.a.s.o.f.t. .S.o.u.n.d. .B.o.o.s.t.e.r...-.C.r.e.a.t.e.R.e.p.o.r.t.........*................@Z|...K.J.........`.......X.......965969....
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 18:29:28 2024, mtime=Thu Apr 25 18:29:29 2024, atime=Thu Apr 21 12:35:32 2022, length=2809776, window=hide
                                                                Category:dropped
                                                                Size (bytes):1295
                                                                Entropy (8bit):4.655732613724393
                                                                Encrypted:false
                                                                SSDEEP:24:8mk2SxMHEl0dOEPf202q4KfxJl3UAgwMdvO4lddvAUU0bzzPUqyFm:8mkdx1l0dOkfsWxJl3jgwMdnldddbhyF
                                                                MD5:84321B17AEA9560FAC3F69FD7AD3C051
                                                                SHA1:28C79596B52D4AD02F1604E0494A54F36949CC74
                                                                SHA-256:6D23C5D805E2DDD792F60FF56390D744C9CDAD1C4841D8C90ECC4FB767E5DC64
                                                                SHA-512:4210DF2C4D8CEDC2FFB2AAB53B75C90B2EDB4F71DDB8CF5CCBBE754CB61900EBBD5EB96AD64019A442CCC52DAA0E7DB6B92464DA3D68B3682DD1E9827D1A5B5D
                                                                Malicious:false
                                                                Preview:L..................F.... .......F.......F....j+..U....*..........................P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V.....v9..P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....v.1......X....LETASO~1..^......X...X............................@ .L.e.t.a.s.o.f.t. .S.o.u.n.d. .B.o.o.s.t.e.r.....n.2...*..Tpl .SOUNDB~1.EXE..R......X...X......y.........................S.o.u.n.d.B.o.o.s.t.e.r...e.x.e.......m...............-.......l...................C:\Program Files (x86)\Letasoft Sound Booster\SoundBooster.exe..M.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.e.t.a.s.o.f.t. .S.o.u.n.d. .B.o.o.s.t.e.r.\.S.o.u.n.d.B.o.o.s.t.e.r...e.x.e.-.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.e.t.a.s.o.f.t. .S.o.u.n.d. .B.o.o.s.t.e.r.........*................@Z|...K.J.........`.......X.......965969...........hT..CrF.f4... ...T..b...,.......hT..CrF.f4... ...T..b...,....
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 18:29:28 2024, mtime=Thu Apr 25 18:29:30 2024, atime=Thu Apr 21 12:35:32 2022, length=2809776, window=hide
                                                                Category:dropped
                                                                Size (bytes):1198
                                                                Entropy (8bit):4.672478715620797
                                                                Encrypted:false
                                                                SSDEEP:24:8mkYxPEXdOEPf202q4KfxJl3UAgcdvO4lddvAUU0bPqyFm:8mkYxsXdOkfsWxJl3jgcdnldddayF
                                                                MD5:30E2D9D4B0B3E028A69C5290F0E23747
                                                                SHA1:04FF77F018A43019F7FE55EE0771592A2C62D791
                                                                SHA-256:0235B9CAD44089C6BB4EA2380359619D64E4BE3BA4F9D76547CB5252433ADB02
                                                                SHA-512:31021586EE6472EEFEEFC436A425731A2E263489F81545F6EC7FAE73CF95BDD26614E3DE20C24401903FEB69218B6944244733823B1D27F43A5FCD57699E97A5
                                                                Malicious:false
                                                                Preview:L..................F.... .......F...*...F....j+..U....*..........................P.O. .:i.....+00.../C:\.....................1......X....PROGRA~2.........O.I.X......................V.....y...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....v.1......X....LETASO~1..^......X...X............................@ .L.e.t.a.s.o.f.t. .S.o.u.n.d. .B.o.o.s.t.e.r.....n.2...*..Tpl .SOUNDB~1.EXE..R......X...X......y.........................S.o.u.n.d.B.o.o.s.t.e.r...e.x.e.......m...............-.......l...................C:\Program Files (x86)\Letasoft Sound Booster\SoundBooster.exe..D.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.e.t.a.s.o.f.t. .S.o.u.n.d. .B.o.o.s.t.e.r.\.S.o.u.n.d.B.o.o.s.t.e.r...e.x.e.-.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.L.e.t.a.s.o.f.t. .S.o.u.n.d. .B.o.o.s.t.e.r.........*................@Z|...K.J.........`.......X.......965969...........hT..CrF.f4... ...T..b...,.......hT..CrF.f4... ...T..b...,..................1SPS
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):11949
                                                                Entropy (8bit):5.04220027258965
                                                                Encrypted:false
                                                                SSDEEP:96:kPoo04uStArwTzOigT6AKPGs3CkfTHvHtqDTtttVl3:q3uYtTzOig+AKPGpMSRttVl3
                                                                MD5:1309B2F7FE6DADB906F93F704689CFE0
                                                                SHA1:6A26BF37D322C5FE7350D77ECC075EC317E82E8C
                                                                SHA-256:6EC16578B5B61A318788AF75FE64F2A1C81ADD0A77B1868F375F2BB17FA83145
                                                                SHA-512:2D6F9E90A51A4C8E833C932A7C45F42108DFB161AB05EA80E53D2D63D509828B7288AD23535D2B8FAED9B72BAD86F93E15170D7D851BFF546C71286624CCF801
                                                                Malicious:false
                                                                Preview:.2024-04-25 21:28:53.077 Log opened. (Time zone: UTC+02:00)..2024-04-25 21:28:53.077 Setup version: Inno Setup version 5.5.9 (u)..2024-04-25 21:28:53.077 Original Setup EXE: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe..2024-04-25 21:28:53.077 Setup command line: /SL5="$20446,6484768,412160,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe" ..2024-04-25 21:28:53.077 Windows version: 10.0.19045 (NT platform: Yes)..2024-04-25 21:28:53.077 64-bit Windows: Yes..2024-04-25 21:28:53.077 Processor architecture: x64..2024-04-25 21:28:53.077 User privileges: Administrative..2024-04-25 21:28:53.140 64-bit install mode: No..2024-04-25 21:28:57.296 Created temporary directory: C:\Users\user\AppData\Local\Temp\is-RARHB.tmp..2024-04-25 21:29:28.687 Starting the installation process...2024-04-25 21:29:28.702 Creating directory: C:\Program Files (x86)\Letasoft Sound Booster..2024-04-25 21:29:28.702 Creating director
                                                                Process:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):6144
                                                                Entropy (8bit):4.720366600008286
                                                                Encrypted:false
                                                                SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1481648
                                                                Entropy (8bit):6.478030464508085
                                                                Encrypted:false
                                                                SSDEEP:24576:9tdAm9DUi/CR3wCkCiRgoG7hBaHkbEXXeG/jFt52ZTx9MjiQ:zqTytRFk6ek12fI
                                                                MD5:A5E43FF07BF378503CF45D6EE7778021
                                                                SHA1:EF988979192938D07C4DD146FB749ED32C8F5568
                                                                SHA-256:48CC8C44E665CC3A24A1EF0807BCD87BDCC0AD9FF179C8D5C96924EBA48888F2
                                                                SHA-512:E039F2834F9ADA5BF4E0F6EA0C94C9213C433785B99D31B2C288EA29732672A60D9F213FFB4CF47403BB696E19884F18840F1C00ED3861EA7D0FE0E6028126B5
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......W.....................t......l........ ....@..........................@............@......@..............................@8...0...............r...)................................... .......................................................text............................... ..`.itext.............................. ..`.data...h0... ...2..................@....bss.....a...`.......0...................idata..@8.......:...0..............@....tls....<............j...................rdata....... .......j..............@..@.rsrc........0.......l..............@..@....................................@..@........................................................................................................................................
                                                                Process:C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):77
                                                                Entropy (8bit):4.600803749298878
                                                                Encrypted:false
                                                                SSDEEP:3:PvKhKQLzkCBQSOA4jFRXphS:XKh/xmi4xhS
                                                                MD5:27E6313C935435E1E1F63069A5903425
                                                                SHA1:FCDCECA938CF429CC0128D797BA1792E58F32DD2
                                                                SHA-256:AE237E9123CA5C39646C34B4F313B2301A591D68D1AD12EF11777868B2BB12B0
                                                                SHA-512:FE73609B8494C91BEE50757E93F346865152C94624D38A255996A23DEAE642AE88FD5A245C11F3C24AF63660E82610B20D4E1198D8FFC38F8C74A6A709966DAC
                                                                Malicious:false
                                                                Preview:Activating Sound Booster...Product key=..Starting trial SUCCEEDED..Succeded..
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.97089666067935
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.94%
                                                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe
                                                                File size:6'973'352 bytes
                                                                MD5:99aa185a295411f72303fa9b7a497795
                                                                SHA1:04cbab9197165b1648ef6fcbf0d1b60d2e0f7a95
                                                                SHA256:4c00a2f66bb1d2470b17ef277f5f12a90ff2fc86a258cb82bf294835b87d4e02
                                                                SHA512:91e885c217a4753cbc115ce0f2d8fed11092e7562f2a4ac790ccf973ccde46792af5b42315416f0878bbc5e5c2b107c315881a10c8024d2a9ffd59dbfbc7e90f
                                                                SSDEEP:196608:ROn0dc1+6+wfqsXYJyHXDGzETzV4L2amU:Q0i1P+wFIJIDGoTJ4L2ax
                                                                TLSH:DA663352B97659BAD9E4323C0F1598873F31B094B0E0111A2CFBEA2D797CE734876D1A
                                                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                Icon Hash:2d96236d6933172b
                                                                Entrypoint:0x4117dc
                                                                Entrypoint Section:.itext
                                                                Digitally signed:true
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x57051F88 [Wed Apr 6 14:39:04 2016 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:5
                                                                OS Version Minor:0
                                                                File Version Major:5
                                                                File Version Minor:0
                                                                Subsystem Version Major:5
                                                                Subsystem Version Minor:0
                                                                Import Hash:20dd26497880c05caed9305b3c8b9109
                                                                Signature Valid:true
                                                                Signature Issuer:CN=Certum Code Signing 2021 CA, O=Asseco Data Systems S.A., C=PL
                                                                Signature Validation Error:The operation completed successfully
                                                                Error Number:0
                                                                Not Before, Not After
                                                                • 31/03/2022 09:01:32 30/03/2025 09:01:31
                                                                Subject Chain
                                                                • CN=Letasoft LLC, O=Letasoft LLC, L=Coquitlam, S=British Columbia, C=CA
                                                                Version:3
                                                                Thumbprint MD5:7E0864E1AE3B26A7D225D1A4427A6AA6
                                                                Thumbprint SHA-1:467C00B2DDD6EBDB910E2DAE8E57679B5BBD4A37
                                                                Thumbprint SHA-256:10C2300CB5FA99605BAE929FBF864EC57BF9A7833938DD6011B4C1C1A4D26DF9
                                                                Serial:7511BA1253CEF0A567F3DF301B633E8C
                                                                Instruction
                                                                push ebp
                                                                mov ebp, esp
                                                                add esp, FFFFFFA4h
                                                                push ebx
                                                                push esi
                                                                push edi
                                                                xor eax, eax
                                                                mov dword ptr [ebp-3Ch], eax
                                                                mov dword ptr [ebp-40h], eax
                                                                mov dword ptr [ebp-5Ch], eax
                                                                mov dword ptr [ebp-30h], eax
                                                                mov dword ptr [ebp-38h], eax
                                                                mov dword ptr [ebp-34h], eax
                                                                mov dword ptr [ebp-2Ch], eax
                                                                mov dword ptr [ebp-28h], eax
                                                                mov dword ptr [ebp-14h], eax
                                                                mov eax, 00410144h
                                                                call 00007F6AED8E723Dh
                                                                xor eax, eax
                                                                push ebp
                                                                push 00411EBEh
                                                                push dword ptr fs:[eax]
                                                                mov dword ptr fs:[eax], esp
                                                                xor edx, edx
                                                                push ebp
                                                                push 00411E7Ah
                                                                push dword ptr fs:[edx]
                                                                mov dword ptr fs:[edx], esp
                                                                mov eax, dword ptr [00415B48h]
                                                                call 00007F6AED8EF983h
                                                                call 00007F6AED8EF4D2h
                                                                cmp byte ptr [00412ADCh], 00000000h
                                                                je 00007F6AED8F247Eh
                                                                call 00007F6AED8EFA98h
                                                                xor eax, eax
                                                                call 00007F6AED8E52D5h
                                                                lea edx, dword ptr [ebp-14h]
                                                                xor eax, eax
                                                                call 00007F6AED8EC51Bh
                                                                mov edx, dword ptr [ebp-14h]
                                                                mov eax, 00418658h
                                                                call 00007F6AED8E58AAh
                                                                push 00000002h
                                                                push 00000000h
                                                                push 00000001h
                                                                mov ecx, dword ptr [00418658h]
                                                                mov dl, 01h
                                                                mov eax, dword ptr [0040C04Ch]
                                                                call 00007F6AED8ECE32h
                                                                mov dword ptr [0041865Ch], eax
                                                                xor edx, edx
                                                                push ebp
                                                                push 00411E26h
                                                                push dword ptr fs:[edx]
                                                                mov dword ptr fs:[edx], esp
                                                                call 00007F6AED8EF9F6h
                                                                mov dword ptr [00418664h], eax
                                                                mov eax, dword ptr [00418664h]
                                                                cmp dword ptr [eax+0Ch], 01h
                                                                jne 00007F6AED8F24BAh
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x190000xe04.idata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x521e0.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x6a3df80x29b0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x1b0000x18.rdata
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x193040x214.idata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000xf2440xf400a33e9ff7181115027d121cd377c28c8fFalse0.5481717469262295data6.3752135040515485IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .itext0x110000xf640x1000caec456c18277b579a94c9508daf36ecFalse0.55859375data5.732200666157372IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .data0x120000xc880xe00746954890499546d73dce0e994642192False0.2533482142857143data2.2967209087898324IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .bss0x130000x56bc0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .idata0x190000xe040x1000e9b9c0328fd9628ad4d6ab8283dcb20eFalse0.321533203125data4.597812557707959IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .tls0x1a0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rdata0x1b0000x180x2003dffc444ccc131c9dcee18db49ee6403False0.05078125data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .rsrc0x1c0000x521e00x52200998a3467ecaf55180287a4c07defb923False0.2805424752663623data5.849082028376391IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x1c53c0x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.4792682926829268
                                                                RT_ICON0x1cba40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.5887096774193549
                                                                RT_ICON0x1ce8c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.6081081081081081
                                                                RT_ICON0x1cfb40xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6273987206823027
                                                                RT_ICON0x1de5c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6340252707581228
                                                                RT_ICON0x1e7040x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.4111271676300578
                                                                RT_ICON0x1ec6c0x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.26884782673018315
                                                                RT_ICON0x60c940x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5533195020746888
                                                                RT_ICON0x6323c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6625234521575984
                                                                RT_ICON0x642e40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.7863475177304965
                                                                RT_STRING0x6474c0x68data0.6538461538461539
                                                                RT_STRING0x647b40xd4data0.5283018867924528
                                                                RT_STRING0x648880xa4data0.6524390243902439
                                                                RT_STRING0x6492c0x2acdata0.45614035087719296
                                                                RT_STRING0x64bd80x34cdata0.4218009478672986
                                                                RT_STRING0x64f240x294data0.4106060606060606
                                                                RT_RCDATA0x651b80x82e8dataEnglishUnited States0.11261637622344235
                                                                RT_RCDATA0x6d4a00x10data1.5
                                                                RT_RCDATA0x6d4b00x150data0.8392857142857143
                                                                RT_RCDATA0x6d6000x2cdata1.2045454545454546
                                                                RT_GROUP_ICON0x6d62c0x92dataEnglishUnited States0.6301369863013698
                                                                RT_VERSION0x6d6c00x4f4dataEnglishUnited States0.29337539432176657
                                                                RT_MANIFEST0x6dbb40x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                                                                DLLImport
                                                                oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                                                user32.dllGetKeyboardType, LoadStringW, MessageBoxA, CharNextW
                                                                kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, CloseHandle
                                                                kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW
                                                                user32.dllCreateWindowExW, TranslateMessage, SetWindowLongW, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, GetSystemMetrics, ExitWindowsEx, DispatchMessageW, DestroyWindow, CharUpperBuffW, CallWindowProcW
                                                                kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, SizeofResource, SignalObjectAndWait, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, RemoveDirectoryW, ReadFile, MultiByteToWideChar, LockResource, LoadResource, LoadLibraryW, GetWindowsDirectoryW, GetVersionExW, GetVersion, GetUserDefaultLangID, GetThreadLocale, GetSystemInfo, GetSystemDirectoryW, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeProcess, GetEnvironmentVariableW, GetDiskFreeSpaceW, GetCurrentProcess, GetCommandLineW, GetCPInfo, InterlockedExchange, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FindResourceW, EnumCalendarInfoW, DeleteFileW, CreateProcessW, CreateFileW, CreateEventW, CreateDirectoryW, CloseHandle
                                                                advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW
                                                                comctl32.dllInitCommonControls
                                                                kernel32.dllSleep
                                                                advapi32.dllAdjustTokenPrivileges
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                No network behavior found

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:21:28:52
                                                                Start date:25/04/2024
                                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe"
                                                                Imagebase:0x400000
                                                                File size:6'973'352 bytes
                                                                MD5 hash:99AA185A295411F72303FA9B7A497795
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:Borland Delphi
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:1
                                                                Start time:21:28:52
                                                                Start date:25/04/2024
                                                                Path:C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Local\Temp\is-VT15G.tmp\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.tmp" /SL5="$20446,6484768,412160,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Pikabot.14696.3514.exe"
                                                                Imagebase:0x400000
                                                                File size:1'481'648 bytes
                                                                MD5 hash:A5E43FF07BF378503CF45D6EE7778021
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:Borland Delphi
                                                                Antivirus matches:
                                                                • Detection: 4%, ReversingLabs
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:5
                                                                Start time:21:29:30
                                                                Start date:25/04/2024
                                                                Path:C:\Users\user\AppData\Local\Temp\is-RARHB.tmp\_isetup\_setup64.tmp
                                                                Wow64 process (32bit):false
                                                                Commandline:helper 105 0x544
                                                                Imagebase:0x140000000
                                                                File size:6'144 bytes
                                                                MD5 hash:E4211D6D009757C078A9FAC7FF4F03D4
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 0%, ReversingLabs
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:6
                                                                Start time:21:29:30
                                                                Start date:25/04/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff7699e0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:8
                                                                Start time:21:29:30
                                                                Start date:25/04/2024
                                                                Path:C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe" -InstallAPO
                                                                Imagebase:0xbe0000
                                                                File size:203'184 bytes
                                                                MD5 hash:674B5BE99C119416895FED6B4B54CD85
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:9
                                                                Start time:21:29:30
                                                                Start date:25/04/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff7699e0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:10
                                                                Start time:21:29:30
                                                                Start date:25/04/2024
                                                                Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll"
                                                                Imagebase:0x850000
                                                                File size:20'992 bytes
                                                                MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:11
                                                                Start time:21:29:30
                                                                Start date:25/04/2024
                                                                Path:C:\Windows\System32\regsvr32.exe
                                                                Wow64 process (32bit):false
                                                                Commandline: /s "C:\Program Files (x86)\Letasoft Sound Booster\Sbapo.dll"
                                                                Imagebase:0x7ff60b000000
                                                                File size:25'088 bytes
                                                                MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:12
                                                                Start time:21:29:32
                                                                Start date:25/04/2024
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                Imagebase:0x7ff6eef20000
                                                                File size:55'320 bytes
                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                Has elevated privileges:true
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:13
                                                                Start time:21:29:33
                                                                Start date:25/04/2024
                                                                Path:C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterService.exe" -install
                                                                Imagebase:0x420000
                                                                File size:152'496 bytes
                                                                MD5 hash:E45BFFA942994D7921E37BCAA900740F
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:14
                                                                Start time:21:29:33
                                                                Start date:25/04/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff7699e0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:15
                                                                Start time:21:29:33
                                                                Start date:25/04/2024
                                                                Path:C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe" -Activate
                                                                Imagebase:0xbe0000
                                                                File size:203'184 bytes
                                                                MD5 hash:674B5BE99C119416895FED6B4B54CD85
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:16
                                                                Start time:21:29:33
                                                                Start date:25/04/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff7699e0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:17
                                                                Start time:21:29:39
                                                                Start date:25/04/2024
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                Imagebase:0x7ff6eef20000
                                                                File size:55'320 bytes
                                                                MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                Has elevated privileges:true
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:56.4%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:33.3%
                                                                  Total number of Nodes:33
                                                                  Total number of Limit Nodes:5
                                                                  execution_graph 64 1400014e0 67 1400012a4 8 API calls 64->67 68 140001317 GetLastError 67->68 69 140001329 67->69 70 140001330 ExitProcess 68->70 69->70 71 14000133a StrToIntW 69->71 71->70 72 140001353 StrToInt64ExW 71->72 72->70 79 140001372 72->79 73 140001468 ReadFile 74 140001490 GetLastError 73->74 73->79 76 1400014aa CloseHandle 74->76 77 14000149b GetLastError 74->77 75 1400014be 75->76 76->70 77->76 78 140001438 WriteFile 80 1400014c5 GetLastError 78->80 83 1400013d3 78->83 79->73 79->75 79->78 79->83 84 140001000 79->84 80->76 83->73 83->75 83->78 95 1400011dc LoadTypeLib 83->95 85 14000104b GetNamedSecurityInfoW 84->85 86 140001041 84->86 85->86 87 140001088 85->87 86->83 88 14000111d SetEntriesInAclW 87->88 89 1400010a8 AllocateAndInitializeSid 87->89 90 140001172 88->90 91 14000113e SetNamedSecurityInfoW LocalFree 88->91 89->87 92 1400011c5 GetLastError 89->92 93 140001197 LocalFree 90->93 94 140001187 FreeSid 90->94 91->90 92->90 93->86 94->90 96 140001276 95->96 97 14000120f 95->97 96->83 98 140001218 RegisterTypeLib 97->98 99 14000122b 97->99 98->96 99->96 100 140001241 UnRegisterTypeLib 99->100 100->96

                                                                  Callgraph

                                                                  • Executed
                                                                  • Not Executed
                                                                  • Opacity -> Relevance
                                                                  • Disassembly available
                                                                  callgraph 0 Function_00000001400012A4 1 Function_00000001400011DC 0->1 4 Function_0000000140001000 0->4 2 Function_000000014000129C 3 Function_00000001400014E0 3->0

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2060162722.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                  • Associated: 00000005.00000002.2060146441.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2060180764.0000000140002000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2060202151.0000000140025000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_140000000__setup64.jbxd
                                                                  Similarity
                                                                  • API ID: Free$InfoLocalNamedSecurity$AllocateEntriesErrorInitializeLast
                                                                  • String ID:
                                                                  • API String ID: 1336570144-0
                                                                  • Opcode ID: b35f34b64a9d6aa6b81e16b13b2f1c0d38c8c3b1546899b34faa1a97c6582e21
                                                                  • Instruction ID: 9ad65f9ffd8baecdb197e09b536dbb51b96e9a581e15e5332d3d6b3fb358d4f4
                                                                  • Opcode Fuzzy Hash: b35f34b64a9d6aa6b81e16b13b2f1c0d38c8c3b1546899b34faa1a97c6582e21
                                                                  • Instruction Fuzzy Hash: A35147B2614B8186E765CF12F88078EB7E6F7887D4F504425EB8943B64DF38D9A5CB00
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2060162722.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                  • Associated: 00000005.00000002.2060146441.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2060180764.0000000140002000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2060202151.0000000140025000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_140000000__setup64.jbxd
                                                                  Similarity
                                                                  • API ID: Error$CommandDirectoryLastLine$ArgvCloseConsoleCtrlCurrentHandleHandlerModeParametersProcessShutdownSystem
                                                                  • String ID:
                                                                  • API String ID: 1351133944-0
                                                                  • Opcode ID: 9d6e473d000c958ab654ea6524e99b93636dd2550909cc2fdf2d0baeb0bae34d
                                                                  • Instruction ID: bed22989135500286ff082a5b8534ee6a98307118f748591786f601728a80f93
                                                                  • Opcode Fuzzy Hash: 9d6e473d000c958ab654ea6524e99b93636dd2550909cc2fdf2d0baeb0bae34d
                                                                  • Instruction Fuzzy Hash: 435106B160464686EB13DF27F8843E963A1F78C7C5F904125FB4A476B5CB3C8989CB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 52 1400014e0-1400014eb call 1400012a4 ExitProcess
                                                                  APIs
                                                                    • Part of subcall function 00000001400012A4: #17.COMCTL32(?,?,?,?,?,?,00000001400014E9), ref: 00000001400012AF
                                                                    • Part of subcall function 00000001400012A4: SetErrorMode.KERNELBASE(?,?,?,?,?,?,00000001400014E9), ref: 00000001400012BA
                                                                    • Part of subcall function 00000001400012A4: GetSystemDirectoryW.KERNEL32 ref: 00000001400012CC
                                                                    • Part of subcall function 00000001400012A4: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001400014E9), ref: 00000001400012D9
                                                                    • Part of subcall function 00000001400012A4: SetProcessShutdownParameters.KERNEL32(?,?,?,?,?,?,00000001400014E9), ref: 00000001400012E6
                                                                    • Part of subcall function 00000001400012A4: SetConsoleCtrlHandler.KERNEL32(?,?,?,?,?,?,00000001400014E9), ref: 00000001400012F5
                                                                    • Part of subcall function 00000001400012A4: GetCommandLineW.KERNEL32(?,?,?,?,?,?,00000001400014E9), ref: 00000001400012FB
                                                                    • Part of subcall function 00000001400012A4: CommandLineToArgvW.SHELL32(?,?,?,?,?,?,00000001400014E9), ref: 0000000140001309
                                                                    • Part of subcall function 00000001400012A4: GetLastError.KERNEL32(?,?,?,?,?,?,00000001400014E9), ref: 0000000140001317
                                                                  • ExitProcess.KERNEL32 ref: 00000001400014EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000005.00000002.2060162722.0000000140001000.00000020.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                  • Associated: 00000005.00000002.2060146441.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2060180764.0000000140002000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                  • Associated: 00000005.00000002.2060202151.0000000140025000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_5_2_140000000__setup64.jbxd
                                                                  Similarity
                                                                  • API ID: CommandDirectoryErrorLineProcess$ArgvConsoleCtrlCurrentExitHandlerLastModeParametersShutdownSystem
                                                                  • String ID:
                                                                  • API String ID: 596749235-0
                                                                  • Opcode ID: d409c78e300c7577bde50c236e3745e62975251c616abf16af35a2c2feadab5b
                                                                  • Instruction ID: 20a652f16b87ba7830b4ae42eb4563c7e1ed9e0c7b0ce7c62722bbd31286e835
                                                                  • Opcode Fuzzy Hash: d409c78e300c7577bde50c236e3745e62975251c616abf16af35a2c2feadab5b
                                                                  • Instruction Fuzzy Hash: CEA001B0E2168282EA0ABBB6695A3D911626FD8781F540414A242872A2DD7884698612
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Execution Graph

                                                                  Execution Coverage:4.5%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:3.1%
                                                                  Total number of Nodes:1464
                                                                  Total number of Limit Nodes:32
                                                                  execution_graph 17229 bf96aa 17230 bf96bc 17229->17230 17231 bf96b3 17229->17231 17233 bf95a9 17231->17233 17234 bf6768 ___FrameUnwindToState 41 API calls 17233->17234 17235 bf95b6 17234->17235 17236 bf96c8 __cftof 41 API calls 17235->17236 17237 bf95be 17236->17237 17253 bf933d 17237->17253 17240 bf5915 __onexit 21 API calls 17241 bf95e6 17240->17241 17252 bf9618 17241->17252 17260 bf976a 17241->17260 17244 bf58db _free 20 API calls 17246 bf95d5 17244->17246 17245 bf9613 17247 bf6b46 __dosmaperr 20 API calls 17245->17247 17246->17230 17247->17252 17248 bf965c 17248->17252 17270 bf9213 17248->17270 17249 bf9630 17249->17248 17250 bf58db _free 20 API calls 17249->17250 17250->17248 17252->17244 17254 bf0f45 __cftof 41 API calls 17253->17254 17255 bf934f 17254->17255 17256 bf935e GetOEMCP 17255->17256 17257 bf9370 17255->17257 17258 bf9387 17256->17258 17257->17258 17259 bf9375 GetACP 17257->17259 17258->17240 17258->17246 17259->17258 17261 bf933d 43 API calls 17260->17261 17262 bf9789 17261->17262 17264 bf97da IsValidCodePage 17262->17264 17267 bf9790 17262->17267 17269 bf97ff __cftof 17262->17269 17263 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17265 bf960b 17263->17265 17266 bf97ec GetCPInfo 17264->17266 17264->17267 17265->17245 17265->17249 17266->17267 17266->17269 17267->17263 17273 bf9415 GetCPInfo 17269->17273 17346 bf91d0 17270->17346 17272 bf9237 17272->17252 17274 bf94f9 17273->17274 17280 bf944f 17273->17280 17277 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17274->17277 17279 bf95a5 17277->17279 17279->17267 17283 bfad1d 17280->17283 17282 bfbcca 46 API calls 17282->17274 17284 bf0f45 __cftof 41 API calls 17283->17284 17285 bfad3d MultiByteToWideChar 17284->17285 17287 bfae13 17285->17287 17289 bfad7b 17285->17289 17290 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17287->17290 17288 bfad9c __cftof 17292 bfae0d 17288->17292 17295 bfade1 MultiByteToWideChar 17288->17295 17289->17288 17293 bf5915 __onexit 21 API calls 17289->17293 17291 bf94b0 17290->17291 17297 bfbcca 17291->17297 17302 bfae3a 17292->17302 17293->17288 17295->17292 17296 bfadfd GetStringTypeW 17295->17296 17296->17292 17298 bf0f45 __cftof 41 API calls 17297->17298 17299 bfbcdd 17298->17299 17306 bfbaad 17299->17306 17303 bfae57 17302->17303 17304 bfae46 17302->17304 17303->17287 17304->17303 17305 bf58db _free 20 API calls 17304->17305 17305->17303 17307 bfbac8 17306->17307 17308 bfbaee MultiByteToWideChar 17307->17308 17309 bfbb18 17308->17309 17310 bfbca2 17308->17310 17313 bf5915 __onexit 21 API calls 17309->17313 17316 bfbb39 17309->17316 17311 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17310->17311 17312 bf94d1 17311->17312 17312->17282 17313->17316 17314 bfbbee 17319 bfae3a __freea 20 API calls 17314->17319 17315 bfbb82 MultiByteToWideChar 17315->17314 17317 bfbb9b 17315->17317 17316->17314 17316->17315 17333 bf8365 17317->17333 17319->17310 17321 bfbbfd 17325 bf5915 __onexit 21 API calls 17321->17325 17328 bfbc1e 17321->17328 17322 bfbbc5 17322->17314 17323 bf8365 11 API calls 17322->17323 17323->17314 17324 bfbc93 17327 bfae3a __freea 20 API calls 17324->17327 17325->17328 17326 bf8365 11 API calls 17329 bfbc72 17326->17329 17327->17314 17328->17324 17328->17326 17329->17324 17330 bfbc81 WideCharToMultiByte 17329->17330 17330->17324 17331 bfbcc1 17330->17331 17332 bfae3a __freea 20 API calls 17331->17332 17332->17314 17334 bf801d ___FrameUnwindToState 5 API calls 17333->17334 17335 bf838c 17334->17335 17338 bf8395 17335->17338 17341 bf83ed 17335->17341 17339 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17338->17339 17340 bf83e7 17339->17340 17340->17314 17340->17321 17340->17322 17342 bf801d ___FrameUnwindToState 5 API calls 17341->17342 17343 bf8414 17342->17343 17344 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17343->17344 17345 bf83d5 LCMapStringW 17344->17345 17345->17338 17347 bf91dc ___FrameUnwindToState 17346->17347 17354 bf8c4b EnterCriticalSection 17347->17354 17349 bf91e6 17355 bf923b 17349->17355 17353 bf91ff ___FrameUnwindToState 17353->17272 17354->17349 17367 bf995b 17355->17367 17357 bf9289 17358 bf995b 26 API calls 17357->17358 17359 bf92a5 17358->17359 17360 bf995b 26 API calls 17359->17360 17361 bf92c3 17360->17361 17362 bf58db _free 20 API calls 17361->17362 17363 bf91f3 17361->17363 17362->17363 17364 bf9207 17363->17364 17381 bf8c93 LeaveCriticalSection 17364->17381 17366 bf9211 17366->17353 17368 bf996c 17367->17368 17372 bf9968 17367->17372 17369 bf9973 17368->17369 17373 bf9986 __cftof 17368->17373 17370 bf6b46 __dosmaperr 20 API calls 17369->17370 17371 bf9978 17370->17371 17374 bf0831 pre_c_initialization 26 API calls 17371->17374 17372->17357 17373->17372 17375 bf99b4 17373->17375 17377 bf99bd 17373->17377 17374->17372 17376 bf6b46 __dosmaperr 20 API calls 17375->17376 17378 bf99b9 17376->17378 17377->17372 17379 bf6b46 __dosmaperr 20 API calls 17377->17379 17380 bf0831 pre_c_initialization 26 API calls 17378->17380 17379->17378 17380->17372 17381->17366 18898 bf7f81 18899 bf7f8d ___FrameUnwindToState 18898->18899 18910 bf8c4b EnterCriticalSection 18899->18910 18901 bf7f94 18911 bfa82b 18901->18911 18903 bf7fa3 18909 bf7fb2 18903->18909 18924 bf7e15 GetStartupInfoW 18903->18924 18907 bf7fc3 ___FrameUnwindToState 18908 bf7ecb 2 API calls 18908->18909 18930 bf7fce 18909->18930 18910->18901 18912 bfa837 ___FrameUnwindToState 18911->18912 18913 bfa85b 18912->18913 18914 bfa844 18912->18914 18933 bf8c4b EnterCriticalSection 18913->18933 18916 bf6b46 __dosmaperr 20 API calls 18914->18916 18918 bfa849 18916->18918 18917 bfa867 18923 bfa893 18917->18923 18934 bfa77c 18917->18934 18919 bf0831 pre_c_initialization 26 API calls 18918->18919 18922 bfa853 ___FrameUnwindToState 18919->18922 18922->18903 18941 bfa8ba 18923->18941 18925 bf7ec4 18924->18925 18926 bf7e32 18924->18926 18925->18908 18926->18925 18927 bfa82b 27 API calls 18926->18927 18928 bf7e5b 18927->18928 18928->18925 18929 bf7e89 GetFileType 18928->18929 18929->18928 18945 bf8c93 LeaveCriticalSection 18930->18945 18932 bf7fd5 18932->18907 18933->18917 18935 bf5963 ___FrameUnwindToState 20 API calls 18934->18935 18938 bfa78e 18935->18938 18936 bfa79b 18937 bf58db _free 20 API calls 18936->18937 18939 bfa7ed 18937->18939 18938->18936 18940 bf8303 11 API calls 18938->18940 18939->18917 18940->18938 18944 bf8c93 LeaveCriticalSection 18941->18944 18943 bfa8c1 18943->18922 18944->18943 18945->18932 18952 bf89f3 18953 bf8a19 18952->18953 18954 bf8a03 18952->18954 18956 bf8a3c 18953->18956 18957 bf8a2b 18953->18957 18955 bf6b46 __dosmaperr 20 API calls 18954->18955 18958 bf8a08 18955->18958 18960 bf8a49 18956->18960 18961 bf8a5a 18956->18961 18959 bf6b46 __dosmaperr 20 API calls 18957->18959 18963 bf0831 pre_c_initialization 26 API calls 18958->18963 18964 bf8a30 18959->18964 18962 bf6b46 __dosmaperr 20 API calls 18960->18962 18965 bf576b 2 API calls 18961->18965 18982 bf8a12 18962->18982 18963->18982 18966 bf0831 pre_c_initialization 26 API calls 18964->18966 18967 bf8a60 18965->18967 18966->18982 18983 bf87e7 18967->18983 18969 bf8a74 18970 bf8bf4 18969->18970 18972 bf8813 26 API calls 18969->18972 18971 bf085e std::_Deallocate 11 API calls 18970->18971 18973 bf8bfe 18971->18973 18974 bf8a86 18972->18974 18974->18970 18975 bf883f 26 API calls 18974->18975 18976 bf8a98 18975->18976 18976->18970 18977 bf8aa1 18976->18977 18978 bf8b09 18977->18978 18979 bf8ab1 18977->18979 18980 bf57bc 2 API calls 18978->18980 18978->18982 18979->18982 18990 bf57bc 18979->18990 18980->18982 18984 bf8808 18983->18984 18985 bf87f3 18983->18985 18984->18969 18986 bf6b46 __dosmaperr 20 API calls 18985->18986 18987 bf87f8 18986->18987 18988 bf0831 pre_c_initialization 26 API calls 18987->18988 18989 bf8803 18988->18989 18989->18969 18991 bf57c8 ___FrameUnwindToState 18990->18991 18996 bf8c4b EnterCriticalSection 18991->18996 18993 bf57d3 18997 bf57fd 18993->18997 18995 bf57f2 ___FrameUnwindToState 18995->18982 18996->18993 19000 bf8c93 LeaveCriticalSection 18997->19000 18999 bf5804 18999->18995 19000->18999 17603 befad1 17604 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17603->17604 17605 befae3 17604->17605 17608 bee814 17605->17608 17607 befafc 17609 bee822 ___InternalCxxFrameHandler 17608->17609 17617 bf01fa 17609->17617 17611 bee828 17612 bee867 17611->17612 17613 bee88c 17611->17613 17616 bee887 17611->17616 17612->17616 17630 bee74c 17612->17630 17613->17616 17637 bedfc0 17613->17637 17616->17607 17684 bf0208 17617->17684 17619 bf01ff 17619->17611 17700 bfa441 17619->17700 17622 bf584e 17623 bf5876 17622->17623 17624 bf5858 IsProcessorFeaturePresent 17622->17624 17730 bf3e09 17623->17730 17626 bf5863 17624->17626 17628 bf0667 _abort 8 API calls 17626->17628 17628->17623 17631 bee758 ___FrameUnwindToState 17630->17631 17632 bf01fa ___InternalCxxFrameHandler 51 API calls 17631->17632 17635 bee778 __CallSettingFrame@12 17632->17635 17634 bf4e2b ___FrameUnwindToState 41 API calls 17634->17635 17635->17634 17636 bee7f1 ___FrameUnwindToState 17635->17636 17762 bee800 17635->17762 17636->17616 17639 bedfe0 17637->17639 17638 bf4e2b ___FrameUnwindToState 41 API calls 17641 bee0e0 ___DestructExceptionObject FindHandler 17638->17641 17642 bee2ac 17639->17642 17644 bee0c9 17639->17644 17645 bf01fa ___InternalCxxFrameHandler 51 API calls 17639->17645 17683 bee0cf FindHandler 17639->17683 17640 bee2ce 17643 bf01fa ___InternalCxxFrameHandler 51 API calls 17640->17643 17648 befc6b __CxxThrowException@8 RaiseException 17641->17648 17642->17640 17642->17683 17787 bee328 17642->17787 17643->17683 17644->17642 17647 bee128 17644->17647 17644->17683 17649 bee045 17645->17649 17656 bee236 ___DestructExceptionObject 17647->17656 17772 bef9d2 17647->17772 17651 bee29c 17648->17651 17650 bee2dc 17649->17650 17652 bf01fa ___InternalCxxFrameHandler 51 API calls 17649->17652 17650->17616 17804 befa7c RtlUnwind 17651->17804 17655 bee054 17652->17655 17658 bf01fa ___InternalCxxFrameHandler 51 API calls 17655->17658 17656->17640 17661 bee443 IsInExceptionSpec 41 API calls 17656->17661 17656->17683 17657 bee310 17659 bee74c ___FrameUnwindToState 51 API calls 17657->17659 17666 bee05c 17658->17666 17660 bee31c 17659->17660 17805 bedec1 17660->17805 17664 bee27f 17661->17664 17663 bf01fa ___InternalCxxFrameHandler 51 API calls 17667 bee0a6 17663->17667 17664->17640 17668 bee285 17664->17668 17665 bee327 17666->17663 17666->17683 17667->17644 17670 bf01fa ___InternalCxxFrameHandler 51 API calls 17667->17670 17669 bf01fa ___InternalCxxFrameHandler 51 API calls 17668->17669 17671 bee28a 17669->17671 17673 bee0b1 17670->17673 17674 bf01fa ___InternalCxxFrameHandler 51 API calls 17671->17674 17672 bee144 ___TypeMatch 17672->17656 17777 bedefb 17672->17777 17675 bf01fa ___InternalCxxFrameHandler 51 API calls 17673->17675 17676 bee28f 17674->17676 17679 bee0bc 17675->17679 17677 bf01fa ___InternalCxxFrameHandler 51 API calls 17676->17677 17680 bee294 17677->17680 17767 bee443 17679->17767 17682 bf01fa ___InternalCxxFrameHandler 51 API calls 17680->17682 17682->17651 17683->17638 17683->17641 17683->17650 17685 bf0214 GetLastError 17684->17685 17686 bf0211 17684->17686 17733 befe6e 17685->17733 17686->17619 17688 bf0229 17689 bf028e SetLastError 17688->17689 17690 befea8 ___vcrt_FlsSetValue 6 API calls 17688->17690 17699 bf0248 17688->17699 17689->17619 17691 bf0242 17690->17691 17692 bf5963 ___FrameUnwindToState 20 API calls 17691->17692 17691->17699 17693 bf0256 17692->17693 17694 befea8 ___vcrt_FlsSetValue 6 API calls 17693->17694 17696 bf026a 17693->17696 17694->17696 17695 befea8 ___vcrt_FlsSetValue 6 API calls 17697 bf027e 17695->17697 17696->17695 17696->17697 17698 bf58db _free 20 API calls 17697->17698 17698->17699 17699->17689 17738 bfa3af 17700->17738 17703 bfa49c 17704 bfa4a8 ___FrameUnwindToState 17703->17704 17705 bf67ec _abort 20 API calls 17704->17705 17707 bfa4cf _abort 17704->17707 17710 bfa4d5 _abort 17704->17710 17705->17707 17706 bfa521 17708 bf6b46 __dosmaperr 20 API calls 17706->17708 17707->17706 17707->17710 17714 bfa504 17707->17714 17709 bfa526 17708->17709 17711 bf0831 pre_c_initialization 26 API calls 17709->17711 17712 bfa54d 17710->17712 17752 bf8c4b EnterCriticalSection 17710->17752 17711->17714 17718 bfa5ac 17712->17718 17720 bfa5a4 17712->17720 17727 bfa5d7 17712->17727 17753 bf8c93 LeaveCriticalSection 17712->17753 17713 c01b99 _abort 5 API calls 17716 bfa6a3 17713->17716 17714->17713 17716->17622 17718->17727 17754 bfa493 17718->17754 17722 bf3e09 _abort 31 API calls 17720->17722 17722->17718 17724 bf6768 ___FrameUnwindToState 41 API calls 17728 bfa63a 17724->17728 17726 bfa493 _abort 41 API calls 17726->17727 17757 bfa65c 17727->17757 17728->17714 17729 bf6768 ___FrameUnwindToState 41 API calls 17728->17729 17729->17714 17731 bf3c18 _abort 31 API calls 17730->17731 17732 bf3e1a 17731->17732 17734 befcd9 try_get_function 5 API calls 17733->17734 17735 befe88 17734->17735 17736 befe9f TlsGetValue 17735->17736 17737 befe94 17735->17737 17736->17737 17737->17688 17741 bfa355 17738->17741 17740 bf5843 17740->17622 17740->17703 17742 bfa361 ___FrameUnwindToState 17741->17742 17747 bf8c4b EnterCriticalSection 17742->17747 17744 bfa36f 17748 bfa3a3 17744->17748 17746 bfa396 ___FrameUnwindToState 17746->17740 17747->17744 17751 bf8c93 LeaveCriticalSection 17748->17751 17750 bfa3ad 17750->17746 17751->17750 17752->17712 17753->17720 17755 bf6768 ___FrameUnwindToState 41 API calls 17754->17755 17756 bfa498 17755->17756 17756->17726 17758 bfa62b 17757->17758 17759 bfa662 17757->17759 17758->17714 17758->17724 17758->17728 17761 bf8c93 LeaveCriticalSection 17759->17761 17761->17758 17763 bf01fa ___InternalCxxFrameHandler 51 API calls 17762->17763 17764 bee805 17763->17764 17765 bf01fa ___InternalCxxFrameHandler 51 API calls 17764->17765 17766 bee810 17764->17766 17765->17766 17766->17635 17768 bee4d9 17767->17768 17771 bee457 ___TypeMatch 17767->17771 17769 bf4e2b ___FrameUnwindToState 41 API calls 17768->17769 17770 bee4de 17769->17770 17771->17644 17773 bef9ee 17772->17773 17774 befa38 17773->17774 17775 bf4e2b ___FrameUnwindToState 41 API calls 17773->17775 17774->17672 17776 befa49 17775->17776 17778 bedf17 17777->17778 17779 bedf08 17777->17779 17829 befa7c RtlUnwind 17778->17829 17825 bee54a 17779->17825 17782 bedf2e 17783 bee74c ___FrameUnwindToState 51 API calls 17782->17783 17784 bedf40 17783->17784 17830 bedd05 17784->17830 17786 bedf64 CallUnexpected 17786->17672 17788 bee33d 17787->17788 17789 bee436 17787->17789 17790 bf01fa ___InternalCxxFrameHandler 51 API calls 17788->17790 17789->17640 17791 bee344 17790->17791 17792 bee34d EncodePointer 17791->17792 17793 bee387 17791->17793 17794 bf01fa ___InternalCxxFrameHandler 51 API calls 17792->17794 17793->17789 17795 bee39c 17793->17795 17796 bee43d 17793->17796 17800 bee35c 17794->17800 17797 bef9d2 _GetRangeOfTrysToCheck 41 API calls 17795->17797 17798 bf4e2b ___FrameUnwindToState 41 API calls 17796->17798 17801 bee3b0 17797->17801 17799 bee442 17798->17799 17800->17793 17876 bef8f5 17800->17876 17801->17789 17803 bedefb FindHandlerForForeignException 52 API calls 17801->17803 17803->17801 17804->17657 17806 bedecd __EH_prolog3_catch 17805->17806 17807 bf01fa ___InternalCxxFrameHandler 51 API calls 17806->17807 17808 beded2 17807->17808 17809 bedef5 17808->17809 17880 bf01c2 17808->17880 17810 bf4e2b ___FrameUnwindToState 41 API calls 17809->17810 17813 bedefa 17810->17813 17816 bedf17 17813->17816 17818 bee54a ___BuildCatchObject 41 API calls 17813->17818 17814 bf01fa ___InternalCxxFrameHandler 51 API calls 17815 bedee6 17814->17815 17817 befc6b __CxxThrowException@8 RaiseException 17815->17817 17887 befa7c RtlUnwind 17816->17887 17817->17809 17818->17816 17820 bedf2e 17821 bee74c ___FrameUnwindToState 51 API calls 17820->17821 17822 bedf40 17821->17822 17823 bedd05 CallCatchBlock 51 API calls 17822->17823 17824 bedf64 CallUnexpected 17823->17824 17824->17665 17826 bee556 ___FrameUnwindToState 17825->17826 17844 bee5d9 17826->17844 17828 bee57e ___BuildCatchObject ___FrameUnwindToState ___AdjustPointer 17828->17778 17829->17782 17831 bedd11 ___FrameUnwindToState 17830->17831 17848 befb02 17831->17848 17834 bf01fa ___InternalCxxFrameHandler 51 API calls 17835 bedd3d 17834->17835 17836 bf01fa ___InternalCxxFrameHandler 51 API calls 17835->17836 17837 bedd48 17836->17837 17838 bf01fa ___InternalCxxFrameHandler 51 API calls 17837->17838 17839 bedd53 17838->17839 17840 bf01fa ___InternalCxxFrameHandler 51 API calls 17839->17840 17841 bedd5b _CallCatchBlock2 17840->17841 17853 bede40 17841->17853 17843 bede32 ___FrameUnwindToState 17843->17786 17846 bee5e5 ___FrameUnwindToState 17844->17846 17845 bf4e2b ___FrameUnwindToState 41 API calls 17845->17846 17846->17845 17847 bee65c ___BuildCatchObject ___FrameUnwindToState ___AdjustPointer 17846->17847 17847->17828 17849 bf01fa ___InternalCxxFrameHandler 51 API calls 17848->17849 17850 befb13 17849->17850 17851 bf01fa ___InternalCxxFrameHandler 51 API calls 17850->17851 17852 bedd33 17851->17852 17852->17834 17862 befb26 17853->17862 17856 bf01fa ___InternalCxxFrameHandler 51 API calls 17857 bede54 17856->17857 17858 bf01fa ___InternalCxxFrameHandler 51 API calls 17857->17858 17859 bede5f 17858->17859 17861 bedea3 ___DestructExceptionObject 17859->17861 17873 befb70 17859->17873 17861->17843 17863 bf01fa ___InternalCxxFrameHandler 51 API calls 17862->17863 17864 befb2f 17863->17864 17865 befb47 17864->17865 17866 befb37 17864->17866 17868 bf01fa ___InternalCxxFrameHandler 51 API calls 17865->17868 17867 bf01fa ___InternalCxxFrameHandler 51 API calls 17866->17867 17869 bede4e 17867->17869 17870 befb4c 17868->17870 17869->17856 17870->17869 17871 bf4e2b ___FrameUnwindToState 41 API calls 17870->17871 17872 befb6f 17871->17872 17874 bf01fa ___InternalCxxFrameHandler 51 API calls 17873->17874 17875 befb78 17874->17875 17875->17861 17877 bef917 17876->17877 17878 bef905 17876->17878 17879 bf01fa ___InternalCxxFrameHandler 51 API calls 17877->17879 17878->17793 17879->17878 17881 bf01fa ___InternalCxxFrameHandler 51 API calls 17880->17881 17882 bf01c8 17881->17882 17883 bf4e2b ___FrameUnwindToState 41 API calls 17882->17883 17884 bf01dd 17883->17884 17885 bedee1 17884->17885 17886 bf58db _free 20 API calls 17884->17886 17885->17814 17886->17885 17887->17820 17888 bfead0 17891 bf96aa 17888->17891 17892 bf96bc 17891->17892 17893 bf96b3 17891->17893 17894 bf95a9 54 API calls 17893->17894 17894->17892 19139 bf4d3c 19140 bf4d48 ___FrameUnwindToState 19139->19140 19141 bf4d7f ___FrameUnwindToState 19140->19141 19147 bf8c4b EnterCriticalSection 19140->19147 19143 bf4d5c 19148 bfb19b 19143->19148 19147->19143 19149 bf4d6c 19148->19149 19150 bfb1a9 __cftof 19148->19150 19152 bf4d85 19149->19152 19150->19149 19151 bfaed7 __cftof 20 API calls 19150->19151 19151->19149 19155 bf8c93 LeaveCriticalSection 19152->19155 19154 bf4d8c 19154->19141 19155->19154 14891 bed42e 14892 bed43a ___FrameUnwindToState 14891->14892 14915 becf73 14892->14915 14894 bed441 14896 bed46a 14894->14896 15098 bed71b IsProcessorFeaturePresent 14894->15098 14901 bed4a9 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 14896->14901 15102 bf4c8a 14896->15102 14900 bed489 ___FrameUnwindToState 14902 bed509 14901->14902 15110 bf3e1f 14901->15110 14926 bf4626 14902->14926 14916 becf7c 14915->14916 15125 bed8d5 IsProcessorFeaturePresent 14916->15125 14920 becf8d 14921 becf91 14920->14921 15136 bf4b6a 14920->15136 14921->14894 14924 becfa8 14924->14894 14927 bf462f 14926->14927 14928 bed51d 14926->14928 15225 bf41a1 14927->15225 14930 be2a50 14928->14930 14931 be2a5f __EH_prolog3_GS 14930->14931 15426 be1b5f 14931->15426 14934 be2a86 15435 be39cc RegOpenKeyExW 14934->15435 14935 be2a95 LeaveCriticalSection CoInitialize 15453 be2871 14935->15453 15099 bed731 __cftof 15098->15099 15100 bed7d9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15099->15100 15101 bed823 15100->15101 15101->14894 15103 bf4ca1 15102->15103 15104 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15103->15104 15105 bed483 15104->15105 15105->14900 15106 bf4c2e 15105->15106 15107 bf4c5d 15106->15107 15108 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15107->15108 15109 bf4c86 15108->15109 15109->14901 15111 bf3e47 pre_c_initialization ___FrameUnwindToState 15110->15111 15111->14902 15112 bf6768 ___FrameUnwindToState 41 API calls 15111->15112 15115 bf4e3c 15112->15115 15113 bf583e _abort 41 API calls 15114 bf4e66 15113->15114 15115->15113 15126 becf88 15125->15126 15127 beff97 15126->15127 15128 beff9c ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 15127->15128 15147 bf0359 15128->15147 15132 beffb2 15133 beffbd 15132->15133 15161 bf0395 15132->15161 15133->14920 15135 beffaa 15135->14920 15202 bfa285 15136->15202 15139 beffc0 15140 beffc9 15139->15140 15146 beffda 15139->15146 15141 bf02cd ___vcrt_uninitialize_ptd 6 API calls 15140->15141 15142 beffce 15141->15142 15143 bf0395 ___vcrt_uninitialize_locks DeleteCriticalSection 15142->15143 15144 beffd3 15143->15144 15221 beff65 15144->15221 15146->14921 15148 bf0362 15147->15148 15150 bf038b 15148->15150 15151 beffa6 15148->15151 15165 befee5 15148->15165 15152 bf0395 ___vcrt_uninitialize_locks DeleteCriticalSection 15150->15152 15151->15135 15153 bf029a 15151->15153 15152->15151 15183 befdfa 15153->15183 15155 bf02a4 15156 bf02af 15155->15156 15188 befea8 15155->15188 15156->15132 15158 bf02bd 15159 bf02ca 15158->15159 15193 bf02cd 15158->15193 15159->15132 15162 bf03bf 15161->15162 15163 bf03a0 15161->15163 15162->15135 15164 bf03aa DeleteCriticalSection 15163->15164 15164->15162 15164->15164 15170 befcd9 15165->15170 15167 befeff 15168 beff1c InitializeCriticalSectionAndSpinCount 15167->15168 15169 beff08 15167->15169 15168->15169 15169->15148 15171 befd0d __crt_fast_encode_pointer 15170->15171 15173 befd09 15170->15173 15171->15167 15173->15171 15175 befd2d 15173->15175 15176 befd79 15173->15176 15174 befd39 GetProcAddress 15174->15171 15175->15171 15175->15174 15177 befd96 15176->15177 15178 befda1 LoadLibraryExW 15176->15178 15177->15173 15179 befdbd GetLastError 15178->15179 15181 befdd5 15178->15181 15180 befdc8 LoadLibraryExW 15179->15180 15179->15181 15180->15181 15181->15177 15182 befdec FreeLibrary 15181->15182 15182->15177 15184 befcd9 try_get_function 5 API calls 15183->15184 15185 befe14 15184->15185 15186 befe2c TlsAlloc 15185->15186 15187 befe1d 15185->15187 15187->15155 15189 befcd9 try_get_function 5 API calls 15188->15189 15190 befec2 15189->15190 15191 befedc TlsSetValue 15190->15191 15192 befed1 15190->15192 15191->15192 15192->15158 15194 bf02d7 15193->15194 15195 bf02dd 15193->15195 15197 befe34 15194->15197 15195->15156 15198 befcd9 try_get_function 5 API calls 15197->15198 15199 befe4e 15198->15199 15200 befe65 TlsFree 15199->15200 15201 befe5a 15199->15201 15200->15201 15201->15195 15205 bfa2a2 15202->15205 15206 bfa29e 15202->15206 15204 becf9a 15204->14924 15204->15139 15205->15206 15208 bf7ecb 15205->15208 15213 becc44 15206->15213 15209 bf7ed2 15208->15209 15210 bf7f15 GetStdHandle 15209->15210 15211 bf7f7d 15209->15211 15212 bf7f28 GetFileType 15209->15212 15210->15209 15211->15205 15212->15209 15214 becc4f IsProcessorFeaturePresent 15213->15214 15215 becc4d 15213->15215 15217 bed1ad 15214->15217 15215->15204 15220 bed171 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15217->15220 15219 bed290 15219->15204 15220->15219 15222 beff6e 15221->15222 15224 beff94 15221->15224 15223 beff7e FreeLibrary 15222->15223 15222->15224 15223->15222 15224->15146 15226 bf41aa 15225->15226 15231 bf41c3 15225->15231 15227 bf41b2 15226->15227 15232 bf4229 15226->15232 15227->14928 15229 bf41ba 15229->15227 15243 bf44f6 15229->15243 15231->14928 15233 bf4235 15232->15233 15234 bf4232 15232->15234 15253 bf9afa GetEnvironmentStringsW 15233->15253 15234->15229 15238 bf58db _free 20 API calls 15239 bf4277 15238->15239 15239->15229 15241 bf424d 15277 bf58db 15241->15277 15242 bf4242 15242->15238 15244 bf4503 15243->15244 15250 bf4508 15243->15250 15244->15231 15245 bf450e MultiByteToWideChar 15245->15250 15251 bf455d 15245->15251 15246 bf5963 ___FrameUnwindToState 20 API calls 15246->15250 15247 bf4563 15249 bf58db _free 20 API calls 15247->15249 15248 bf4532 MultiByteToWideChar 15248->15247 15248->15250 15249->15251 15250->15245 15250->15246 15250->15247 15250->15248 15250->15251 15252 bf58db _free 20 API calls 15250->15252 15251->15231 15252->15250 15254 bf9b0e 15253->15254 15255 bf423c 15253->15255 15283 bf5915 15254->15283 15255->15242 15260 bf434e 15255->15260 15257 bf9b22 15258 bf58db _free 20 API calls 15257->15258 15259 bf9b3c FreeEnvironmentStringsW 15258->15259 15259->15255 15262 bf436c 15260->15262 15261 bf5963 ___FrameUnwindToState 20 API calls 15266 bf43a6 15261->15266 15262->15261 15262->15262 15263 bf4417 15264 bf58db _free 20 API calls 15263->15264 15265 bf4431 15264->15265 15265->15241 15266->15263 15267 bf5963 ___FrameUnwindToState 20 API calls 15266->15267 15268 bf4419 15266->15268 15273 bf443b 15266->15273 15275 bf58db _free 20 API calls 15266->15275 15387 bf99dc 15266->15387 15267->15266 15396 bf4448 15268->15396 15272 bf58db _free 20 API calls 15272->15263 15402 bf085e IsProcessorFeaturePresent 15273->15402 15275->15266 15276 bf4447 15278 bf58e6 HeapFree 15277->15278 15279 bf590f __dosmaperr 15277->15279 15278->15279 15280 bf58fb 15278->15280 15279->15242 15281 bf6b46 __dosmaperr 18 API calls 15280->15281 15282 bf5901 GetLastError 15281->15282 15282->15279 15284 bf5953 15283->15284 15288 bf5923 ___FrameUnwindToState 15283->15288 15295 bf6b46 15284->15295 15286 bf593e RtlAllocateHeap 15287 bf5951 15286->15287 15286->15288 15287->15257 15288->15284 15288->15286 15290 bf39fc 15288->15290 15298 bf3a40 15290->15298 15292 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15293 bf3a3c 15292->15293 15293->15288 15294 bf3a12 15294->15292 15309 bf67ec GetLastError 15295->15309 15299 bf3a4c ___FrameUnwindToState 15298->15299 15304 bf8c4b EnterCriticalSection 15299->15304 15301 bf3a57 15305 bf3a89 15301->15305 15303 bf3a7e ___FrameUnwindToState 15303->15294 15304->15301 15308 bf8c93 LeaveCriticalSection 15305->15308 15307 bf3a90 15307->15303 15308->15307 15310 bf6805 15309->15310 15311 bf680b 15309->15311 15328 bf8254 15310->15328 15315 bf6862 SetLastError 15311->15315 15335 bf5963 15311->15335 15317 bf686b 15315->15317 15316 bf6825 15319 bf58db _free 17 API calls 15316->15319 15317->15287 15321 bf682b 15319->15321 15323 bf6859 SetLastError 15321->15323 15322 bf6841 15349 bf65da 15322->15349 15323->15317 15326 bf58db _free 17 API calls 15327 bf6852 15326->15327 15327->15315 15327->15323 15354 bf801d 15328->15354 15330 bf827b 15331 bf8287 15330->15331 15332 bf8293 TlsGetValue 15330->15332 15333 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15331->15333 15332->15331 15334 bf82a4 15333->15334 15334->15311 15341 bf5970 ___FrameUnwindToState 15335->15341 15336 bf59b0 15338 bf6b46 __dosmaperr 19 API calls 15336->15338 15337 bf599b HeapAlloc 15339 bf59ae 15337->15339 15337->15341 15338->15339 15339->15316 15342 bf82aa 15339->15342 15340 bf39fc new 7 API calls 15340->15341 15341->15336 15341->15337 15341->15340 15343 bf801d ___FrameUnwindToState 5 API calls 15342->15343 15344 bf82d1 15343->15344 15345 bf82ec TlsSetValue 15344->15345 15347 bf82e0 15344->15347 15345->15347 15346 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15348 bf683a 15346->15348 15347->15346 15348->15316 15348->15322 15367 bf65b2 15349->15367 15357 bf8049 15354->15357 15359 bf804d __crt_fast_encode_pointer 15354->15359 15355 bf806d 15358 bf8079 GetProcAddress 15355->15358 15355->15359 15357->15355 15357->15359 15360 bf80b9 15357->15360 15358->15359 15359->15330 15361 bf80da LoadLibraryExW 15360->15361 15365 bf80cf 15360->15365 15362 bf80f7 GetLastError 15361->15362 15366 bf810f 15361->15366 15364 bf8102 LoadLibraryExW 15362->15364 15362->15366 15363 bf8126 FreeLibrary 15363->15365 15364->15366 15365->15357 15366->15363 15366->15365 15373 bf64f2 15367->15373 15369 bf65d6 15370 bf6562 15369->15370 15379 bf63f6 15370->15379 15372 bf6586 15372->15326 15374 bf64fe ___FrameUnwindToState 15373->15374 15375 bf8c4b _abort EnterCriticalSection 15374->15375 15376 bf6508 15375->15376 15377 bf652e ___FrameUnwindToState LeaveCriticalSection 15376->15377 15378 bf6526 ___FrameUnwindToState 15377->15378 15378->15369 15380 bf6402 ___FrameUnwindToState 15379->15380 15381 bf8c4b _abort EnterCriticalSection 15380->15381 15382 bf640c 15381->15382 15383 bf671d ___FrameUnwindToState 20 API calls 15382->15383 15384 bf6424 15383->15384 15385 bf643a ___FrameUnwindToState LeaveCriticalSection 15384->15385 15386 bf6432 ___FrameUnwindToState 15385->15386 15386->15372 15388 bf99f7 15387->15388 15389 bf99e9 15387->15389 15390 bf6b46 __dosmaperr 20 API calls 15388->15390 15389->15388 15393 bf9a10 15389->15393 15391 bf9a01 15390->15391 15406 bf0831 15391->15406 15394 bf9a0b 15393->15394 15395 bf6b46 __dosmaperr 20 API calls 15393->15395 15394->15266 15395->15391 15400 bf441f 15396->15400 15401 bf4455 15396->15401 15397 bf446c 15398 bf58db _free 20 API calls 15397->15398 15398->15400 15399 bf58db _free 20 API calls 15399->15401 15400->15272 15401->15397 15401->15399 15403 bf0869 15402->15403 15420 bf0667 15403->15420 15409 bf07b6 15406->15409 15408 bf083d 15408->15394 15410 bf67ec _abort 20 API calls 15409->15410 15411 bf07cc 15410->15411 15412 bf082b 15411->15412 15413 bf07da 15411->15413 15414 bf085e std::_Deallocate 11 API calls 15412->15414 15418 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15413->15418 15415 bf0830 15414->15415 15416 bf07b6 std::_Deallocate 26 API calls 15415->15416 15417 bf083d 15416->15417 15417->15408 15419 bf0801 15418->15419 15419->15408 15421 bf0683 __cftof _abort 15420->15421 15422 bf06af IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15421->15422 15423 bf0780 _abort 15422->15423 15424 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15423->15424 15425 bf079e GetCurrentProcess TerminateProcess 15424->15425 15425->15276 15427 be1b74 15426->15427 15430 be1b76 EnterCriticalSection 15426->15430 15762 becdd3 15427->15762 15430->14934 15430->14935 15436 be2a8b 15435->15436 15437 be39f7 RegQueryValueExW 15435->15437 15440 be3b16 15436->15440 15438 be3a23 15437->15438 15439 be3a31 RegCloseKey 15437->15439 15438->15439 15439->15436 15443 be3b3a __cftof 15440->15443 15450 be3c4c 15440->15450 15441 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15442 be3c72 15441->15442 15442->14935 15444 be1b5f 35 API calls 15443->15444 15445 be3ba4 GetModuleHandleExW 15444->15445 15446 be3c0f LoadLibraryW 15445->15446 15447 be3bb1 GetModuleFileNameW 15445->15447 15448 be3c23 GetProcAddress 15446->15448 15446->15450 15447->15446 15452 be3bcd _wcsrchr 15447->15452 15449 be3c33 15448->15449 15449->15450 15451 be3c56 FreeLibrary 15449->15451 15450->15441 15451->15450 15452->15446 15454 be2880 __cftof __EH_prolog3_catch_GS 15453->15454 15776 be1dfc GetCurrentProcess OpenProcessToken 15454->15776 15456 be2899 _strcat 15457 be1b5f 35 API calls 15456->15457 15458 be2900 15457->15458 15459 be290a 15458->15459 15460 be29a1 15458->15460 15462 be17e7 78 API calls 15459->15462 15793 bed5cd 15460->15793 15464 be2925 15462->15464 15796 be1bcd GetCurrentProcess OpenProcessToken 15464->15796 15468 be2940 15825 be1ce5 AllocateAndInitializeSid 15468->15825 15471 be280c 77 API calls 15472 be295b 15471->15472 15837 be1d7f GetCurrentProcess OpenProcessToken 15472->15837 15475 be280c 77 API calls 15476 be2976 15475->15476 15477 be1b5f 35 API calls 15476->15477 15478 be2994 15477->15478 15478->15460 15767 bece19 EnterCriticalSection 15762->15767 15764 becdf3 15765 becddc 15765->15764 15768 bece72 15765->15768 15767->15765 15769 beceb0 15768->15769 15773 bece7f 15768->15773 15774 bece66 LeaveCriticalSection 15769->15774 15771 beceb5 WaitForSingleObjectEx 15775 bece19 EnterCriticalSection 15771->15775 15773->15765 15774->15771 15775->15773 15777 be1e2b GetLastError 15776->15777 15778 be1e35 GetTokenInformation 15776->15778 15788 be1e76 15777->15788 15779 be1e52 GetLastError 15778->15779 15780 be1e61 LocalAlloc 15778->15780 15779->15780 15783 be1e59 GetLastError 15779->15783 15784 be1e7b GetTokenInformation 15780->15784 15785 be1e72 GetLastError 15780->15785 15781 be1ead FindCloseChangeNotification 15782 be1eba 15781->15782 15786 be1ebe LocalFree 15782->15786 15787 be1ec9 15782->15787 15783->15788 15784->15785 15789 be1e92 GetSidSubAuthority 15784->15789 15785->15788 15786->15787 15790 be1ecd 15787->15790 15846 befc6b 15787->15846 15788->15781 15788->15782 15789->15788 15790->15456 15792 be1ee7 15794 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15793->15794 15795 bed5d8 15794->15795 15795->15795 15797 be1c0b 15796->15797 15798 be1c93 GetLastError 15796->15798 15849 be1fc4 15797->15849 15800 be1c9b 15798->15800 15802 be1cae 15800->15802 15803 be1ca6 CloseHandle 15800->15803 15804 be1cbb 15802->15804 15805 be1cb3 CloseHandle 15802->15805 15803->15802 15808 be1cbf 15804->15808 15809 be1cd3 15804->15809 15805->15804 15806 be1c4a 15811 be1c4f DuplicateToken 15806->15811 15812 be1c62 CreateWellKnownSid 15806->15812 15807 be1c14 GetTokenInformation 15807->15798 15810 be1c2f 15807->15810 15813 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15808->15813 15814 befc6b __CxxThrowException@8 RaiseException 15809->15814 15810->15806 15815 be1c35 GetTokenInformation 15810->15815 15811->15798 15811->15812 15812->15798 15816 be1c7e CheckTokenMembership 15812->15816 15817 be1ccf 15813->15817 15818 be1ce4 15814->15818 15815->15798 15815->15806 15816->15798 15816->15800 15819 be280c 15817->15819 15820 be2835 15819->15820 15863 be1969 15820->15863 15822 be2849 15823 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15822->15823 15824 be286b 15823->15824 15824->15468 15826 be1d3d GetLastError 15825->15826 15827 be1d2b CheckTokenMembership 15825->15827 15828 be1d45 15826->15828 15827->15826 15827->15828 15829 be1d4a FreeSid 15828->15829 15830 be1d56 15828->15830 15829->15830 15831 be1d6d 15830->15831 15832 be1d5a 15830->15832 15834 befc6b __CxxThrowException@8 RaiseException 15831->15834 15833 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15832->15833 15835 be1d69 15833->15835 15836 be1d7e 15834->15836 15835->15471 15838 be1daf GetTokenInformation 15837->15838 15839 be1da5 GetLastError 15837->15839 15838->15839 15840 be1dc8 15838->15840 15839->15840 15841 be1dd1 CloseHandle 15840->15841 15842 be1dde 15840->15842 15841->15842 15843 be1de2 15842->15843 15844 befc6b __CxxThrowException@8 RaiseException 15842->15844 15843->15475 15845 be1dfb 15844->15845 15848 befc8b 15846->15848 15847 befcbd RaiseException 15847->15792 15848->15847 15852 be1ee8 NetWkstaGetInfo 15849->15852 15853 be1f35 15852->15853 15854 be1f4a 15853->15854 15855 be1f43 NetApiBufferFree 15853->15855 15856 be1f4e __cftof 15854->15856 15857 be1fb1 15854->15857 15855->15854 15858 be1f62 GetVersionExW 15856->15858 15859 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15857->15859 15860 be1f7e GetVersionExW 15858->15860 15861 be1f95 15858->15861 15862 be1c10 15859->15862 15860->15861 15861->15857 15862->15806 15862->15807 15864 be1977 15863->15864 15865 be199f 15864->15865 15867 be193c 15864->15867 15865->15822 15868 be194e ___scrt_initialize_default_local_stdio_options 15867->15868 15871 bf3269 15868->15871 15874 bf0983 15871->15874 15875 bf09ab 15874->15875 15876 bf09c3 15874->15876 15878 bf6b46 __dosmaperr 20 API calls 15875->15878 15876->15875 15877 bf09cb 15876->15877 15891 bf0f45 15877->15891 15879 bf09b0 15878->15879 15881 bf0831 pre_c_initialization 26 API calls 15879->15881 15889 bf09bb 15881->15889 15883 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 15885 be195c 15883->15885 15885->15865 15889->15883 15892 bf0f62 15891->15892 15893 bf09db 15891->15893 15892->15893 15919 bf6768 GetLastError 15892->15919 15899 bf0edb 15893->15899 15895 bf0f83 15940 bf70fc 15895->15940 15900 bf0efa 15899->15900 15901 bf6b46 __dosmaperr 20 API calls 15900->15901 15902 bf0a53 15901->15902 15903 bf146f 15902->15903 15980 bf6354 15903->15980 15905 bf1494 15906 bf6b46 __dosmaperr 20 API calls 15905->15906 15907 bf1499 15906->15907 15909 bf0831 pre_c_initialization 26 API calls 15907->15909 15908 bf0a5e 15916 bf0fc8 15908->15916 15909->15908 15910 bf147f 15910->15905 15910->15908 15987 bf1744 15910->15987 15995 bf240d 15910->15995 16000 bf18b3 15910->16000 16005 bf1a6d 15910->16005 16034 bf1f81 15910->16034 15917 bf58db _free 20 API calls 15916->15917 15918 bf0fd8 15917->15918 15918->15889 15920 bf677e 15919->15920 15921 bf678a 15919->15921 15922 bf8254 ___FrameUnwindToState 11 API calls 15920->15922 15923 bf5963 ___FrameUnwindToState 20 API calls 15921->15923 15924 bf6784 15922->15924 15925 bf6796 15923->15925 15924->15921 15926 bf67d3 SetLastError 15924->15926 15927 bf679e 15925->15927 15928 bf82aa ___FrameUnwindToState 11 API calls 15925->15928 15926->15895 15929 bf58db _free 20 API calls 15927->15929 15930 bf67b3 15928->15930 15931 bf67a4 15929->15931 15930->15927 15932 bf67ba 15930->15932 15934 bf67df SetLastError 15931->15934 15933 bf65da ___FrameUnwindToState 20 API calls 15932->15933 15935 bf67c5 15933->15935 15948 bf583e 15934->15948 15937 bf58db _free 20 API calls 15935->15937 15939 bf67cc 15937->15939 15939->15926 15939->15934 15941 bf710f 15940->15941 15942 bf0f9c 15940->15942 15941->15942 15959 bfb124 15941->15959 15944 bf7129 15942->15944 15945 bf713c 15944->15945 15946 bf7151 15944->15946 15945->15946 15971 bf96c8 15945->15971 15946->15893 15949 bfa441 _abort EnterCriticalSection LeaveCriticalSection 15948->15949 15950 bf5843 15949->15950 15951 bf584e 15950->15951 15954 bfa49c _abort 40 API calls 15950->15954 15952 bf5876 15951->15952 15953 bf5858 IsProcessorFeaturePresent 15951->15953 15956 bf3e09 _abort 31 API calls 15952->15956 15955 bf5863 15953->15955 15954->15951 15957 bf0667 _abort 8 API calls 15955->15957 15958 bf5880 15956->15958 15957->15952 15960 bfb130 ___FrameUnwindToState 15959->15960 15961 bf6768 ___FrameUnwindToState 41 API calls 15960->15961 15962 bfb139 15961->15962 15963 bfb187 ___FrameUnwindToState 15962->15963 15964 bf8c4b _abort EnterCriticalSection 15962->15964 15963->15942 15965 bfb157 15964->15965 15966 bfb19b __cftof 20 API calls 15965->15966 15967 bfb16b 15966->15967 15968 bfb18a __cftof LeaveCriticalSection 15967->15968 15969 bfb17e 15968->15969 15969->15963 15970 bf583e _abort 41 API calls 15969->15970 15970->15963 15972 bf96d4 ___FrameUnwindToState 15971->15972 15973 bf6768 ___FrameUnwindToState 41 API calls 15972->15973 15975 bf96de 15973->15975 15974 bf8c4b _abort EnterCriticalSection 15974->15975 15975->15974 15976 bf9762 ___FrameUnwindToState 15975->15976 15977 bf9759 __cftof LeaveCriticalSection 15975->15977 15978 bf583e _abort 41 API calls 15975->15978 15979 bf58db _free 20 API calls 15975->15979 15976->15946 15977->15975 15978->15975 15979->15975 15981 bf636c 15980->15981 15982 bf6359 15980->15982 15981->15910 15983 bf6b46 __dosmaperr 20 API calls 15982->15983 15984 bf635e 15983->15984 15985 bf0831 pre_c_initialization 26 API calls 15984->15985 15986 bf6369 15985->15986 15986->15910 16056 bf17ac 15987->16056 15989 bf1749 15990 bf1760 15989->15990 15991 bf6b46 __dosmaperr 20 API calls 15989->15991 15990->15910 15992 bf1752 15991->15992 15993 bf0831 pre_c_initialization 26 API calls 15992->15993 15994 bf175d 15993->15994 15994->15910 15996 bf241d 15995->15996 15997 bf2413 15995->15997 15996->15910 16059 bf1299 15997->16059 16001 bf18b9 16000->16001 16002 bf18c3 16000->16002 16003 bf1299 45 API calls 16001->16003 16002->15910 16004 bf18c2 16003->16004 16004->15910 16006 bf1a8e 16005->16006 16007 bf1a74 16005->16007 16010 bf6b46 __dosmaperr 20 API calls 16006->16010 16015 bf1abe 16006->16015 16008 bf1f99 16007->16008 16009 bf2005 16007->16009 16007->16015 16019 bf1fa6 16008->16019 16023 bf1fdd 16008->16023 16013 bf200c 16009->16013 16014 bf204b 16009->16014 16009->16023 16011 bf1aaa 16010->16011 16012 bf0831 pre_c_initialization 26 API calls 16011->16012 16017 bf1ab5 16012->16017 16018 bf2011 16013->16018 16028 bf1fb4 16013->16028 16090 bf2b57 16014->16090 16015->15910 16017->15910 16018->16023 16024 bf2016 16018->16024 16022 bf1fec 16019->16022 16019->16028 16032 bf1fc2 16019->16032 16033 bf1fd6 16022->16033 16062 bf2852 16022->16062 16023->16032 16023->16033 16076 bf297a 16023->16076 16025 bf201b 16024->16025 16026 bf2029 16024->16026 16025->16033 16066 bf2b38 16025->16066 16070 bf2ac4 16026->16070 16028->16032 16028->16033 16082 bf2586 16028->16082 16032->16033 16093 bf2e9f 16032->16093 16033->15910 16035 bf1f99 16034->16035 16036 bf2005 16034->16036 16041 bf1fdd 16035->16041 16042 bf1fa6 16035->16042 16037 bf200c 16036->16037 16038 bf204b 16036->16038 16036->16041 16039 bf2011 16037->16039 16047 bf1fb4 16037->16047 16040 bf2b57 26 API calls 16038->16040 16039->16041 16045 bf2016 16039->16045 16054 bf1fc2 16040->16054 16043 bf297a 26 API calls 16041->16043 16041->16054 16055 bf1fd6 16041->16055 16046 bf1fec 16042->16046 16042->16047 16042->16054 16043->16054 16044 bf2586 75 API calls 16044->16054 16048 bf201b 16045->16048 16049 bf2029 16045->16049 16051 bf2852 43 API calls 16046->16051 16046->16055 16047->16044 16047->16054 16047->16055 16052 bf2b38 26 API calls 16048->16052 16048->16055 16050 bf2ac4 26 API calls 16049->16050 16050->16054 16051->16054 16052->16054 16053 bf2e9f 43 API calls 16053->16055 16054->16053 16054->16055 16055->15910 16057 bf1852 26 API calls 16056->16057 16058 bf17b8 16057->16058 16058->15989 16060 bf6b74 45 API calls 16059->16060 16061 bf12c0 16060->16061 16061->15910 16063 bf286a 16062->16063 16064 bf289f 16063->16064 16065 bf6e01 __cftof 43 API calls 16063->16065 16064->16032 16065->16064 16067 bf2b44 16066->16067 16068 bf297a 26 API calls 16067->16068 16069 bf2b56 16068->16069 16069->16032 16072 bf2ad9 16070->16072 16071 bf6b46 __dosmaperr 20 API calls 16073 bf2ae2 16071->16073 16072->16071 16075 bf2aed 16072->16075 16074 bf0831 pre_c_initialization 26 API calls 16073->16074 16074->16075 16075->16032 16077 bf298b 16076->16077 16078 bf6b46 __dosmaperr 20 API calls 16077->16078 16081 bf29b5 16077->16081 16079 bf29aa 16078->16079 16080 bf0831 pre_c_initialization 26 API calls 16079->16080 16080->16081 16081->16032 16083 bf259c 16082->16083 16084 bf0b17 21 API calls 16083->16084 16085 bf25e3 16084->16085 16086 bf7a21 68 API calls 16085->16086 16087 bf265d 16086->16087 16088 bf123d 49 API calls 16087->16088 16089 bf267c 16087->16089 16088->16089 16089->16032 16089->16089 16091 bf297a 26 API calls 16090->16091 16092 bf2b6e 16091->16092 16092->16032 16097 bf2f11 16093->16097 16098 bf2ebc 16093->16098 16094 bf6e01 __cftof 43 API calls 16094->16098 16095 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 16096 bf2f40 16095->16096 16096->16033 16097->16095 16098->16094 16098->16097 19275 bf3518 19285 bf8679 19275->19285 19279 bf3525 19298 bf875a 19279->19298 19282 bf354f 19283 bf58db _free 20 API calls 19282->19283 19284 bf355a 19283->19284 19302 bf8682 19285->19302 19287 bf3520 19288 bf852c 19287->19288 19289 bf8538 ___FrameUnwindToState 19288->19289 19322 bf8c4b EnterCriticalSection 19289->19322 19291 bf85ae 19336 bf85c3 19291->19336 19293 bf85ba ___FrameUnwindToState 19293->19279 19294 bf8582 DeleteCriticalSection 19296 bf58db _free 20 API calls 19294->19296 19297 bf8543 19296->19297 19297->19291 19297->19294 19323 bfdbda 19297->19323 19299 bf3534 DeleteCriticalSection 19298->19299 19300 bf8770 19298->19300 19299->19279 19299->19282 19300->19299 19301 bf58db _free 20 API calls 19300->19301 19301->19299 19303 bf868e ___FrameUnwindToState 19302->19303 19312 bf8c4b EnterCriticalSection 19303->19312 19305 bf8731 19317 bf8751 19305->19317 19308 bf873d ___FrameUnwindToState 19308->19287 19310 bf8632 69 API calls 19311 bf869d 19310->19311 19311->19305 19311->19310 19313 bf3564 EnterCriticalSection 19311->19313 19314 bf8727 19311->19314 19312->19311 19313->19311 19320 bf3578 LeaveCriticalSection 19314->19320 19316 bf872f 19316->19311 19321 bf8c93 LeaveCriticalSection 19317->19321 19319 bf8758 19319->19308 19320->19316 19321->19319 19322->19297 19324 bfdbe6 ___FrameUnwindToState 19323->19324 19325 bfdc0c 19324->19325 19326 bfdbf7 19324->19326 19332 bfdc07 ___FrameUnwindToState 19325->19332 19339 bf3564 EnterCriticalSection 19325->19339 19327 bf6b46 __dosmaperr 20 API calls 19326->19327 19329 bfdbfc 19327->19329 19331 bf0831 pre_c_initialization 26 API calls 19329->19331 19330 bfdc28 19340 bfdb64 19330->19340 19331->19332 19332->19297 19334 bfdc33 19356 bfdc50 19334->19356 19436 bf8c93 LeaveCriticalSection 19336->19436 19338 bf85ca 19338->19293 19339->19330 19341 bfdb86 19340->19341 19342 bfdb71 19340->19342 19345 bf85cc 65 API calls 19341->19345 19347 bfdb81 19341->19347 19343 bf6b46 __dosmaperr 20 API calls 19342->19343 19344 bfdb76 19343->19344 19346 bf0831 pre_c_initialization 26 API calls 19344->19346 19348 bfdb9a 19345->19348 19346->19347 19347->19334 19349 bf875a 20 API calls 19348->19349 19350 bfdba2 19349->19350 19351 bf7cc3 26 API calls 19350->19351 19352 bfdba8 19351->19352 19359 bff58d 19352->19359 19355 bf58db _free 20 API calls 19355->19347 19435 bf3578 LeaveCriticalSection 19356->19435 19358 bfdc58 19358->19332 19360 bff59c 19359->19360 19361 bff5b1 19359->19361 19362 bf6b33 __dosmaperr 20 API calls 19360->19362 19363 bff5ec 19361->19363 19367 bff5d8 19361->19367 19364 bff5a1 19362->19364 19365 bf6b33 __dosmaperr 20 API calls 19363->19365 19366 bf6b46 __dosmaperr 20 API calls 19364->19366 19368 bff5f1 19365->19368 19372 bfdbae 19366->19372 19374 bff565 19367->19374 19370 bf6b46 __dosmaperr 20 API calls 19368->19370 19371 bff5f9 19370->19371 19373 bf0831 pre_c_initialization 26 API calls 19371->19373 19372->19347 19372->19355 19373->19372 19377 bff4e3 19374->19377 19376 bff589 19376->19372 19378 bff4ef ___FrameUnwindToState 19377->19378 19388 bfa8c3 EnterCriticalSection 19378->19388 19380 bff4fd 19381 bff52f 19380->19381 19382 bff524 19380->19382 19384 bf6b46 __dosmaperr 20 API calls 19381->19384 19389 bff60c 19382->19389 19385 bff52a 19384->19385 19404 bff559 19385->19404 19387 bff54c ___FrameUnwindToState 19387->19376 19388->19380 19407 bfa99a 19389->19407 19391 bff61c 19392 bff622 19391->19392 19393 bff654 19391->19393 19396 bfa99a 26 API calls 19391->19396 19420 bfa909 19392->19420 19393->19392 19397 bfa99a 26 API calls 19393->19397 19399 bff64b 19396->19399 19400 bff660 CloseHandle 19397->19400 19398 bff69c 19398->19385 19402 bfa99a 26 API calls 19399->19402 19400->19392 19403 bff66c GetLastError 19400->19403 19402->19393 19403->19392 19434 bfa8e6 LeaveCriticalSection 19404->19434 19406 bff563 19406->19387 19408 bfa9bc 19407->19408 19409 bfa9a7 19407->19409 19411 bf6b33 __dosmaperr 20 API calls 19408->19411 19413 bfa9e1 19408->19413 19410 bf6b33 __dosmaperr 20 API calls 19409->19410 19412 bfa9ac 19410->19412 19414 bfa9ec 19411->19414 19415 bf6b46 __dosmaperr 20 API calls 19412->19415 19413->19391 19416 bf6b46 __dosmaperr 20 API calls 19414->19416 19417 bfa9b4 19415->19417 19418 bfa9f4 19416->19418 19417->19391 19419 bf0831 pre_c_initialization 26 API calls 19418->19419 19419->19417 19421 bfa97f 19420->19421 19423 bfa918 19420->19423 19422 bf6b46 __dosmaperr 20 API calls 19421->19422 19424 bfa984 19422->19424 19423->19421 19428 bfa942 19423->19428 19425 bf6b33 __dosmaperr 20 API calls 19424->19425 19426 bfa96f 19425->19426 19426->19398 19429 bf6b10 19426->19429 19427 bfa969 SetStdHandle 19427->19426 19428->19426 19428->19427 19430 bf6b33 __dosmaperr 20 API calls 19429->19430 19431 bf6b1b __dosmaperr 19430->19431 19432 bf6b46 __dosmaperr 20 API calls 19431->19432 19433 bf6b2e 19432->19433 19433->19398 19434->19406 19435->19358 19436->19338 19476 bfb77f 19477 bfb78b ___FrameUnwindToState 19476->19477 19484 bf8c4b EnterCriticalSection 19477->19484 19479 bfb796 19485 bfb7d4 19479->19485 19483 bfb7c0 ___FrameUnwindToState 19484->19479 19486 bfb7f6 19485->19486 19487 bfb7e3 19485->19487 19490 bfb849 19486->19490 19491 bfb808 19486->19491 19488 bf6b46 __dosmaperr 20 API calls 19487->19488 19489 bfb7e8 19488->19489 19492 bf0831 pre_c_initialization 26 API calls 19489->19492 19493 bf6b46 __dosmaperr 20 API calls 19490->19493 19506 bfb70f 19491->19506 19497 bfb7ac 19492->19497 19494 bfb84e 19493->19494 19496 bf0831 pre_c_initialization 26 API calls 19494->19496 19496->19497 19503 bfb7cb 19497->19503 19499 bf5881 ___std_exception_copy 26 API calls 19500 bfb864 19499->19500 19500->19497 19501 bf085e std::_Deallocate 11 API calls 19500->19501 19502 bfb87b 19501->19502 19510 bf8c93 LeaveCriticalSection 19503->19510 19505 bfb7d2 19505->19483 19508 bfb71c 19506->19508 19507 bfb770 19507->19497 19507->19499 19508->19507 19509 bfecdc 49 API calls 19508->19509 19509->19508 19510->19505 17995 bfa27c 17998 bfa2a2 17995->17998 17999 bfa29e 17995->17999 17996 becc44 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 17997 bfa304 17996->17997 17998->17999 18000 bf7ecb 2 API calls 17998->18000 17999->17996 18000->17998 19605 bfd75b 19606 bf7cc3 26 API calls 19605->19606 19607 bfd769 19606->19607 19608 bfd798 19607->19608 19609 bfd777 19607->19609 19611 bfd7a5 19608->19611 19616 bfd7b2 19608->19616 19610 bf6b46 __dosmaperr 20 API calls 19609->19610 19615 bfd77c 19610->19615 19612 bf6b46 __dosmaperr 20 API calls 19611->19612 19612->19615 19613 bfd842 19625 bfd93c 19613->19625 19616->19613 19616->19615 19617 bfda26 26 API calls 19616->19617 19618 bfd835 19616->19618 19617->19618 19618->19613 19620 bff486 19618->19620 19621 bf5915 __onexit 21 API calls 19620->19621 19622 bff4a1 19621->19622 19623 bf58db _free 20 API calls 19622->19623 19624 bff4ab 19623->19624 19624->19613 19626 bf7cc3 26 API calls 19625->19626 19627 bfd94b 19626->19627 19628 bfd95d 19627->19628 19629 bfd9f5 19627->19629 19631 bfd97e 19628->19631 19634 bfd9a6 19628->19634 19630 bfe319 65 API calls 19629->19630 19633 bfd98b 19630->19633 19632 bfe319 65 API calls 19631->19632 19632->19633 19633->19615 19634->19633 19636 bff450 19634->19636 19639 bff2cd 19636->19639 19638 bff466 19638->19633 19640 bff2d9 ___FrameUnwindToState 19639->19640 19641 bff2f9 19640->19641 19642 bff2e1 19640->19642 19643 bff3ad 19641->19643 19649 bff331 19641->19649 19644 bf6b33 __dosmaperr 20 API calls 19642->19644 19645 bf6b33 __dosmaperr 20 API calls 19643->19645 19646 bff2e6 19644->19646 19648 bff3b2 19645->19648 19647 bf6b46 __dosmaperr 20 API calls 19646->19647 19658 bff2ee ___FrameUnwindToState 19647->19658 19650 bf6b46 __dosmaperr 20 API calls 19648->19650 19664 bfa8c3 EnterCriticalSection 19649->19664 19652 bff3ba 19650->19652 19654 bf0831 pre_c_initialization 26 API calls 19652->19654 19653 bff337 19655 bff35b 19653->19655 19656 bff370 19653->19656 19654->19658 19657 bf6b46 __dosmaperr 20 API calls 19655->19657 19665 bff3d2 19656->19665 19660 bff360 19657->19660 19658->19638 19662 bf6b33 __dosmaperr 20 API calls 19660->19662 19661 bff36b 19674 bff3a5 19661->19674 19662->19661 19664->19653 19666 bfa99a 26 API calls 19665->19666 19667 bff3e4 19666->19667 19668 bff3fd SetFilePointerEx 19667->19668 19669 bff3ec 19667->19669 19670 bff415 GetLastError 19668->19670 19671 bff3f1 19668->19671 19672 bf6b46 __dosmaperr 20 API calls 19669->19672 19673 bf6b10 __dosmaperr 20 API calls 19670->19673 19671->19661 19672->19671 19673->19671 19677 bfa8e6 LeaveCriticalSection 19674->19677 19676 bff3ab 19676->19658 19677->19676 18511 bf6653 18512 bf665e 18511->18512 18513 bf666e 18511->18513 18517 bf6674 18512->18517 18516 bf58db _free 20 API calls 18516->18513 18518 bf6687 18517->18518 18519 bf668d 18517->18519 18520 bf58db _free 20 API calls 18518->18520 18521 bf58db _free 20 API calls 18519->18521 18520->18519 18522 bf6699 18521->18522 18523 bf58db _free 20 API calls 18522->18523 18524 bf66a4 18523->18524 18525 bf58db _free 20 API calls 18524->18525 18526 bf66af 18525->18526 18527 bf58db _free 20 API calls 18526->18527 18528 bf66ba 18527->18528 18529 bf58db _free 20 API calls 18528->18529 18530 bf66c5 18529->18530 18531 bf58db _free 20 API calls 18530->18531 18532 bf66d0 18531->18532 18533 bf58db _free 20 API calls 18532->18533 18534 bf66db 18533->18534 18535 bf58db _free 20 API calls 18534->18535 18536 bf66e6 18535->18536 18537 bf58db _free 20 API calls 18536->18537 18538 bf66f4 18537->18538 18543 bf653a 18538->18543 18549 bf6446 18543->18549 18545 bf655e 18546 bf658a 18545->18546 18562 bf64a7 18546->18562 18548 bf65ae 18548->18516 18550 bf6452 ___FrameUnwindToState 18549->18550 18557 bf8c4b EnterCriticalSection 18550->18557 18553 bf645c 18554 bf58db _free 20 API calls 18553->18554 18556 bf6486 18553->18556 18554->18556 18555 bf6493 ___FrameUnwindToState 18555->18545 18558 bf649b 18556->18558 18557->18553 18561 bf8c93 LeaveCriticalSection 18558->18561 18560 bf64a5 18560->18555 18561->18560 18563 bf64b3 ___FrameUnwindToState 18562->18563 18570 bf8c4b EnterCriticalSection 18563->18570 18565 bf64bd 18571 bf671d 18565->18571 18567 bf64d0 18575 bf64e6 18567->18575 18569 bf64de ___FrameUnwindToState 18569->18548 18570->18565 18572 bf6753 __cftof 18571->18572 18573 bf672c __cftof 18571->18573 18572->18567 18573->18572 18578 bfaed7 18573->18578 18692 bf8c93 LeaveCriticalSection 18575->18692 18577 bf64f0 18577->18569 18579 bfaf57 18578->18579 18582 bfaeed 18578->18582 18581 bf58db _free 20 API calls 18579->18581 18604 bfafa5 18579->18604 18583 bfaf79 18581->18583 18582->18579 18584 bfaf20 18582->18584 18588 bf58db _free 20 API calls 18582->18588 18585 bf58db _free 20 API calls 18583->18585 18590 bf58db _free 20 API calls 18584->18590 18605 bfaf42 18584->18605 18586 bfaf8c 18585->18586 18589 bf58db _free 20 API calls 18586->18589 18587 bf58db _free 20 API calls 18591 bfaf4c 18587->18591 18593 bfaf15 18588->18593 18596 bfaf9a 18589->18596 18597 bfaf37 18590->18597 18598 bf58db _free 20 API calls 18591->18598 18592 bfb013 18599 bf58db _free 20 API calls 18592->18599 18606 bfaa51 18593->18606 18594 bfafb3 18594->18592 18602 bf58db 20 API calls _free 18594->18602 18600 bf58db _free 20 API calls 18596->18600 18634 bfab4f 18597->18634 18598->18579 18603 bfb019 18599->18603 18600->18604 18602->18594 18603->18572 18646 bfb04a 18604->18646 18605->18587 18607 bfaa62 18606->18607 18633 bfab4b 18606->18633 18608 bfaa73 18607->18608 18609 bf58db _free 20 API calls 18607->18609 18610 bfaa85 18608->18610 18612 bf58db _free 20 API calls 18608->18612 18609->18608 18611 bfaa97 18610->18611 18613 bf58db _free 20 API calls 18610->18613 18614 bfaaa9 18611->18614 18615 bf58db _free 20 API calls 18611->18615 18612->18610 18613->18611 18616 bfaabb 18614->18616 18617 bf58db _free 20 API calls 18614->18617 18615->18614 18618 bfaacd 18616->18618 18620 bf58db _free 20 API calls 18616->18620 18617->18616 18619 bfaadf 18618->18619 18621 bf58db _free 20 API calls 18618->18621 18622 bf58db _free 20 API calls 18619->18622 18624 bfaaf1 18619->18624 18620->18618 18621->18619 18622->18624 18623 bfab03 18626 bfab15 18623->18626 18628 bf58db _free 20 API calls 18623->18628 18624->18623 18625 bf58db _free 20 API calls 18624->18625 18625->18623 18627 bfab27 18626->18627 18629 bf58db _free 20 API calls 18626->18629 18630 bfab39 18627->18630 18631 bf58db _free 20 API calls 18627->18631 18628->18626 18629->18627 18632 bf58db _free 20 API calls 18630->18632 18630->18633 18631->18630 18632->18633 18633->18584 18635 bfab5c 18634->18635 18645 bfabb4 18634->18645 18636 bfab6c 18635->18636 18637 bf58db _free 20 API calls 18635->18637 18638 bfab7e 18636->18638 18639 bf58db _free 20 API calls 18636->18639 18637->18636 18640 bf58db _free 20 API calls 18638->18640 18642 bfab90 18638->18642 18639->18638 18640->18642 18641 bfaba2 18644 bf58db _free 20 API calls 18641->18644 18641->18645 18642->18641 18643 bf58db _free 20 API calls 18642->18643 18643->18641 18644->18645 18645->18605 18647 bfb057 18646->18647 18651 bfb075 18646->18651 18647->18651 18652 bfabf4 18647->18652 18650 bf58db _free 20 API calls 18650->18651 18651->18594 18653 bfacd2 18652->18653 18654 bfac05 18652->18654 18653->18650 18688 bfabb8 18654->18688 18657 bfabb8 __cftof 20 API calls 18658 bfac18 18657->18658 18659 bfabb8 __cftof 20 API calls 18658->18659 18660 bfac23 18659->18660 18661 bfabb8 __cftof 20 API calls 18660->18661 18662 bfac2e 18661->18662 18663 bfabb8 __cftof 20 API calls 18662->18663 18664 bfac3c 18663->18664 18665 bf58db _free 20 API calls 18664->18665 18666 bfac47 18665->18666 18667 bf58db _free 20 API calls 18666->18667 18668 bfac52 18667->18668 18669 bf58db _free 20 API calls 18668->18669 18670 bfac5d 18669->18670 18671 bfabb8 __cftof 20 API calls 18670->18671 18672 bfac6b 18671->18672 18673 bfabb8 __cftof 20 API calls 18672->18673 18674 bfac79 18673->18674 18675 bfabb8 __cftof 20 API calls 18674->18675 18676 bfac8a 18675->18676 18677 bfabb8 __cftof 20 API calls 18676->18677 18678 bfac98 18677->18678 18679 bfabb8 __cftof 20 API calls 18678->18679 18680 bfaca6 18679->18680 18681 bf58db _free 20 API calls 18680->18681 18682 bfacb1 18681->18682 18683 bf58db _free 20 API calls 18682->18683 18684 bfacbc 18683->18684 18685 bf58db _free 20 API calls 18684->18685 18686 bfacc7 18685->18686 18687 bf58db _free 20 API calls 18686->18687 18687->18653 18689 bfabef 18688->18689 18690 bfabdf 18688->18690 18689->18657 18690->18689 18691 bf58db _free 20 API calls 18690->18691 18691->18690 18692->18577

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 375 be20d3-be20ef call bed612 call be1fc4 380 be217e-be2185 call bed5bc 375->380 381 be20f5-be2142 call be222c call be2573 LoadLibraryW 375->381 388 be2168-be2179 call be21d5 * 2 381->388 389 be2144-be2152 GetProcAddress 381->389 388->380 391 be2158-be215a 389->391 392 be2154-be2156 389->392 391->388 393 be215c-be2165 FreeLibrary 391->393 392->391 393->388
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00BE20DA
                                                                    • Part of subcall function 00BE222C: _wcslen.LIBCMT ref: 00BE223F
                                                                    • Part of subcall function 00BE2573: __EH_prolog3.LIBCMT ref: 00BE257A
                                                                  • LoadLibraryW.KERNELBASE(?,?,?,?,?,?,.dll,?,?,?,?,?,00000034), ref: 00BE2137
                                                                  • GetProcAddress.KERNEL32(00000000,CreateApoControl), ref: 00BE214A
                                                                  • FreeLibrary.KERNEL32(00000001,?,?,?,?,?,.dll,?,?,?,?,?,00000034), ref: 00BE215F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Library$AddressFreeH_prolog3H_prolog3_LoadProc_wcslen
                                                                  • String ID: .dll$ApoControl$CreateApoControl
                                                                  • API String ID: 3857411221-1396397024
                                                                  • Opcode ID: b68460ea561068397dab16c41fb2d8ddc898c2fa4749cbf80d272d1c8884d124
                                                                  • Instruction ID: e8c6be94819f46d6a8f33d33722636231a06267702b761561357cdca7713ba39
                                                                  • Opcode Fuzzy Hash: b68460ea561068397dab16c41fb2d8ddc898c2fa4749cbf80d272d1c8884d124
                                                                  • Instruction Fuzzy Hash: F7113D70900384DECF10EFA6CD05B9EBBF8EF54710F504459E545B3290DB709A45CB56
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 410 be1ee8-be1f33 NetWkstaGetInfo 411 be1f3f-be1f41 410->411 412 be1f35-be1f3d 410->412 413 be1f4a-be1f4c 411->413 414 be1f43-be1f44 NetApiBufferFree 411->414 412->411 415 be1f4e-be1f7c call beeb20 GetVersionExW 413->415 416 be1fb1 413->416 414->413 421 be1f7e-be1f93 GetVersionExW 415->421 422 be1f99-be1faf 415->422 418 be1fb3-be1fc3 call becc44 416->418 421->422 424 be1f95-be1f97 421->424 422->416 424->418
                                                                  APIs
                                                                  • NetWkstaGetInfo.NETAPI32(00000000,00000064,?), ref: 00BE1F1E
                                                                  • NetApiBufferFree.NETAPI32(?), ref: 00BE1F44
                                                                  • GetVersionExW.KERNEL32(?), ref: 00BE1F78
                                                                  • GetVersionExW.KERNEL32(?), ref: 00BE1F8F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Version$BufferFreeInfoWksta
                                                                  • String ID:
                                                                  • API String ID: 4063530079-0
                                                                  • Opcode ID: 1c68efa8e490afd26f6f50babc33764aae8fc754408896fa8c96b71aa7da530a
                                                                  • Instruction ID: dac995bccf9325613a8f50ab6ea1cf039f8f4ffe1d3f3b8f5dd758f76ca8a083
                                                                  • Opcode Fuzzy Hash: 1c68efa8e490afd26f6f50babc33764aae8fc754408896fa8c96b71aa7da530a
                                                                  • Instruction Fuzzy Hash: C9218CB4A012199BDB24DF29DC41BE9B7F8FB5C300F1045EAA889A3340DB309D548FD0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 504 bf3d31-bf3d3d call bf846f 507 bf3d5f-bf3d6b call bf3d72 ExitProcess 504->507 508 bf3d3f-bf3d4d GetPEB 504->508 508->507 509 bf3d4f-bf3d59 GetCurrentProcess TerminateProcess 508->509 509->507
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000000,?,00BF3D07,00000000,00C0C2C0,0000000C,00BF3E1A,00000000,00000002,00000000), ref: 00BF3D52
                                                                  • TerminateProcess.KERNEL32(00000000,?,00BF3D07,00000000,00C0C2C0,0000000C,00BF3E1A,00000000,00000002,00000000), ref: 00BF3D59
                                                                  • ExitProcess.KERNEL32 ref: 00BF3D6B
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CurrentExitTerminate
                                                                  • String ID:
                                                                  • API String ID: 1703294689-0
                                                                  • Opcode ID: 50950a4a2c54450bf5aae19eecc30753cb79a0102811654875262452b0549029
                                                                  • Instruction ID: 8d7a448c7bb98332c9849402f4f214523e2f71846e7e9466b600031381132ed0
                                                                  • Opcode Fuzzy Hash: 50950a4a2c54450bf5aae19eecc30753cb79a0102811654875262452b0549029
                                                                  • Instruction Fuzzy Hash: B0E09235000588ABCB11AF54DD09B6D7BAEEB45741F014064FA099B132CF35DA46CA90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 be2a50-be2a84 call bed612 call be1b5f EnterCriticalSection 5 be2a86-be2a90 call be39cc call be3b16 0->5 6 be2a95-be2aae LeaveCriticalSection CoInitialize call be2871 0->6 5->6 12 be2b0b-be2b38 call be21b0 call be384a call be21d5 6->12 13 be2ab0-be2ab4 6->13 29 be2b3e-be2b4e call be1b5f 12->29 30 be2c43-be2c6a call be21b0 call be384a call be21d5 12->30 13->12 15 be2ab6-be2abe call be1b5f 13->15 21 be2af9-be2b06 call be39a0 15->21 22 be2ac0-be2af1 call be17e7 call be19bd call be1b5f 15->22 32 be319e 21->32 22->21 48 be2af3-be2af5 22->48 42 be2b86-be2ba8 call be39a0 call be20d3 29->42 43 be2b50-be2b7e call be17e7 call be19bd call be1b5f 29->43 58 be2d5e-be2d85 call be21b0 call be384a call be21d5 30->58 59 be2c70-be2c95 call be39a0 call be20d3 30->59 33 be319f-be31ac CoUninitialize call bed5bc 32->33 62 be2baa 42->62 63 be2bb9-be2bbc 42->63 43->42 69 be2b80-be2b82 43->69 48->21 88 be2e3b-be2e62 call be21b0 call be384a call be21d5 58->88 89 be2d8b-be2dcd SetConsoleTitleW call be39a0 call be4b82 call be39a0 call be1b5f 58->89 77 be2c97-be2c9e 59->77 78 be2ca0-be2ca2 59->78 72 be2baf-be2bb7 62->72 67 be2bc2-be2bdb call be39a0 63->67 76 be2be0-be2bed call be1b5f 67->76 69->42 72->67 84 be2bef-be2bf2 76->84 85 be2c18-be2c1c 76->85 81 be2ca3-be2ccb call be39a0 call be1b5f 77->81 78->81 112 be2ccd-be2cd1 81->112 113 be2d03-be2d06 81->113 91 be2d4e-be2d54 call be2186 84->91 92 be2bf8-be2c13 call be17e7 84->92 85->91 93 be2c22-be2c3e call be17e7 85->93 129 be302e-be305a call be21b0 call be384a call be21d5 call be1b5f 88->129 130 be2e68-be2e6f 88->130 137 be2dcf-be2dd3 89->137 138 be2e0c-be2e10 89->138 104 be2d59 91->104 110 be2cf3-be2d01 call be19bd 92->110 111 be2d27-be2d30 call be19bd 93->111 104->33 128 be2d35-be2d46 call be19bd call be1b5f 110->128 111->128 112->91 119 be2cd3-be2cee call be17e7 112->119 113->91 117 be2d08-be2d22 call be17e7 113->117 117->111 119->110 128->91 154 be2d48-be2d4a 128->154 177 be3153-be3157 129->177 178 be3060-be306b 129->178 134 be2e81-be2ea0 call be222c 130->134 135 be2e71-be2e7f call be21b0 130->135 151 be2ea1-be2ec1 call be2671 134->151 135->151 137->33 143 be2dd9-be2e07 call be17e7 call be19bd 137->143 138->33 146 be2e16-be2e36 call be17e7 138->146 171 be3138-be3149 call be19bd call be1b5f 143->171 162 be312a-be3133 call be19bd 146->162 163 be2ed2-be2ed9 151->163 164 be2ec3-be2ecd call be21d5 151->164 154->91 162->171 169 be2edb-be2ee2 call be21d5 163->169 170 be2ee7-be2ef0 call be1b5f 163->170 164->163 169->170 188 be2f42-be2f98 call be39a0 call be38bd call be39a0 call be31ad call be39a0 call be1b5f 170->188 189 be2ef2-be2f3a call be17e7 call be19bd call be3970 call be1b5f 170->189 171->33 198 be314b-be3151 171->198 183 be3159-be318c call be17e7 call be19bd call be1b5f 177->183 184 be3194-be3199 call be39a0 177->184 180 be306d-be309b call be17e7 call be19bd call be1b5f 178->180 181 be30a3-be30da call be39a0 call be36b8 call be39a0 call be1b5f 178->181 180->181 221 be309d-be309f 180->221 229 be30dc-be30df 181->229 230 be3104-be3108 181->230 183->184 224 be318e-be3190 183->224 184->32 243 be2f9a-be2f9e 188->243 244 be2fd0-be2fd4 188->244 189->188 232 be2f3c-be2f3e 189->232 198->33 221->181 224->184 229->33 233 be30e5-be30fa call be17e7 229->233 230->33 234 be310e-be3125 call be17e7 230->234 232->188 233->230 234->162 245 be301d-be3029 call be21d5 243->245 246 be2fa0-be2fce call be17e7 call be19bd 243->246 244->245 247 be2fd6-be2fff call be17e7 call be19bd 244->247 245->33 258 be3004-be3015 call be19bd call be1b5f 246->258 247->258 258->245 263 be3017-be3019 258->263 263->245
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00BE2A5A
                                                                    • Part of subcall function 00BE1B5F: InitializeCriticalSection.KERNEL32(00C0F5C8,?,00BE3BA4,?), ref: 00BE1BB3
                                                                    • Part of subcall function 00BE1B5F: __Init_thread_footer.LIBCMT ref: 00BE1BC4
                                                                  • EnterCriticalSection.KERNEL32(00000004,00000260), ref: 00BE2A7B
                                                                  • LeaveCriticalSection.KERNEL32(00000004), ref: 00BE2A96
                                                                  • CoInitialize.OLE32(00000000), ref: 00BE2A9D
                                                                  • CoUninitialize.OLE32(00000001,00000000,00000001,00000000,00000001,00000000,00000001,00000000,00000001,00000000), ref: 00BE319F
                                                                    • Part of subcall function 00BE39CC: RegOpenKeyExW.KERNELBASE(80000002,SOFTWARE\Letasoft\Sound Booster,00000000,00000101,?), ref: 00BE39ED
                                                                    • Part of subcall function 00BE39CC: RegQueryValueExW.KERNELBASE(?,MLS,00000000,?,?,?), ref: 00BE3A19
                                                                    • Part of subcall function 00BE39CC: RegCloseKey.KERNELBASE(?), ref: 00BE3A34
                                                                    • Part of subcall function 00BE3B16: GetModuleHandleExW.KERNEL32(00000006,00000000,?), ref: 00BE3BA7
                                                                    • Part of subcall function 00BE3B16: GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 00BE3BC3
                                                                    • Part of subcall function 00BE3B16: _wcsrchr.LIBVCRUNTIME ref: 00BE3BD6
                                                                    • Part of subcall function 00BE3B16: _wcsrchr.LIBVCRUNTIME ref: 00BE3BEA
                                                                    • Part of subcall function 00BE3B16: LoadLibraryW.KERNELBASE(?), ref: 00BE3C16
                                                                    • Part of subcall function 00BE3B16: GetProcAddress.KERNEL32(00000000,ProvideLogger), ref: 00BE3C29
                                                                    • Part of subcall function 00BE21D5: std::_Deallocate.LIBCONCRT ref: 00BE2205
                                                                  • SetConsoleTitleW.KERNEL32(Diagnostics Report Creator,00000001,00000000,00000001,00000000,00000001,00000000), ref: 00BE2D90
                                                                    • Part of subcall function 00BE17E7: GetCurrentThreadId.KERNEL32 ref: 00BE1863
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$InitializeModule_wcsrchr$AddressCloseConsoleCurrentDeallocateEnterFileH_prolog3_HandleInit_thread_footerLeaveLibraryLoadNameOpenProcQueryThreadTitleUninitializeValuestd::_
                                                                  • String ID: FAILED$ SUCCEEDED$-Activate$-CreateReport$-Deactivate$-InstallAPO$-UninstallAPO$ActivateSoundBooster$Activating Sound Booster.Product key=$Activating Sound Booster. Product key=$ApoControlManager::DoInstall$ApoControlManager::DoUninstall$ApoInstaller.cpp$CreateReport$Creating diagnostics report. Please wait.$DeactivateSoundBooster$Deactivating Sound Booster$Deactivating Sound Booster$Diagnostics Report Creator$Failed$Installing APO$Installing APO$Succeded$Uninstalling APO$Wrong arguments passed$Wrong arguments passed$Wrong number of arguments$Wrong number of arguments$wmain
                                                                  • API String ID: 305132156-1221785053
                                                                  • Opcode ID: 3924f917917dee7f8bf86ccf7aea641c98c9814ef877c0f92d7499e996d834c9
                                                                  • Instruction ID: b6ac476d2e34971d3ee6292edcd77d0459f07438da3be530b2f714d1948c35da
                                                                  • Opcode Fuzzy Hash: 3924f917917dee7f8bf86ccf7aea641c98c9814ef877c0f92d7499e996d834c9
                                                                  • Instruction Fuzzy Hash: CE12B370740390ABDB24AB76CC5BFAD73E5AF44B05F1440E8F60A6B1D2DBB09A45CB46
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 00BE287B
                                                                    • Part of subcall function 00BE1DFC: GetCurrentProcess.KERNEL32(00000008,?,00000000,00000000,00000000), ref: 00BE1E1A
                                                                    • Part of subcall function 00BE1DFC: OpenProcessToken.ADVAPI32(00000000), ref: 00BE1E21
                                                                    • Part of subcall function 00BE1DFC: GetLastError.KERNEL32 ref: 00BE1E2B
                                                                    • Part of subcall function 00BE1DFC: FindCloseChangeNotification.KERNELBASE(00000000), ref: 00BE1EB0
                                                                    • Part of subcall function 00BE1DFC: LocalFree.KERNEL32(00000000), ref: 00BE1EBF
                                                                  • _strcat.LIBCMT ref: 00BE28A4
                                                                  • _strcat.LIBCMT ref: 00BE28F4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Process_strcat$ChangeCloseCurrentErrorFindFreeH_prolog3_catch_LastLocalNotificationOpenToken
                                                                  • String ID: integrity=$ isElevatedProc=$ runAsAdmin=$ApoInstaller.cpp$High$LogProcessInfo$Low$Medium$System$Unknown$Untrusted$isUserAdmin=
                                                                  • API String ID: 2350065001-3084008850
                                                                  • Opcode ID: 0a6dd1f810f9e7f33ed25884a835c1116ec6bcd5d519d7de7ba54d9c6ed74d22
                                                                  • Instruction ID: c8a4eb6c7cb41a93fc2d8fea344cb9f3bc3c2a5f0340910b16ede945ad863039
                                                                  • Opcode Fuzzy Hash: 0a6dd1f810f9e7f33ed25884a835c1116ec6bcd5d519d7de7ba54d9c6ed74d22
                                                                  • Instruction Fuzzy Hash: 7321D835A403A42AEA14B3A64C57FAC23C94F40B04F1044F5F506BB1C2DFB49D44D29B
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 319 be1dfc-be1e29 GetCurrentProcess OpenProcessToken 320 be1e2b-be1e33 GetLastError 319->320 321 be1e35-be1e50 GetTokenInformation 319->321 322 be1ea7-be1eab 320->322 323 be1e52-be1e57 GetLastError 321->323 324 be1e61-be1e70 LocalAlloc 321->324 325 be1ead-be1eb6 FindCloseChangeNotification 322->325 326 be1eba-be1ebc 322->326 323->324 327 be1e59-be1e5f GetLastError 323->327 328 be1e7b-be1e90 GetTokenInformation 324->328 329 be1e72-be1e74 GetLastError 324->329 325->326 330 be1ebe-be1ec5 LocalFree 326->330 331 be1ec9-be1ecb 326->331 327->322 328->329 333 be1e92-be1e9e GetSidSubAuthority 328->333 332 be1e76-be1e79 329->332 330->331 334 be1ecd-be1ed5 331->334 335 be1ed6-be1ee7 call befc6b 331->335 332->322 336 be1ea5 333->336 337 be1ea0-be1ea3 333->337 336->322 337->332
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000008,?,00000000,00000000,00000000), ref: 00BE1E1A
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00BE1E21
                                                                  • GetLastError.KERNEL32 ref: 00BE1E2B
                                                                  • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 00BE1E42
                                                                  • GetLastError.KERNEL32 ref: 00BE1E52
                                                                  • GetLastError.KERNEL32 ref: 00BE1E59
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00BE1EB0
                                                                  • LocalFree.KERNEL32(00000000), ref: 00BE1EBF
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00BE1EE2
                                                                    • Part of subcall function 00BEFC6B: RaiseException.KERNEL32(?,?,?,00BECC03,?,?,?,?,?,?,?,?,00BECC03,?,00C0BFD8), ref: 00BEFCCA
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$ProcessToken$ChangeCloseCurrentExceptionException@8FindFreeInformationLocalNotificationOpenRaiseThrow
                                                                  • String ID:
                                                                  • API String ID: 1071881940-0
                                                                  • Opcode ID: 9d919c32a25f98ece0b4ef752cf2694f086ed1cedcf12c44340ecd63801c861e
                                                                  • Instruction ID: 06ae7c9228d97f0cc8c0d20845e3f647da5340df3a721c46ed4293cdf7098743
                                                                  • Opcode Fuzzy Hash: 9d919c32a25f98ece0b4ef752cf2694f086ed1cedcf12c44340ecd63801c861e
                                                                  • Instruction Fuzzy Hash: D4314635E01244FBDB21DBA6DC89B9EBBFCEB48755F2145A4FD05A2150D7709E00DB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 340 be3b16-be3b34 341 be3b3a-be3baf call be3a83 * 3 call beeb20 call be1b5f GetModuleHandleExW 340->341 342 be3c66-be3c75 call becc44 340->342 355 be3c0f-be3c21 LoadLibraryW 341->355 356 be3bb1-be3bcb GetModuleFileNameW 341->356 357 be3c65 355->357 358 be3c23-be3c31 GetProcAddress 355->358 356->355 359 be3bcd-be3bdf call bef7f4 356->359 357->342 360 be3c43 358->360 361 be3c33-be3c35 358->361 368 be3bf5-be3bf7 359->368 369 be3be1-be3bf3 call bef7f4 359->369 363 be3c45-be3c4a 360->363 365 be3c3c-be3c41 361->365 366 be3c4c-be3c54 363->366 367 be3c56-be3c62 FreeLibrary 363->367 365->363 366->357 367->357 371 be3bfb-be3c0a call be3a83 368->371 369->368 369->371 371->355
                                                                  APIs
                                                                    • Part of subcall function 00BE1B5F: InitializeCriticalSection.KERNEL32(00C0F5C8,?,00BE3BA4,?), ref: 00BE1BB3
                                                                    • Part of subcall function 00BE1B5F: __Init_thread_footer.LIBCMT ref: 00BE1BC4
                                                                  • GetModuleHandleExW.KERNEL32(00000006,00000000,?), ref: 00BE3BA7
                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 00BE3BC3
                                                                  • _wcsrchr.LIBVCRUNTIME ref: 00BE3BD6
                                                                  • _wcsrchr.LIBVCRUNTIME ref: 00BE3BEA
                                                                  • LoadLibraryW.KERNELBASE(?), ref: 00BE3C16
                                                                  • GetProcAddress.KERNEL32(00000000,ProvideLogger), ref: 00BE3C29
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00BE3C5C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryModule_wcsrchr$AddressCriticalFileFreeHandleInit_thread_footerInitializeLoadNameProcSection
                                                                  • String ID: .dll$Logger$ProvideLogger$Sound Booster
                                                                  • API String ID: 3089204199-3424903129
                                                                  • Opcode ID: d61daf26ede8b6a023b157279ac860f9b32698e30833083ef9f0a137934fe80d
                                                                  • Instruction ID: e404f61338d4ed81cd478dc457a3587b7773f30db0d3b94277f31222886b0255
                                                                  • Opcode Fuzzy Hash: d61daf26ede8b6a023b157279ac860f9b32698e30833083ef9f0a137934fe80d
                                                                  • Instruction Fuzzy Hash: 09418575600345ABD714DB76DD49B9EB7F8EF08B10F2045AAE546E71C0EB70DB44CA20
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 397 be39cc-be39f5 RegOpenKeyExW 398 be3a3a-be3a41 397->398 399 be39f7-be3a21 RegQueryValueExW 397->399 400 be3a23-be3a27 399->400 401 be3a31-be3a34 RegCloseKey 399->401 400->401 402 be3a29-be3a2d 400->402 401->398 402->401
                                                                  APIs
                                                                  • RegOpenKeyExW.KERNELBASE(80000002,SOFTWARE\Letasoft\Sound Booster,00000000,00000101,?), ref: 00BE39ED
                                                                  • RegQueryValueExW.KERNELBASE(?,MLS,00000000,?,?,?), ref: 00BE3A19
                                                                  • RegCloseKey.KERNELBASE(?), ref: 00BE3A34
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID: MLS$SOFTWARE\Letasoft\Sound Booster
                                                                  • API String ID: 3677997916-2912749924
                                                                  • Opcode ID: af3db21341b868da59d0086bc0158a8348f92cece7c3ac18dfd55d0e9b010efa
                                                                  • Instruction ID: f1cce94effab4ea176d18ee90d816586db5d1adbe3e54ac7653efdd4e19ba476
                                                                  • Opcode Fuzzy Hash: af3db21341b868da59d0086bc0158a8348f92cece7c3ac18dfd55d0e9b010efa
                                                                  • Instruction Fuzzy Hash: 48012871A01298FADB20DB969C08EDFBFBCEB80B15F1041A6E951A2150D3709B44DA91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 403 be1ae5-be1b14 404 be1b3f-be1b5e DeleteCriticalSection 403->404 405 be1b16-be1b1a 403->405 405->404 406 be1b1c-be1b2c GetProcAddress 405->406 407 be1b2e-be1b35 406->407 408 be1b36-be1b39 FreeLibrary 406->408 407->408 408->404
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(00000000,ReleaseLogger), ref: 00BE1B24
                                                                  • FreeLibrary.KERNELBASE(?,?,?,00C0203F,000000FF,?,00BE1AA2), ref: 00BE1B39
                                                                  • DeleteCriticalSection.KERNEL32(?,973E4C43,?,?,00C0203F,000000FF,?,00BE1AA2), ref: 00BE1B43
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCriticalDeleteFreeLibraryProcSection
                                                                  • String ID: ReleaseLogger
                                                                  • API String ID: 1152769218-621462491
                                                                  • Opcode ID: c5c53613e247f2f68e74fedb1bf34c66314b7e50d8fa3083ef6ee8ea1df9939e
                                                                  • Instruction ID: 6bbe091d356455cb7ccc8ad8640bad9eb1ff1c13ab009136d44287e2cca68833
                                                                  • Opcode Fuzzy Hash: c5c53613e247f2f68e74fedb1bf34c66314b7e50d8fa3083ef6ee8ea1df9939e
                                                                  • Instruction Fuzzy Hash: 94016271504744EFD7309F65DC08B56B7FCFB04715F104A6EE45A82AE0EBB6A900CB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 425 bfe404-bfe429 426 bfe42b-bfe42d 425->426 427 bfe432-bfe434 425->427 428 bfe600-bfe60f call becc44 426->428 429 bfe436-bfe450 call bf6b33 call bf6b46 call bf0831 427->429 430 bfe455-bfe47a 427->430 429->428 432 bfe47c-bfe47f 430->432 433 bfe481-bfe487 430->433 432->433 436 bfe4a9-bfe4ae 432->436 437 bfe489-bfe4a1 call bf6b33 call bf6b46 call bf0831 433->437 438 bfe4a6 433->438 441 bfe4bf-bfe4c8 call bfdfa9 436->441 442 bfe4b0-bfe4bc call bff46b 436->442 470 bfe5f7-bfe5fa 437->470 438->436 453 bfe4ca-bfe4cc 441->453 454 bfe503-bfe515 441->454 442->441 458 bfe4ce-bfe4d3 453->458 459 bfe4f0-bfe4f9 call bfdd89 453->459 456 bfe55d-bfe57e WriteFile 454->456 457 bfe517-bfe51d 454->457 465 bfe589 456->465 466 bfe580-bfe586 GetLastError 456->466 461 bfe51f-bfe522 457->461 462 bfe54d-bfe556 call bfe01f 457->462 463 bfe4d9-bfe4e6 call bfdf3c 458->463 464 bfe5c7-bfe5d9 458->464 469 bfe4fe-bfe501 459->469 472 bfe53d-bfe54b call bfe1ec 461->472 473 bfe524-bfe527 461->473 486 bfe55b 462->486 478 bfe4e9-bfe4eb 463->478 476 bfe5db-bfe5de 464->476 477 bfe5e4-bfe5f4 call bf6b46 call bf6b33 464->477 471 bfe58c-bfe597 465->471 466->465 469->478 483 bfe5ff 470->483 480 bfe5fc 471->480 481 bfe599-bfe59e 471->481 472->469 473->464 482 bfe52d-bfe53b call bfe0fe 473->482 476->477 487 bfe5e0-bfe5e2 476->487 477->470 478->471 480->483 489 bfe5c4 481->489 490 bfe5a0-bfe5a5 481->490 482->469 483->428 486->469 487->483 489->464 494 bfe5bb-bfe5c2 call bf6b10 490->494 495 bfe5a7-bfe5b9 call bf6b46 call bf6b33 490->495 494->470 495->470
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: be5bc7721f4cf6843248d8d8a76ad138f1aebe1f69d3e911d64e8279ea69889f
                                                                  • Instruction ID: 6776146400307b30fbc10452d47c1dc0747957106b0e1df1807b5c04533c17cb
                                                                  • Opcode Fuzzy Hash: be5bc7721f4cf6843248d8d8a76ad138f1aebe1f69d3e911d64e8279ea69889f
                                                                  • Instruction Fuzzy Hash: 6351A57190015D9BCB119FA8C845FBEBBF4EF55318F1400D9FA24AB2A1E770D909CB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 512 bf95a9-bf95d3 call bf6768 call bf96c8 call bf933d 519 bf95d9-bf95e1 call bf5915 512->519 520 bf95d5-bf95d7 512->520 523 bf95e6-bf95ee 519->523 521 bf962c-bf962f 520->521 524 bf961e 523->524 525 bf95f0-bf9611 call bf976a 523->525 527 bf9620-bf962b call bf58db 524->527 530 bf9613-bf9618 call bf6b46 525->530 531 bf9630-bf9634 525->531 527->521 530->524 533 bf963b-bf9646 531->533 534 bf9636 call bf4d31 531->534 537 bf965d-bf9677 533->537 538 bf9648-bf9652 533->538 534->533 537->527 541 bf9679-bf9680 537->541 538->537 540 bf9654-bf965c call bf58db 538->540 540->537 541->527 543 bf9682-bf9699 call bf9213 541->543 543->527 547 bf969b-bf96a5 543->547 547->527
                                                                  APIs
                                                                    • Part of subcall function 00BF6768: GetLastError.KERNEL32(?,00000000,00BF0F83,00000000,?,?,00BF09DB,?,?,00000000,?), ref: 00BF676C
                                                                    • Part of subcall function 00BF6768: _free.LIBCMT ref: 00BF679F
                                                                    • Part of subcall function 00BF6768: SetLastError.KERNEL32(00000000,?,00000000,?), ref: 00BF67E0
                                                                    • Part of subcall function 00BF6768: _abort.LIBCMT ref: 00BF67E6
                                                                    • Part of subcall function 00BF96C8: _abort.LIBCMT ref: 00BF96FA
                                                                    • Part of subcall function 00BF96C8: _free.LIBCMT ref: 00BF972E
                                                                    • Part of subcall function 00BF933D: GetOEMCP.KERNEL32(00000000), ref: 00BF9368
                                                                  • _free.LIBCMT ref: 00BF9621
                                                                  • _free.LIBCMT ref: 00BF9657
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorLast_abort
                                                                  • String ID:
                                                                  • API String ID: 2991157371-0
                                                                  • Opcode ID: 619ff34383c36894e134bf78772027f3cac5d40f64dd051f26b63d3c5fb4d43d
                                                                  • Instruction ID: ac08ae7e11a460d9a1dc01a32d99a48bfe65bfc2aebb0294ce1c289a1adab9b1
                                                                  • Opcode Fuzzy Hash: 619ff34383c36894e134bf78772027f3cac5d40f64dd051f26b63d3c5fb4d43d
                                                                  • Instruction Fuzzy Hash: B7318F3190420CBFDB14EF68D441BBDB7E5DF41320F2540D9EA149B2A2EB329D49CB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 548 bfe01f-bfe076 call c01dc0 551 bfe0dd-bfe0df 548->551 552 bfe078 551->552 553 bfe0e1 551->553 555 bfe07e-bfe080 552->555 554 bfe0eb-bfe0fd call becc44 553->554 557 bfe082-bfe087 555->557 558 bfe0a0-bfe0c2 WriteFile 555->558 559 bfe089-bfe08f 557->559 560 bfe090-bfe09e 557->560 561 bfe0c4-bfe0cf 558->561 562 bfe0e3-bfe0e9 GetLastError 558->562 559->560 560->555 560->558 561->554 564 bfe0d1-bfe0d7 561->564 562->554 564->551
                                                                  APIs
                                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,00BFE55B,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BFE0BA
                                                                  • GetLastError.KERNEL32(?,00BFE55B,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00BFD73D,00000000,00000000,?,?), ref: 00BFE0E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastWrite
                                                                  • String ID:
                                                                  • API String ID: 442123175-0
                                                                  • Opcode ID: 9448ec843de9b3971c29b73e91d14dde66dc6419dc6008cae25197094f51d366
                                                                  • Instruction ID: 49a0769d85cbba1c095475b4a1ddeece6ac61f232e899d0fadc4cb621a78893e
                                                                  • Opcode Fuzzy Hash: 9448ec843de9b3971c29b73e91d14dde66dc6419dc6008cae25197094f51d366
                                                                  • Instruction Fuzzy Hash: 8E219135A002199FCB25CF69C881BF9B7F9EB48301F1044E9E65AD7261DA70EA85CB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 565 bf7ecb-bf7ed0 566 bf7ed2-bf7eea 565->566 567 bf7eec-bf7ef0 566->567 568 bf7ef8-bf7f01 566->568 567->568 569 bf7ef2-bf7ef6 567->569 570 bf7f13 568->570 571 bf7f03-bf7f06 568->571 575 bf7f73-bf7f77 569->575 574 bf7f15-bf7f22 GetStdHandle 570->574 572 bf7f0f-bf7f11 571->572 573 bf7f08-bf7f0d 571->573 572->574 573->574 576 bf7f24-bf7f26 574->576 577 bf7f31 574->577 575->566 578 bf7f7d-bf7f80 575->578 576->577 579 bf7f28-bf7f2f GetFileType 576->579 580 bf7f33-bf7f35 577->580 579->580 581 bf7f37-bf7f42 580->581 582 bf7f55-bf7f67 580->582 583 bf7f4a-bf7f4d 581->583 584 bf7f44-bf7f48 581->584 582->575 585 bf7f69-bf7f6c 582->585 583->575 586 bf7f4f-bf7f53 583->586 584->575 585->575 586->575
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00BF7F17
                                                                  • GetFileType.KERNELBASE(00000000), ref: 00BF7F29
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: FileHandleType
                                                                  • String ID:
                                                                  • API String ID: 3000768030-0
                                                                  • Opcode ID: 6e0764503fe3fba0bb4e00b1642eac91b58566f9078f8e410abe1d9de0513aab
                                                                  • Instruction ID: 5802ceb74de0b74337e2ae64a391a4e8aa9218a8dd2eaba183e9395b0f8ba756
                                                                  • Opcode Fuzzy Hash: 6e0764503fe3fba0bb4e00b1642eac91b58566f9078f8e410abe1d9de0513aab
                                                                  • Instruction Fuzzy Hash: 4911D23154C7D647C7304A3D8C8873AAAD9DB56334B3807DED2B6875F1CA60D98A9284
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 587 bf4750-bf476e 588 bf4778-bf4799 587->588 589 bf4770-bf4773 587->589 591 bf479f-bf47a2 588->591 592 bf485d-bf4860 588->592 590 bf4861-bf486f call becc44 589->590 591->592 593 bf47a8-bf47ab 591->593 592->590 596 bf47ae-bf47b0 593->596 597 bf47b1-bf47b7 596->597 598 bf47b9-bf47be 597->598 599 bf4820-bf4823 598->599 600 bf47c0-bf47c2 598->600 602 bf4825-bf4831 call bf58db 599->602 603 bf4832-bf485a 599->603 600->598 601 bf47c4-bf47d7 call be1ae5 600->601 607 bf47d9-bf4807 601->607 602->603 603->592 608 bf4809-bf480f 607->608 609 bf4814-bf481e 607->609 608->597 610 bf4811 608->610 609->596 610->609
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID:
                                                                  • API String ID: 269201875-0
                                                                  • Opcode ID: d17d75bb40dda0745c4f9c9525e4bc724d579c77c68bf5619ae8beb98bbd7958
                                                                  • Instruction ID: 7ed360c9fac006ca18d0eacfd19aeaf9252993c6411457d1128b2447d3e688d3
                                                                  • Opcode Fuzzy Hash: d17d75bb40dda0745c4f9c9525e4bc724d579c77c68bf5619ae8beb98bbd7958
                                                                  • Instruction Fuzzy Hash: 7641A231A00618CFDB18CF69D8C466EB7F1EF8D320B2582AAE615DB3A1D7709C44CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 612 bf7d27-bf7d40 call bf7cc3 call bfda26 617 bf7d49-bf7d58 call bf3508 612->617 618 bf7d42-bf7d44 612->618 622 bf7d5a-bf7d5f 617->622 623 bf7d61-bf7d6a call bf3508 617->623 619 bf7dd9-bf7ddb 618->619 624 bf7d71-bf7d81 622->624 626 bf7dd5 623->626 632 bf7d6c 623->632 624->626 627 bf7d83-bf7d8f 624->627 631 bf7dd7-bf7dd8 626->631 629 bf7dbc-bf7dca 627->629 630 bf7d91-bf7d96 call bf5915 627->630 634 bf7dd1-bf7dd3 629->634 635 bf7d9b-bf7daa call bf58db 630->635 631->619 632->624 634->631 635->629 638 bf7dac-bf7dba 635->638 638->634
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID:
                                                                  • API String ID: 269201875-0
                                                                  • Opcode ID: 2915e3f1ba4d9757e64beada39af1f650c26a1c8520354db013099649313a29c
                                                                  • Instruction ID: afb38389c587bb932c360ecb59ff637c9b8bdfb4a2569b8f87bcd6e731c91909
                                                                  • Opcode Fuzzy Hash: 2915e3f1ba4d9757e64beada39af1f650c26a1c8520354db013099649313a29c
                                                                  • Instruction Fuzzy Hash: 8711E4B914870A9BD7209F29E481BB277E8EF14364B6000FDE64A8B241EB71A9898750
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,?,?,?,00BECC8F,?,?,00BE1050,?,?,?,?,?), ref: 00BF5947
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 9d45a18d1a136fbd7cb3396bdee63fd99ecb5c30fd8d404bdab0929c2ed4e33a
                                                                  • Instruction ID: c63d794a6ab15ce3dd7307ddb6f32a93eff9d01d77d20c5bdfa6bc60d32a8c66
                                                                  • Opcode Fuzzy Hash: 9d45a18d1a136fbd7cb3396bdee63fd99ecb5c30fd8d404bdab0929c2ed4e33a
                                                                  • Instruction Fuzzy Hash: 3AE0303210091DD7D7352A65AC0577F77CCDB417B0F15C1A4AF0597190DAD0CD1985A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • FreeLibrary.KERNELBASE(?), ref: 00BE219E
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary
                                                                  • String ID:
                                                                  • API String ID: 3664257935-0
                                                                  • Opcode ID: de0870a361a11b58374821d75137a556346104628d718ad8d41e0801106d9926
                                                                  • Instruction ID: 9c2d11715040004c9223115ca92e900f4ea4f3dc4fcaf9bf050ad9a7033fe88f
                                                                  • Opcode Fuzzy Hash: de0870a361a11b58374821d75137a556346104628d718ad8d41e0801106d9926
                                                                  • Instruction Fuzzy Hash: 99D0A930202200CFE7288F09E808B9573E9EF08705F0044ADA156AB0A0CBB15C80CB40
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00BE3C82
                                                                    • Part of subcall function 00BE5228: __EH_prolog3.LIBCMT ref: 00BE522F
                                                                  • FindFirstFileW.KERNEL32(?,?,0000029C,00BE4C1F,00000001,00000000,00000001,00000000,Sound Booster,?,?,?,?,000000B8,00BE2DA6), ref: 00BE3CBA
                                                                  • _wcslen.LIBCMT ref: 00BE3D83
                                                                  • SetFileAttributesW.KERNEL32(?,00000000,00000000,00000000), ref: 00BE3DA6
                                                                  • DeleteFileW.KERNEL32(?), ref: 00BE3DB8
                                                                  • FindNextFileW.KERNEL32(00000000,00000010,00000001,00000000), ref: 00BE3DD4
                                                                  • FindClose.KERNEL32(00000000), ref: 00BE3DE3
                                                                    • Part of subcall function 00BE222C: _wcslen.LIBCMT ref: 00BE223F
                                                                    • Part of subcall function 00BE384A: _wcslen.LIBCMT ref: 00BE3861
                                                                    • Part of subcall function 00BE5228: _wcslen.LIBCMT ref: 00BE5278
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: File_wcslen$Find$AttributesCloseDeleteFirstH_prolog3H_prolog3_Next
                                                                  • String ID: \*.*
                                                                  • API String ID: 1341830500-1173974218
                                                                  • Opcode ID: 191fd0ade8909760a8246b1bbbd5fbef964caefc68218060dc5b7796e4a7724a
                                                                  • Instruction ID: abdb119a31b3ab7dcde8414928b463f1367a1accb7d1d048c12a2ee00bea36c0
                                                                  • Opcode Fuzzy Hash: 191fd0ade8909760a8246b1bbbd5fbef964caefc68218060dc5b7796e4a7724a
                                                                  • Instruction Fuzzy Hash: 53415831900288EFCB10EBA1CC99AEEB7FCEB18714F5441A9E511B3191DB749B89CB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __floor_pentium4
                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                  • API String ID: 4168288129-2761157908
                                                                  • Opcode ID: 9d10460ca100a1b629bde79c0c557ec36b9f6ef5c2b610665d819de90136c512
                                                                  • Instruction ID: b3c1f9b3a9630cadcd2a1a0a267e122da29f42643f3bc8d8f58d5c15f42e6299
                                                                  • Opcode Fuzzy Hash: 9d10460ca100a1b629bde79c0c557ec36b9f6ef5c2b610665d819de90136c512
                                                                  • Instruction Fuzzy Hash: 8DD23872E0862C8BDB25CE28DD407EAB7F5EB44314F1541EADA0DE7241E774AE898F40
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 00BE5BAE
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00BE5CA1
                                                                  • FindNextFileW.KERNEL32(000000FF,?), ref: 00BE5EA3
                                                                  • FindClose.KERNEL32(000000FF), ref: 00BE5EB9
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Find$File$CloseFirstNext_wcslen
                                                                  • String ID:
                                                                  • API String ID: 712028750-0
                                                                  • Opcode ID: f83538156e5606328c0c70f92fe85d6647241597af859c4686b6b0fd3d76c6a3
                                                                  • Instruction ID: 3fb74007782c1157ad90b1ea1e68f1390587570b8fcb8064b25f14d4da294a71
                                                                  • Opcode Fuzzy Hash: f83538156e5606328c0c70f92fe85d6647241597af859c4686b6b0fd3d76c6a3
                                                                  • Instruction Fuzzy Hash: A19173B1E00358AACB30DB61CC45BEE73F9AF59704F0485D9E50996281EB759B88CF62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _free.LIBCMT ref: 00BF5588
                                                                    • Part of subcall function 00BF58DB: HeapFree.KERNEL32(00000000,00000000,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?), ref: 00BF58F1
                                                                    • Part of subcall function 00BF58DB: GetLastError.KERNEL32(?,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?,?), ref: 00BF5903
                                                                  • GetTimeZoneInformation.KERNEL32 ref: 00BF559A
                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,00C0F084,000000FF,?,0000003F,?,?), ref: 00BF5612
                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,00C0F0D8,000000FF,?,0000003F,?,?,?,00C0F084,000000FF,?,0000003F,?,?), ref: 00BF563F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                  • String ID:
                                                                  • API String ID: 806657224-0
                                                                  • Opcode ID: b0db0f689dd30af0cacfb57ca5f39270d14f0fb39b31117604f18c888e697f7f
                                                                  • Instruction ID: ae4aa8da39f51a91f8c40a6ac8028ed7211543c62790f0e3fcfa74a4a30bcb97
                                                                  • Opcode Fuzzy Hash: b0db0f689dd30af0cacfb57ca5f39270d14f0fb39b31117604f18c888e697f7f
                                                                  • Instruction Fuzzy Hash: AE31AF71904649EFCB219F68DC80A3DBBF8FF05714B1542EEE2649B6A1D7308E4ADB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00BED728
                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,00000017), ref: 00BED7F0
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,00000017), ref: 00BED80F
                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,00000017), ref: 00BED819
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                  • String ID:
                                                                  • API String ID: 254469556-0
                                                                  • Opcode ID: 7db7fe69451364200388e22094c44a795f3f5df6c2f0b23c199b3a57dbbb2ab9
                                                                  • Instruction ID: 884a402344f9ecce8ceb4a9c064f45604e39cafb8ccbfa4c8699f2ae809a3094
                                                                  • Opcode Fuzzy Hash: 7db7fe69451364200388e22094c44a795f3f5df6c2f0b23c199b3a57dbbb2ab9
                                                                  • Instruction Fuzzy Hash: FC3106B5D452689BCB20DFA5D989BCDBBF8EF08301F0041EAE40DA7210EB759A85CF40
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00BECC15), ref: 00BF075F
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00BECC15), ref: 00BF0769
                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00BECC15), ref: 00BF0776
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                  • String ID:
                                                                  • API String ID: 3906539128-0
                                                                  • Opcode ID: 055a6baa200b641c08c38ac702e64876c543b8f0ad5307614b6026b2e9ce87ae
                                                                  • Instruction ID: 670d0d9ccd1333a80b9b484aefdcf97d1fccb8cf4cc77646012cfc251275a102
                                                                  • Opcode Fuzzy Hash: 055a6baa200b641c08c38ac702e64876c543b8f0ad5307614b6026b2e9ce87ae
                                                                  • Instruction Fuzzy Hash: B531B27491122CABCB21EF65D98979DBBF8EF08310F5041EAE41CA7261EB709F858F45
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,00BEBF7F), ref: 00BEB975
                                                                  • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00BEBF7F), ref: 00BEB983
                                                                  • FileTimeToDosDateTime.KERNEL32(?,?,?), ref: 00BEB995
                                                                    • Part of subcall function 00BEAB10: FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00BEB9A8,?), ref: 00BEAB28
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Time$File$System$DateLocal
                                                                  • String ID:
                                                                  • API String ID: 2151524179-0
                                                                  • Opcode ID: a4e7225287e8545108ee002f58f5c341f4c7421705a4b15c47bfe73863ddf099
                                                                  • Instruction ID: ca88fdcfda1fd13ad67bfd994f49f2d10e844d39444d98d5430b8e37b777458f
                                                                  • Opcode Fuzzy Hash: a4e7225287e8545108ee002f58f5c341f4c7421705a4b15c47bfe73863ddf099
                                                                  • Instruction Fuzzy Hash: E331CFB4E0020ACFDB44CFA8C495BEEBBB5FB48314F114189EA05AB341D775A985CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 61102e8e78fa000e9228d04ba78236f8720c7748ef16da93a787eb451425eaa5
                                                                  • Instruction ID: 16412ecc5999aa0a4448a61b8a30cd62888267230770e2f553778a01cd72c6c6
                                                                  • Opcode Fuzzy Hash: 61102e8e78fa000e9228d04ba78236f8720c7748ef16da93a787eb451425eaa5
                                                                  • Instruction Fuzzy Hash: CF021C71E0021D9BDF14CFA9D9806AEFBF1EF48314F2581AAD919E7385D731AA45CB80
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: K
                                                                  • API String ID: 0-856455061
                                                                  • Opcode ID: dae5ba50be3c3c9ee8a16c44b0bdf00f65f3f1d89f0a67d367ab1ec435eadd8d
                                                                  • Instruction ID: 3be4078319064d401bffa3091b170d2913114e8495c8f4c85b51c505545b4fc4
                                                                  • Opcode Fuzzy Hash: dae5ba50be3c3c9ee8a16c44b0bdf00f65f3f1d89f0a67d367ab1ec435eadd8d
                                                                  • Instruction Fuzzy Hash: B4323B71600249AFCB04CF98CC95EEE7B75EF88300F088568F9199F282D675E768CB95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00C011D7,?,?,00000008,?,?,00C00E77,00000000), ref: 00C01409
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionRaise
                                                                  • String ID:
                                                                  • API String ID: 3997070919-0
                                                                  • Opcode ID: 352f0f6e383b7e13ed6ad719e1e4eac621769a077fdd3d494e43ef0280ccccef
                                                                  • Instruction ID: 1f90e943c4fbd0670786fc025a611e7c8f14c949a318c9603ab496703fdf4358
                                                                  • Opcode Fuzzy Hash: 352f0f6e383b7e13ed6ad719e1e4eac621769a077fdd3d494e43ef0280ccccef
                                                                  • Instruction Fuzzy Hash: 56B11B31610609DFD715CF68C48AB65BBE0FF45364F298658E9A9CF2E1C335EA91CB40
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: K
                                                                  • API String ID: 0-856455061
                                                                  • Opcode ID: ddf3d52858798761dc5582627dce828703529d982b4c4dfdf8f4225c730d1dce
                                                                  • Instruction ID: 22d95aaa78cd9c4526adc50c6b7c7aec2fdaa75831895fcc67de32464800e092
                                                                  • Opcode Fuzzy Hash: ddf3d52858798761dc5582627dce828703529d982b4c4dfdf8f4225c730d1dce
                                                                  • Instruction Fuzzy Hash: 58E12A71A00249BFCB04CF98C895EEE7B75EF88310F08C5A8F9199B281D675D768CB95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0000D886,00BED421), ref: 00BED87F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: bba2e8eaa111c93184b42159db3f6ba11fb8f3aa436dc1ad8383fbb69a9d0c6f
                                                                  • Instruction ID: 44863e0727430418ecf936bb7052d5a9b9b45090682df3738d194f65c81cee9a
                                                                  • Opcode Fuzzy Hash: bba2e8eaa111c93184b42159db3f6ba11fb8f3aa436dc1ad8383fbb69a9d0c6f
                                                                  • Instruction Fuzzy Hash:
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0
                                                                  • API String ID: 0-4108050209
                                                                  • Opcode ID: 7ba693870d594e61b020945bb1353e9f258270115754d3abd628897ac4343ad4
                                                                  • Instruction ID: 6948c20f33b199086a12d2ff13c7f5eeb1d37e1af62179190ec13a83c0b75cd6
                                                                  • Opcode Fuzzy Hash: 7ba693870d594e61b020945bb1353e9f258270115754d3abd628897ac4343ad4
                                                                  • Instruction Fuzzy Hash: CE517A3560064CDADB388E6C8495BBE77EADF52300F580DE9DF42DB292C601DD4D8362
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0
                                                                  • API String ID: 0-4108050209
                                                                  • Opcode ID: fc6fffd0465f4fb23e015a3ec5c98b83c5e8254fc9b8eb92b78b5e12e0049482
                                                                  • Instruction ID: 09156ac131b9e1224192326e3005886dc1fe8c74b1306220c71141e5ba52c1e6
                                                                  • Opcode Fuzzy Hash: fc6fffd0465f4fb23e015a3ec5c98b83c5e8254fc9b8eb92b78b5e12e0049482
                                                                  • Instruction Fuzzy Hash: BF51892270064D97EB388B3C84967BE67C5DB51300F180DD9EB82D7293CA15DE4DD356
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: K
                                                                  • API String ID: 0-856455061
                                                                  • Opcode ID: 62473e297bb5ec01075fe4acbb71b04f966505f4938570131b8b15e906ca59eb
                                                                  • Instruction ID: c5772c323a1c83001666a7efc2b69fb8fb9ae89694c9be265d6ad22ef18bdc1e
                                                                  • Opcode Fuzzy Hash: 62473e297bb5ec01075fe4acbb71b04f966505f4938570131b8b15e906ca59eb
                                                                  • Instruction Fuzzy Hash: D5714A35510249BFCB04CF98C895FEE7B75EF88300F0885A8F9199B281D275D768CB95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  • dyn trees: dyn %ld, stat %ld, xrefs: 00BE723E
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: dyn trees: dyn %ld, stat %ld
                                                                  • API String ID: 0-3357164542
                                                                  • Opcode ID: 56d2101f520c05a6c397a1fd305888fb7591b6d4e4963c528cb45e206a433596
                                                                  • Instruction ID: ae6008d1136d3c044be49eacc50b3178f8bd0aee31e71304c605e952db1618aa
                                                                  • Opcode Fuzzy Hash: 56d2101f520c05a6c397a1fd305888fb7591b6d4e4963c528cb45e206a433596
                                                                  • Instruction Fuzzy Hash: 2A217174604109EBCB04DF49C881DA977B9FF48348F1481B8F9099B342DB31EA42DB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: HeapProcess
                                                                  • String ID:
                                                                  • API String ID: 54951025-0
                                                                  • Opcode ID: a4ee77130ba62935b370d0bd24777c7a95480752c1f7e582e7824a6f52e01232
                                                                  • Instruction ID: fe6f2443b345813e49fc104e3bb76bfddffafe2310eb14381cd5eb708301cf62
                                                                  • Opcode Fuzzy Hash: a4ee77130ba62935b370d0bd24777c7a95480752c1f7e582e7824a6f52e01232
                                                                  • Instruction Fuzzy Hash: E5A011302002008BC3008F3AAE0A30C3AA8AA08A8030A8028A000C2020EA208082EF00
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8947dd1abaa36d707c7d0f85989f1e2b68436c1b0ac2dcfa42890f2bf942250b
                                                                  • Instruction ID: 248bc86332dc6e3b8cde23c30f912ae73216e752c92d9ad3a891c74c2a29f4ea
                                                                  • Opcode Fuzzy Hash: 8947dd1abaa36d707c7d0f85989f1e2b68436c1b0ac2dcfa42890f2bf942250b
                                                                  • Instruction Fuzzy Hash: 43618AB164070D6BDE389B6C88E6BBE23C4EB12300F5405DAEB43DF281D615ED4E9719
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b6301b70a51074eeeb2c8e921e1db47d7642eac06ec39551afb3be17de706bc9
                                                                  • Instruction ID: 9f392c84c6856e7d682c968c11b1506a1afa0c5ac6ae17ef5dfec6a9558ce14d
                                                                  • Opcode Fuzzy Hash: b6301b70a51074eeeb2c8e921e1db47d7642eac06ec39551afb3be17de706bc9
                                                                  • Instruction Fuzzy Hash: 9451B130514189ABCB44DF29D890BA93BA2EF89355F15C26AFD298F385C335E790DF84
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00BE10D8
                                                                  • LoadLibraryW.KERNEL32(TurboActivate.dll,00000140,00BE10C8), ref: 00BE10EA
                                                                  • GetProcAddress.KERNEL32(00000000,TA_GetHandle), ref: 00BE1106
                                                                  • GetProcAddress.KERNEL32(?,TA_UseTrial), ref: 00BE1112
                                                                  • GetProcAddress.KERNEL32(?,TA_IsActivated), ref: 00BE111E
                                                                  • GetProcAddress.KERNEL32(?,TA_GetFeatureValue), ref: 00BE112A
                                                                  • GetProcAddress.KERNEL32(?,TA_Deactivate), ref: 00BE1136
                                                                  • GetProcAddress.KERNEL32(?,TA_TrialDaysRemaining), ref: 00BE1142
                                                                  • GetProcAddress.KERNEL32(?,TA_CheckAndSavePKey), ref: 00BE114E
                                                                  • GetProcAddress.KERNEL32(?,TA_Activate), ref: 00BE115A
                                                                  • GetLastError.KERNEL32(Failed to load activation library. GetLastError()=), ref: 00BE1375
                                                                  • MessageBoxW.USER32(00000000,Failed to load activation library. Please contact Letasoft support team at support@letasoft.com,Letasoft,00000030), ref: 00BE13A5
                                                                  Strings
                                                                  • LoadActivate::Init, xrefs: 00BE1355
                                                                  • Letasoft, xrefs: 00BE1399
                                                                  • Failed to load activation library. Please contact Letasoft support team at support@letasoft.com, xrefs: 00BE139E
                                                                  • TurboActivate.dll, xrefs: 00BE10E5
                                                                  • TA_GetHandle, xrefs: 00BE1100
                                                                  • TA_UseTrial, xrefs: 00BE1108
                                                                  • Failed to load activation library. GetLastError()=, xrefs: 00BE1369
                                                                  • 20986331705021ca58edc424.96250074, xrefs: 00BE1166
                                                                  • TA_TrialDaysRemaining, xrefs: 00BE1138
                                                                  • TA_IsActivated, xrefs: 00BE1114
                                                                  • TA_GetFeatureValue, xrefs: 00BE1120
                                                                  • ..\..\..\SDK\Common\Protection\LimeLM\Protection.cpp, xrefs: 00BE134E
                                                                  • TA_Activate, xrefs: 00BE1150
                                                                  • TA_Deactivate, xrefs: 00BE112C
                                                                  • TA_CheckAndSavePKey, xrefs: 00BE1144
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$ErrorH_prolog3_LastLibraryLoadMessage
                                                                  • String ID: ..\..\..\SDK\Common\Protection\LimeLM\Protection.cpp$20986331705021ca58edc424.96250074$Failed to load activation library. GetLastError()=$Failed to load activation library. Please contact Letasoft support team at support@letasoft.com$Letasoft$LoadActivate::Init$TA_Activate$TA_CheckAndSavePKey$TA_Deactivate$TA_GetFeatureValue$TA_GetHandle$TA_IsActivated$TA_TrialDaysRemaining$TA_UseTrial$TurboActivate.dll
                                                                  • API String ID: 2297570056-3024451926
                                                                  • Opcode ID: aaad7f8699976469dc72a3d08bc98c1c4c66cd97314de0a02ea223e603765091
                                                                  • Instruction ID: 2df9174b5e4b7aa9fe94813b6bffc44afebf0c2a2044991eb3140a2904d1344e
                                                                  • Opcode Fuzzy Hash: aaad7f8699976469dc72a3d08bc98c1c4c66cd97314de0a02ea223e603765091
                                                                  • Instruction Fuzzy Hash: D581F671D00368EFCF65DF69C881ADDBBF4AF19304F1045EAE509AA255DB309A84CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00BE31B7
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00BE36AA
                                                                    • Part of subcall function 00BE1B5F: InitializeCriticalSection.KERNEL32(00C0F5C8,?,00BE3BA4,?), ref: 00BE1BB3
                                                                    • Part of subcall function 00BE1B5F: __Init_thread_footer.LIBCMT ref: 00BE1BC4
                                                                    • Part of subcall function 00BE17E7: GetCurrentThreadId.KERNEL32 ref: 00BE1863
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalCurrentFreeH_prolog3_Init_thread_footerInitializeLibrarySectionThread
                                                                  • String ID: FAILED$ SUCCEEDED$Activate$Activated with a previously saved product key$Activated with a previously saved product key$Activating with a product key FAILED with error=$Activating with a product key FAILED with error=%d$Activating with a product key SUCCEEDED$Already activated$Already activated$ApoInstaller.cpp$CheckSaveKey$FAILED to load licensing module$FAILED to load licensing module$StartTrial$Starting trial FAILED with error=$Starting trial FAILED with error=%d$Starting trial SUCCEEDED
                                                                  • API String ID: 3291180112-251940293
                                                                  • Opcode ID: b0a53bf56f40979db78f57bf10ca5ff0d703b055ca59c9d894fdfd8f7725894c
                                                                  • Instruction ID: d1b0234f9798b2bc9dd6e2132ee88bbe522f7f2ff0ab8559a0f0c650cfc44b38
                                                                  • Opcode Fuzzy Hash: b0a53bf56f40979db78f57bf10ca5ff0d703b055ca59c9d894fdfd8f7725894c
                                                                  • Instruction Fuzzy Hash: 2EC170706403A4AFCB29AB268D97EED77F1AF04B04F1045E8F5096B2D2DB708E41CB56
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00BE4B8C
                                                                    • Part of subcall function 00BE222C: _wcslen.LIBCMT ref: 00BE223F
                                                                    • Part of subcall function 00BE3E51: __EH_prolog3_GS.LIBCMT ref: 00BE3E5B
                                                                    • Part of subcall function 00BE3E51: SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,?), ref: 00BE3EAF
                                                                    • Part of subcall function 00BE21D5: std::_Deallocate.LIBCONCRT ref: 00BE2205
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$DeallocateFolderPath_wcslenstd::_
                                                                  • String ID: Diagnostics report has been created$1. Exporting system information...$2. Exporting Windows Application log...$3. Exporting Letasoft registry keys...$. Please send 'letasoft_report.zip' file to support@letasoft.com.$Diagnostics Report Creator$Logs$Reports$Sound Booster$letasoft_report.zip
                                                                  • API String ID: 4137113751-2886562063
                                                                  • Opcode ID: cd2b05d532dfb6948209dcaab9ac5d2e83e1821b8ac6f391d3489058bc790107
                                                                  • Instruction ID: 2b84f6ccfa93fb4863bde2634bd4c8007c6057a47a0ce76035ac6ad048c9b2b1
                                                                  • Opcode Fuzzy Hash: cd2b05d532dfb6948209dcaab9ac5d2e83e1821b8ac6f391d3489058bc790107
                                                                  • Instruction Fuzzy Hash: 59A16F75800288EADB14EFA5CC96BEDBBF8AF18714F5041DDE505B3282DB741B85CB62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetFileType.KERNEL32(?), ref: 00BEABF7
                                                                  • GetFileInformationByHandle.KERNEL32(?,?), ref: 00BEAC1E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: File$HandleInformationType
                                                                  • String ID: ($PE
                                                                  • API String ID: 4064226416-3347799738
                                                                  • Opcode ID: cb5a7a62e4ff785b89fbd43ad9a375df7ce2ea8280a5527abc1287d8853be43f
                                                                  • Instruction ID: b2b37a3625a8cdf40b2f432885b3b884eccedbdecd7d0812cb63334447cbe3cc
                                                                  • Opcode Fuzzy Hash: cb5a7a62e4ff785b89fbd43ad9a375df7ce2ea8280a5527abc1287d8853be43f
                                                                  • Instruction Fuzzy Hash: FDC12AB1D00258DFEB14CFA5DC95BEDBBB9FB48704F108599E509AB280DB30AA85CF51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ILCreateFromPath.SHELL32 ref: 00BE48B4
                                                                  • ILFree.SHELL32(?), ref: 00BE499A
                                                                    • Part of subcall function 00BE17E7: GetCurrentThreadId.KERNEL32 ref: 00BE1863
                                                                  • ILCreateFromPath.SHELL32(?), ref: 00BE49D7
                                                                  • SHOpenFolderAndSelectItems.SHELL32(?,?,?,00000000), ref: 00BE4AAB
                                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00BE4ACE
                                                                    • Part of subcall function 00BE1B5F: InitializeCriticalSection.KERNEL32(00C0F5C8,?,00BE3BA4,?), ref: 00BE1BB3
                                                                    • Part of subcall function 00BE1B5F: __Init_thread_footer.LIBCMT ref: 00BE1BC4
                                                                  • ILFree.SHELL32(?), ref: 00BE4B39
                                                                  • ILFree.SHELL32(?), ref: 00BE4B53
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Free$CreateFromPath$CriticalCurrentExecuteFolderInit_thread_footerInitializeItemsOpenSectionSelectShellThread
                                                                  • String ID: ILCreateFromPath() 2 FAILED. folderPath=$ILCreateFromPath() FAILED. folderPath=$OpenFolderAndSelectFiles$ReportCreator.cpp$SHOpenFolderAndSelectItems() FAILED. res=$malloc() FAILED$open
                                                                  • API String ID: 201577122-306693007
                                                                  • Opcode ID: f45a6b83ac117706195c27f53cdd96fe01d617a029dd4a4f9abeefd3a7766c4b
                                                                  • Instruction ID: 9a37c9ea20a0ff1da7a17211bc390553e13131cfd913f72712747953ba17963a
                                                                  • Opcode Fuzzy Hash: f45a6b83ac117706195c27f53cdd96fe01d617a029dd4a4f9abeefd3a7766c4b
                                                                  • Instruction Fuzzy Hash: 5181CF346002649FCB18EF6ACD86F9AB7E6EF45700F1041E9E505AB291DBB0DE81CF95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(0000000A,?), ref: 00BE1BF6
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00BE1BFD
                                                                  • GetTokenInformation.ADVAPI32(?,00000012(TokenIntegrityLevel),?,00000004,?), ref: 00BE1C29
                                                                  • GetTokenInformation.ADVAPI32(?,00000013(TokenIntegrityLevel),?,00000004,?), ref: 00BE1C44
                                                                  • DuplicateToken.ADVAPI32(?,00000001,?), ref: 00BE1C58
                                                                  • CreateWellKnownSid.ADVAPI32(0000001A,00000000,?,?), ref: 00BE1C74
                                                                  • CheckTokenMembership.ADVAPI32(?,?,?), ref: 00BE1C89
                                                                  • GetLastError.KERNEL32 ref: 00BE1C93
                                                                  • CloseHandle.KERNEL32(?), ref: 00BE1CA9
                                                                  • CloseHandle.KERNEL32(?), ref: 00BE1CB6
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00BE1CDF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Token$CloseHandleInformationProcess$CheckCreateCurrentDuplicateErrorException@8KnownLastMembershipOpenThrowWell
                                                                  • String ID: D
                                                                  • API String ID: 3332473350-2746444292
                                                                  • Opcode ID: e25b76a2553d2ccd4928c0aecddbb33ef2b06e93d7273e1a89a4bfda7b8b53fc
                                                                  • Instruction ID: e2a5f23365bdf65e6a0654774383d30816468d53d2eb684a21851ff8da4cf58d
                                                                  • Opcode Fuzzy Hash: e25b76a2553d2ccd4928c0aecddbb33ef2b06e93d7273e1a89a4bfda7b8b53fc
                                                                  • Instruction Fuzzy Hash: 1331E871D4128DABDF10DFEADC84BADBBBCEB04704F214569EA01EA254D7709906CB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___free_lconv_mon.LIBCMT ref: 00BFAF1B
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAA6E
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAA80
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAA92
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAAA4
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAAB6
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAAC8
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAADA
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAAEC
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAAFE
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAB10
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAB22
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAB34
                                                                    • Part of subcall function 00BFAA51: _free.LIBCMT ref: 00BFAB46
                                                                  • _free.LIBCMT ref: 00BFAF10
                                                                    • Part of subcall function 00BF58DB: HeapFree.KERNEL32(00000000,00000000,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?), ref: 00BF58F1
                                                                    • Part of subcall function 00BF58DB: GetLastError.KERNEL32(?,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?,?), ref: 00BF5903
                                                                  • _free.LIBCMT ref: 00BFAF32
                                                                  • _free.LIBCMT ref: 00BFAF47
                                                                  • _free.LIBCMT ref: 00BFAF52
                                                                  • _free.LIBCMT ref: 00BFAF74
                                                                  • _free.LIBCMT ref: 00BFAF87
                                                                  • _free.LIBCMT ref: 00BFAF95
                                                                  • _free.LIBCMT ref: 00BFAFA0
                                                                  • _free.LIBCMT ref: 00BFAFD8
                                                                  • _free.LIBCMT ref: 00BFAFDF
                                                                  • _free.LIBCMT ref: 00BFAFFC
                                                                  • _free.LIBCMT ref: 00BFB014
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                  • String ID:
                                                                  • API String ID: 161543041-0
                                                                  • Opcode ID: d0a344dddbd4f98530baba09c858d6147c0a16de1b9c76d1f3fd870283464887
                                                                  • Instruction ID: f805cdfcae599e6243ea619edd7506b4d1dddf3b4becb877e7c5b13eae20ebc2
                                                                  • Opcode Fuzzy Hash: d0a344dddbd4f98530baba09c858d6147c0a16de1b9c76d1f3fd870283464887
                                                                  • Instruction Fuzzy Hash: 2F3160F15046089FEB38AA39D845B76B3E8EF00351F2448A9F65CEB552DF30EC488B21
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00BE36C2
                                                                  • FreeLibrary.KERNEL32(?), ref: 00BE383C
                                                                    • Part of subcall function 00BE1B5F: InitializeCriticalSection.KERNEL32(00C0F5C8,?,00BE3BA4,?), ref: 00BE1BB3
                                                                    • Part of subcall function 00BE1B5F: __Init_thread_footer.LIBCMT ref: 00BE1BC4
                                                                    • Part of subcall function 00BE17E7: GetCurrentThreadId.KERNEL32 ref: 00BE1863
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalCurrentFreeH_prolog3_Init_thread_footerInitializeLibrarySectionThread
                                                                  • String ID: Already deactivated or never been activated$Already deactivated or never been activated$ApoInstaller.cpp$Deactivate$Deactivation FAILED with error=$Deactivation FAILED with error=%d$Deactivation SUCCEEDED$FAILED to load licensing module$FAILED to load licensing module
                                                                  • API String ID: 3291180112-863891108
                                                                  • Opcode ID: c9f8984585b55c971bbca069a81e51cbe6676df57e25ad9885053c3576ea19bf
                                                                  • Instruction ID: 1ea0b960d3852ca6553e2532d20b7329cfd960987cba092a1833794f74f88510
                                                                  • Opcode Fuzzy Hash: c9f8984585b55c971bbca069a81e51cbe6676df57e25ad9885053c3576ea19bf
                                                                  • Instruction Fuzzy Hash: F531AC746402906BDB28BB728D5BEAE76E29F45F04F2045E8F106AB1D3CF708E40CB52
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00BE4389
                                                                    • Part of subcall function 00BE222C: _wcslen.LIBCMT ref: 00BE223F
                                                                    • Part of subcall function 00BE2573: __EH_prolog3.LIBCMT ref: 00BE257A
                                                                    • Part of subcall function 00BE52A5: _wcslen.LIBCMT ref: 00BE52C2
                                                                    • Part of subcall function 00BE419A: GetConsoleWindow.KERNEL32 ref: 00BE41B7
                                                                    • Part of subcall function 00BE419A: ShellExecuteExW.SHELL32(0000003C), ref: 00BE41E6
                                                                    • Part of subcall function 00BE419A: WaitForSingleObject.KERNEL32(?,000007D0), ref: 00BE41FF
                                                                    • Part of subcall function 00BE419A: CloseHandle.KERNEL32(?), ref: 00BE4225
                                                                    • Part of subcall function 00BE21D5: std::_Deallocate.LIBCONCRT ref: 00BE2205
                                                                    • Part of subcall function 00BE2573: _wcslen.LIBCMT ref: 00BE25BA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$CloseConsoleDeallocateExecuteH_prolog3H_prolog3_HandleObjectShellSingleWaitWindowstd::_
                                                                  • String ID: " "$Sound Booster$current_user.txt" /y$export "HKCR\AudioEngine\AudioProcessingObjects" "$export "HKCU\Software\Letasoft\$export "HKLM\Software\Letasoft\$export "HKLM\Software\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render" "$local_machine.txt" /y /reg:64$reg.exe
                                                                  • API String ID: 2693919150-2452782743
                                                                  • Opcode ID: f1e13fe94f2d85080be36423fb7995663529eb7b9aff05c5499d7f500e70d122
                                                                  • Instruction ID: bd888eb5d1de77055122b5d1d7f94f6c3b19ea5572b502ffa4c925478dc4e49a
                                                                  • Opcode Fuzzy Hash: f1e13fe94f2d85080be36423fb7995663529eb7b9aff05c5499d7f500e70d122
                                                                  • Instruction Fuzzy Hash: 6D714571D10288EADB14EBA5CC56BDEBBF8AF59310F504098E505B71C2EF741B49C752
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentThreadId.KERNEL32 ref: 00BE1863
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentThread
                                                                  • String ID: %s [%d] $DEBUG$ERROR$FATAL$INFO$NONE$WARNING$[%s@%s:%d] $[this=0x%p]
                                                                  • API String ID: 2882836952-4283364438
                                                                  • Opcode ID: 1534da1a9cc5786777bb84b2ce4cb48bee89fcbcfa1f7c6aaf77793da7f3ce5a
                                                                  • Instruction ID: 7100cdef024d5f68ca2b09b7692ba5d6c9562616e125429d606c1390b34dc6a0
                                                                  • Opcode Fuzzy Hash: 1534da1a9cc5786777bb84b2ce4cb48bee89fcbcfa1f7c6aaf77793da7f3ce5a
                                                                  • Instruction Fuzzy Hash: 7C316F71A00358AFDF10DFA9CC42B9EB7E8AB09704F1044E5B64DA7282DB719A44CB62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • DeleteFileW.KERNEL32(?), ref: 00BE4655
                                                                  • GetLastError.KERNEL32( GetLastError()=, data._subFolderNames[i]=,AddFolderContent() FAILED. data._baseFolderPath=), ref: 00BE477A
                                                                    • Part of subcall function 00BE1B5F: InitializeCriticalSection.KERNEL32(00C0F5C8,?,00BE3BA4,?), ref: 00BE1BB3
                                                                    • Part of subcall function 00BE1B5F: __Init_thread_footer.LIBCMT ref: 00BE1BC4
                                                                    • Part of subcall function 00BE17E7: GetCurrentThreadId.KERNEL32 ref: 00BE1863
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalCurrentDeleteErrorFileInit_thread_footerInitializeLastSectionThread
                                                                  • String ID: GetLastError()=$ data._subFolderNames[i]=$AddFolderContent() FAILED. data._baseFolderPath=$Compress$CreateZip() FAILED$Empty input and/or output paths$ReportCreator.cpp
                                                                  • API String ID: 2519789086-945714659
                                                                  • Opcode ID: 757439656630dcd18355739177be169cd847b7dbe5d86e1d0eac4bebc2b80e8c
                                                                  • Instruction ID: 35254e8ea8a9564fcc8d999d6f17c40a855d7191dd17fa4ee29a4af399101b2d
                                                                  • Opcode Fuzzy Hash: 757439656630dcd18355739177be169cd847b7dbe5d86e1d0eac4bebc2b80e8c
                                                                  • Instruction Fuzzy Hash: 9751A030A016A49FCB28DF26CC46B99B3F2BF05B04F1045E8E505AB291DB70AE91CFD5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00BE3FFC
                                                                  • SHGetFolderPathW.SHELL32(00000000,00000025,00000000,00000000,?), ref: 00BE404A
                                                                  • _wcslen.LIBCMT ref: 00BE409A
                                                                  • PathFileExistsW.SHLWAPI(?,msinfo32.exe,00000000,?), ref: 00BE40C6
                                                                  • SHGetFolderPathW.SHELL32(00000000,0000002C,00000000,00000000,?), ref: 00BE40FB
                                                                  • _wcslen.LIBCMT ref: 00BE4149
                                                                  • PathFileExistsW.SHLWAPI(?,Microsoft Shared\MSInfo\msinfo32.exe,00000000,?), ref: 00BE4171
                                                                    • Part of subcall function 00BE21D5: std::_Deallocate.LIBCONCRT ref: 00BE2205
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Path$ExistsFileFolder_wcslen$DeallocateH_prolog3_std::_
                                                                  • String ID: Microsoft Shared\MSInfo\msinfo32.exe$msinfo32.exe
                                                                  • API String ID: 1747826434-4145124285
                                                                  • Opcode ID: bfe3134d68a8b0e4936b16fed8f4d6150a12e3050260001e6f116909ff2386bc
                                                                  • Instruction ID: d14ce0ba154c5c1b7bf001a0b35dc9a68d9b7e84c6a155de2b7b92568a1ef03f
                                                                  • Opcode Fuzzy Hash: bfe3134d68a8b0e4936b16fed8f4d6150a12e3050260001e6f116909ff2386bc
                                                                  • Instruction Fuzzy Hash: 79414D71A50259AADB20EB61CC99BEDB3FCEF18714F4001E4A508A7191DB74AF84CF61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _free.LIBCMT ref: 00BF6688
                                                                    • Part of subcall function 00BF58DB: HeapFree.KERNEL32(00000000,00000000,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?), ref: 00BF58F1
                                                                    • Part of subcall function 00BF58DB: GetLastError.KERNEL32(?,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?,?), ref: 00BF5903
                                                                  • _free.LIBCMT ref: 00BF6694
                                                                  • _free.LIBCMT ref: 00BF669F
                                                                  • _free.LIBCMT ref: 00BF66AA
                                                                  • _free.LIBCMT ref: 00BF66B5
                                                                  • _free.LIBCMT ref: 00BF66C0
                                                                  • _free.LIBCMT ref: 00BF66CB
                                                                  • _free.LIBCMT ref: 00BF66D6
                                                                  • _free.LIBCMT ref: 00BF66E1
                                                                  • _free.LIBCMT ref: 00BF66EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 10caa91b11f360eba85c29590604d40de6b3fcc7668f4650115d8964a79d1c34
                                                                  • Instruction ID: f0e7e2a35144f055d6514f8e1115320371bee270579a86f6295cde6505e8a6c1
                                                                  • Opcode Fuzzy Hash: 10caa91b11f360eba85c29590604d40de6b3fcc7668f4650115d8964a79d1c34
                                                                  • Instruction Fuzzy Hash: C61177B650090CFFCB15EF94C882CE93BE5EF04391B6141A5FB099B162DA31DE559F50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _strlen
                                                                  • String ID: .arc$.arj$.gz$.lzh$.tgz$.zip$.zoo
                                                                  • API String ID: 4218353326-51310709
                                                                  • Opcode ID: cb1d2f66ac9587f01320833c8daa4025cbcb3ff4eab6b100f2d1794f7538066c
                                                                  • Instruction ID: ba0cd7912e4758991e25c9c7e80f3e6e1b9fee377f48458ab47a89a56635134f
                                                                  • Opcode Fuzzy Hash: cb1d2f66ac9587f01320833c8daa4025cbcb3ff4eab6b100f2d1794f7538066c
                                                                  • Instruction Fuzzy Hash: E03184B9E44388B7CB14DA59CB9197E37ED9961701B2010F4E908A7240F732FF44E762
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00BEAFE4
                                                                  • GetCurrentProcess.KERNEL32(?,00000000), ref: 00BEAFEF
                                                                  • DuplicateHandle.KERNEL32(00000000), ref: 00BEAFF6
                                                                  • GetFileType.KERNEL32 ref: 00BEB015
                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001), ref: 00BEB04F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentFileProcess$DuplicateHandlePointerType
                                                                  • String ID:
                                                                  • API String ID: 952225019-0
                                                                  • Opcode ID: 5cc843279e8d688771ec46575f3435bff8ac88fc5914b4e59185bdd8e40a297b
                                                                  • Instruction ID: d2184cd6b17f24a730048d250c4046780466687254bf8c3cae46d38b6caf0e44
                                                                  • Opcode Fuzzy Hash: 5cc843279e8d688771ec46575f3435bff8ac88fc5914b4e59185bdd8e40a297b
                                                                  • Instruction Fuzzy Hash: 6A711674A00288EFDB14CF95C998FAEBBF5FB04314F208598E511AB281C375EE81DB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCPInfo.KERNEL32(?,?), ref: 00BFF95F
                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00BFF9E2
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00BFFA75
                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00BFFA8C
                                                                    • Part of subcall function 00BF5915: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BECC8F,?,?,00BE1050,?,?,?,?,?), ref: 00BF5947
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00BFFB08
                                                                  • __freea.LIBCMT ref: 00BFFB33
                                                                  • __freea.LIBCMT ref: 00BFFB3F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                  • String ID:
                                                                  • API String ID: 2829977744-0
                                                                  • Opcode ID: 72288d5879e9c0739650d676833d1e436a866fd525c55665f38e9ec1370076b4
                                                                  • Instruction ID: 08c9e209afc559bf0aff18e95677bd3c46457c30c8b0e640b6acb76cd499574e
                                                                  • Opcode Fuzzy Hash: 72288d5879e9c0739650d676833d1e436a866fd525c55665f38e9ec1370076b4
                                                                  • Instruction Fuzzy Hash: 17919172E0021BAADB249F64C891BBEBBF5DF09710F1881B9EA05E7141D765DC49CB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00BFE4FE,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BFDDCB
                                                                  • __fassign.LIBCMT ref: 00BFDE46
                                                                  • __fassign.LIBCMT ref: 00BFDE61
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00BFDE87
                                                                  • WriteFile.KERNEL32(?,00000000,00000000,00BFE4FE,00000000,?,?,?,?,?,?,?,?,?,00BFE4FE,00000000), ref: 00BFDEA6
                                                                  • WriteFile.KERNEL32(?,00000000,00000001,00BFE4FE,00000000,?,?,?,?,?,?,?,?,?,00BFE4FE,00000000), ref: 00BFDEDF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                  • String ID:
                                                                  • API String ID: 1324828854-0
                                                                  • Opcode ID: dbe2210245e744af65d5601fbeba0637d50b13c683fb77850db5b4dd35e6e48b
                                                                  • Instruction ID: 56f00226af5026c9206debad5ab22f1ff3ebb2571f53f6a914ba4f914974e79c
                                                                  • Opcode Fuzzy Hash: dbe2210245e744af65d5601fbeba0637d50b13c683fb77850db5b4dd35e6e48b
                                                                  • Instruction Fuzzy Hash: D451A2B1E002499FDF10CFA8D885BEEBBF9EF19300F14459AEA56E7251D730A945CB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 00BFABB8: _free.LIBCMT ref: 00BFABE1
                                                                  • _free.LIBCMT ref: 00BFAC42
                                                                    • Part of subcall function 00BF58DB: HeapFree.KERNEL32(00000000,00000000,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?), ref: 00BF58F1
                                                                    • Part of subcall function 00BF58DB: GetLastError.KERNEL32(?,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?,?), ref: 00BF5903
                                                                  • _free.LIBCMT ref: 00BFAC4D
                                                                  • _free.LIBCMT ref: 00BFAC58
                                                                  • _free.LIBCMT ref: 00BFACAC
                                                                  • _free.LIBCMT ref: 00BFACB7
                                                                  • _free.LIBCMT ref: 00BFACC2
                                                                  • _free.LIBCMT ref: 00BFACCD
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: eb4ceb66bf3b2d5ff5d31468e1cdf18bdfc8e6db66c67aa6c7462a5821656935
                                                                  • Instruction ID: ee9992b5e9ec41152a604c05f5bedb39899a1ea6d8ccfcd7f1807e32c109d771
                                                                  • Opcode Fuzzy Hash: eb4ceb66bf3b2d5ff5d31468e1cdf18bdfc8e6db66c67aa6c7462a5821656935
                                                                  • Instruction Fuzzy Hash: 1F11D8B1540B08AADA34B7F0CD06FEA77D99F04781F404CA5B39D670A3DA65B5094B51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,00BF01FF,00BEE778,00C0C120,00000010,00BEDF40,?,?,?,?,?,00000000,?), ref: 00BF0216
                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00BF0224
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BF023D
                                                                  • SetLastError.KERNEL32(00000000,00BF01FF,00BEE778,00C0C120,00000010,00BEDF40,?,?,?,?,?,00000000,?), ref: 00BF028F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastValue___vcrt_
                                                                  • String ID:
                                                                  • API String ID: 3852720340-0
                                                                  • Opcode ID: 4c8ce417427f7fdffdc4e905a08b8d0f0231c6e9ff1252849a73c9a8f729bb19
                                                                  • Instruction ID: 58d4d0b1488d24da45efcde30015c40d9a9a99b6e5ed6f6c0b2f8f1ed8b9cb9b
                                                                  • Opcode Fuzzy Hash: 4c8ce417427f7fdffdc4e905a08b8d0f0231c6e9ff1252849a73c9a8f729bb19
                                                                  • Instruction Fuzzy Hash: F401B53626E61E6EDB6437756CC977E26DCEB017B972106BAF620420F3EB514808A160
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetConsoleWindow.KERNEL32 ref: 00BE41B7
                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 00BE41E6
                                                                  • WaitForSingleObject.KERNEL32(?,000007D0), ref: 00BE41FF
                                                                  • CloseHandle.KERNEL32(?), ref: 00BE4225
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseConsoleExecuteHandleObjectShellSingleWaitWindow
                                                                  • String ID: <$@
                                                                  • API String ID: 2771057787-1426351568
                                                                  • Opcode ID: e9366552bcbb2f4f47170a90f86fb890a8074a73b9ae7f3ee3a370e1a0f3cb0c
                                                                  • Instruction ID: 68c3a9060b246b6b720dbb668e93da2e134a55e132950ceb2e9bd4318ddc7b6e
                                                                  • Opcode Fuzzy Hash: e9366552bcbb2f4f47170a90f86fb890a8074a73b9ae7f3ee3a370e1a0f3cb0c
                                                                  • Instruction Fuzzy Hash: 07119E71D012189BCB109F9AA88829DBFF9FF44721F21016AE909F3200CB759A41CBA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00BF267C,00BF267C,?,?,?,00BFBCFE,00000001,00000001,91E85006), ref: 00BFBB07
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00BFBCFE,00000001,00000001,91E85006,?,?,?), ref: 00BFBB8D
                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,91E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00BFBC87
                                                                  • __freea.LIBCMT ref: 00BFBC94
                                                                    • Part of subcall function 00BF5915: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BECC8F,?,?,00BE1050,?,?,?,?,?), ref: 00BF5947
                                                                  • __freea.LIBCMT ref: 00BFBC9D
                                                                  • __freea.LIBCMT ref: 00BFBCC2
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1414292761-0
                                                                  • Opcode ID: a6c367f827765e4fc6cd150525c7d811a0f2b31516240fd2efa4f045f4f7363c
                                                                  • Instruction ID: 6b9273517269ed25aa1fdb1aab74caf0d63a9e6a7522ff4d12c483989d68f7ea
                                                                  • Opcode Fuzzy Hash: a6c367f827765e4fc6cd150525c7d811a0f2b31516240fd2efa4f045f4f7363c
                                                                  • Instruction Fuzzy Hash: A651AD7261021AAAEB258F64CC81FBF7BE9EB44750F2546A9FE08D7150EF34DC58C690
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateFileMappingW.KERNEL32(000000FF,00000000,00000004,00000000,?,00000000,?,00BEBD78,?,000000FF,?,00004000), ref: 00BEB29D
                                                                  • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,?,?,00BEBD78,?), ref: 00BEB2CE
                                                                  • CloseHandle.KERNEL32(00000000,?,00BEBD78,?), ref: 00BEB2E1
                                                                  • UnmapViewOfFile.KERNEL32(?,?,?,?,?,00BEBD78,?), ref: 00BEB319
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00BEBD78,?), ref: 00BEB326
                                                                  • WriteFile.KERNEL32(000000FF,?,000000FF,00000000,00000000), ref: 00BEB39D
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseHandleView$CreateMappingUnmapWrite
                                                                  • String ID:
                                                                  • API String ID: 2825254369-0
                                                                  • Opcode ID: 0a194155c4f566262ae1e877da811a56ebf932b4ec40aed659233f00effc9b21
                                                                  • Instruction ID: b3ac02fd666b5d88a985740674a0d3469eb167688b8ef437e2a2ee23c9962a77
                                                                  • Opcode Fuzzy Hash: 0a194155c4f566262ae1e877da811a56ebf932b4ec40aed659233f00effc9b21
                                                                  • Instruction Fuzzy Hash: 90517374A00148EFCB04CF99C995FAEB7B6AB88314F208598E915AB395C730EE41DB94
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00000000,00BF0F83,00000000,?,?,00BF09DB,?,?,00000000,?), ref: 00BF676C
                                                                  • _free.LIBCMT ref: 00BF679F
                                                                  • _free.LIBCMT ref: 00BF67C7
                                                                  • SetLastError.KERNEL32(00000000,?,00000000,?), ref: 00BF67D4
                                                                  • SetLastError.KERNEL32(00000000,?,00000000,?), ref: 00BF67E0
                                                                  • _abort.LIBCMT ref: 00BF67E6
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free$_abort
                                                                  • String ID:
                                                                  • API String ID: 3160817290-0
                                                                  • Opcode ID: 09bffff57ea285a57453ff4307179430080320dda9fb7486385abaeb0086358e
                                                                  • Instruction ID: 262421accabc5a939570abcbb9118229c0155a80b1fc40d6c85ce3fbd666027c
                                                                  • Opcode Fuzzy Hash: 09bffff57ea285a57453ff4307179430080320dda9fb7486385abaeb0086358e
                                                                  • Instruction Fuzzy Hash: 04F0F431144A0876C6223334AC86B7F23D9DFD1B79F3104A8FF14A3596EE208C0E8260
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000008,?,74DF2EE0,00000000), ref: 00BE1D94
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00BE1D9B
                                                                  • GetLastError.KERNEL32 ref: 00BE1DA5
                                                                  • GetTokenInformation.ADVAPI32(?,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00BE1DBE
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00BE1DD4
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00BE1DF6
                                                                    • Part of subcall function 00BEFC6B: RaiseException.KERNEL32(?,?,?,00BECC03,?,?,?,?,?,?,?,?,00BECC03,?,00C0BFD8), ref: 00BEFCCA
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessToken$CloseCurrentErrorExceptionException@8HandleInformationLastOpenRaiseThrow
                                                                  • String ID:
                                                                  • API String ID: 661555004-0
                                                                  • Opcode ID: 92dfa92949cda6a068a490973f1f0b80b52c1457f0ba701838194189451633ee
                                                                  • Instruction ID: a8710a9f582614f9c85c47d42d42fe0bbd259da8285b4be3facbccf4618bd809
                                                                  • Opcode Fuzzy Hash: 92dfa92949cda6a068a490973f1f0b80b52c1457f0ba701838194189451633ee
                                                                  • Instruction Fuzzy Hash: CC014071D01258FBDB10DBA6DD09BEE7BBCEB44755F2185A5E904E2150D7309A04DBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00BE423B
                                                                    • Part of subcall function 00BE222C: _wcslen.LIBCMT ref: 00BE223F
                                                                  • _wcslen.LIBCMT ref: 00BE4285
                                                                    • Part of subcall function 00BE419A: GetConsoleWindow.KERNEL32 ref: 00BE41B7
                                                                    • Part of subcall function 00BE419A: ShellExecuteExW.SHELL32(0000003C), ref: 00BE41E6
                                                                    • Part of subcall function 00BE419A: WaitForSingleObject.KERNEL32(?,000007D0), ref: 00BE41FF
                                                                    • Part of subcall function 00BE419A: CloseHandle.KERNEL32(?), ref: 00BE4225
                                                                  • PathFileExistsW.SHLWAPI(?," /categories +all,00000000,?,00000000,000000FF,/nfo ",00000034,00BE431F,00000010,00BE4C57,00000001,00000000,00000001,00000000,Sound Booster), ref: 00BE42AD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$CloseConsoleExecuteExistsFileH_prolog3_HandleObjectPathShellSingleWaitWindow
                                                                  • String ID: " /categories +all$/nfo "
                                                                  • API String ID: 1997390582-2283656642
                                                                  • Opcode ID: 51ce70df627d52cf5ef523c7c3b36dfcf2e73851ed63ccd7c67affc447d9b3a4
                                                                  • Instruction ID: 0c18b56e35727d5ea1005698dbcc7456cea089313084486efb0c5fd96b7fdca5
                                                                  • Opcode Fuzzy Hash: 51ce70df627d52cf5ef523c7c3b36dfcf2e73851ed63ccd7c67affc447d9b3a4
                                                                  • Instruction Fuzzy Hash: EF11A031841298AEDF14EBA2CC56BEDB7F8EF55724F140188F9017B1D2DB702A49CB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00BF3D67,00000000,?,00BF3D07,00000000,00C0C2C0,0000000C,00BF3E1A,00000000,00000002), ref: 00BF3D92
                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00BF3DA5
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,00BF3D67,00000000,?,00BF3D07,00000000,00C0C2C0,0000000C,00BF3E1A,00000000,00000002), ref: 00BF3DC8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                  • API String ID: 4061214504-1276376045
                                                                  • Opcode ID: d846ae8cc18c1a3250dd91b0ca2d163ed5705e37cad5fb9acfb8a1f58cc2f13e
                                                                  • Instruction ID: 535e116f453fc2083170eb966fa32fa743f38f3eaae13c317441fc14b8dfd645
                                                                  • Opcode Fuzzy Hash: d846ae8cc18c1a3250dd91b0ca2d163ed5705e37cad5fb9acfb8a1f58cc2f13e
                                                                  • Instruction Fuzzy Hash: 0CF0AF30A0120CBBDB009B91DC49BEEBFFDEB04706F0581A5F905A6290CB358E44CA90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID:
                                                                  • API String ID: 269201875-0
                                                                  • Opcode ID: 60710d5075957caee7a2c5f55d80b659f06e593b91474978b6500066ad419378
                                                                  • Instruction ID: 3b5976116916f6395c4ee300e1bbbda66f7803137feb32a97447c079686e462f
                                                                  • Opcode Fuzzy Hash: 60710d5075957caee7a2c5f55d80b659f06e593b91474978b6500066ad419378
                                                                  • Instruction Fuzzy Hash: D941D272A00208EFDB14DF78C881A6EB7E5EF85314F2585A9E615EB351DB71AD06CB80
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetFileType.KERNEL32(000000FF,?,?,?,?,?,?,?,?,?,00BEBF45), ref: 00BEB6B0
                                                                  • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000000), ref: 00BEB702
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: File$PointerType
                                                                  • String ID:
                                                                  • API String ID: 2827806931-0
                                                                  • Opcode ID: 7ce1fd8692ddf97aa4e8585e766df5339f847d521a0274734d6a839f4f91e938
                                                                  • Instruction ID: 427faf87a6b5c0cb15e36821b26909a7b7976ea0c93e587e277a928d18c9d2cd
                                                                  • Opcode Fuzzy Hash: 7ce1fd8692ddf97aa4e8585e766df5339f847d521a0274734d6a839f4f91e938
                                                                  • Instruction Fuzzy Hash: 8651F9B4E00249DFDB04CF99C495BAEBBB5FF48314F108199EA05AB391D735E985CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 00BF9A80
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BF9AA3
                                                                    • Part of subcall function 00BF5915: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BECC8F,?,?,00BE1050,?,?,?,?,?), ref: 00BF5947
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00BF9AC9
                                                                  • _free.LIBCMT ref: 00BF9ADC
                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BF9AEB
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                  • String ID:
                                                                  • API String ID: 336800556-0
                                                                  • Opcode ID: c0104d98943a8fca62200ffda3419e8757bf843400b98e509f155c757ee6be13
                                                                  • Instruction ID: 336216ef5ba63918c9562ce24f4924d0402a5ed2218b898cb3ed9bcd9faec36a
                                                                  • Opcode Fuzzy Hash: c0104d98943a8fca62200ffda3419e8757bf843400b98e509f155c757ee6be13
                                                                  • Instruction Fuzzy Hash: 6801D4726026597F632156A75C88E7F6AECDAC6FA531501AAFB04D3100DE618D05D1B0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00BE1D21
                                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00BE1D33
                                                                  • GetLastError.KERNEL32 ref: 00BE1D3D
                                                                  • FreeSid.ADVAPI32(?), ref: 00BE1D4D
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00BE1D79
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateCheckErrorException@8FreeInitializeLastMembershipThrowToken
                                                                  • String ID:
                                                                  • API String ID: 649603114-0
                                                                  • Opcode ID: b2a2196a3ab2f5b27e85c627bbcc6bcb44cc43ae64f27b3eddb40d9caef8cd89
                                                                  • Instruction ID: b0728b2d2abe79be6b3980a758e6271bc8fb8b2533c12650c1665340e040b317
                                                                  • Opcode Fuzzy Hash: b2a2196a3ab2f5b27e85c627bbcc6bcb44cc43ae64f27b3eddb40d9caef8cd89
                                                                  • Instruction Fuzzy Hash: 1A111C70D0125DABDB10DFA59C85BBEBBBCFF08744F5149A9E911A2241D7309E04CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,?,00BF6B4B,00BF5958,?,?,00BECC8F,?,?,00BE1050,?,?,?,?,?), ref: 00BF67F1
                                                                  • _free.LIBCMT ref: 00BF6826
                                                                  • _free.LIBCMT ref: 00BF684D
                                                                  • SetLastError.KERNEL32(00000000), ref: 00BF685A
                                                                  • SetLastError.KERNEL32(00000000), ref: 00BF6863
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free
                                                                  • String ID:
                                                                  • API String ID: 3170660625-0
                                                                  • Opcode ID: 1d543823a07676803b7e0eb93507e938d10168a841dbd95f011df5333ac5b08f
                                                                  • Instruction ID: 7f358e0a2991ce51b6b5c66c4fd9cfc7431e69152e9ed1bd8960b94edeead85c
                                                                  • Opcode Fuzzy Hash: 1d543823a07676803b7e0eb93507e938d10168a841dbd95f011df5333ac5b08f
                                                                  • Instruction Fuzzy Hash: D001D136244A0877C62223255C86B7F27EDEBD67F172100BEFF05A3192EE608C0E81A0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _free.LIBCMT ref: 00BFAB67
                                                                    • Part of subcall function 00BF58DB: HeapFree.KERNEL32(00000000,00000000,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?), ref: 00BF58F1
                                                                    • Part of subcall function 00BF58DB: GetLastError.KERNEL32(?,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?,?), ref: 00BF5903
                                                                  • _free.LIBCMT ref: 00BFAB79
                                                                  • _free.LIBCMT ref: 00BFAB8B
                                                                  • _free.LIBCMT ref: 00BFAB9D
                                                                  • _free.LIBCMT ref: 00BFABAF
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: e6493d52303b8a6ed68a5a7ca5e4c3a5bdbc5c45418a95148a1a49a8f505a93c
                                                                  • Instruction ID: 60bd6c0c95c017c1b161af8fb21b580c3d5c37757b7f9eb95df5fe41e3eaa943
                                                                  • Opcode Fuzzy Hash: e6493d52303b8a6ed68a5a7ca5e4c3a5bdbc5c45418a95148a1a49a8f505a93c
                                                                  • Instruction Fuzzy Hash: 2CF062B24046086BC628DB68F4C6D2A73EAEA00B503650C95F24DE7A53CB30FC84CB65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _free.LIBCMT ref: 00BF4ADD
                                                                    • Part of subcall function 00BF58DB: HeapFree.KERNEL32(00000000,00000000,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?), ref: 00BF58F1
                                                                    • Part of subcall function 00BF58DB: GetLastError.KERNEL32(?,?,00BFABE6,?,00000000,?,00000000,?,00BFAC0D,?,00000007,?,?,00BFB06F,?,?), ref: 00BF5903
                                                                  • _free.LIBCMT ref: 00BF4AEF
                                                                  • _free.LIBCMT ref: 00BF4B02
                                                                  • _free.LIBCMT ref: 00BF4B13
                                                                  • _free.LIBCMT ref: 00BF4B24
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 3a462db3505a8190ce2276c296f605eeb497ecae262763397e355e7e5efabbcf
                                                                  • Instruction ID: 2a4b918464f80d6a1bb41335f9276e3a15047b2173fc8f9a0e1c46e9dde467eb
                                                                  • Opcode Fuzzy Hash: 3a462db3505a8190ce2276c296f605eeb497ecae262763397e355e7e5efabbcf
                                                                  • Instruction Fuzzy Hash: D8F017B5845A248BD626AB18FC4176E3BE4EB04B2171309AEF21063A72C77408CBCF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe,00000104), ref: 00BF3EA8
                                                                  • _free.LIBCMT ref: 00BF3F73
                                                                  • _free.LIBCMT ref: 00BF3F7D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$FileModuleName
                                                                  • String ID: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe
                                                                  • API String ID: 2506810119-3748090899
                                                                  • Opcode ID: 01c02c291f0f44cbc2ca462cd8195dd25feb3e59673405288f20e3d6dc11e7de
                                                                  • Instruction ID: 42bbf6acf706e6e6cc1f3859d8996ffad9e20bb5e1d0a72d31bbe8eec2a9d60c
                                                                  • Opcode Fuzzy Hash: 01c02c291f0f44cbc2ca462cd8195dd25feb3e59673405288f20e3d6dc11e7de
                                                                  • Instruction Fuzzy Hash: 28312371E0121CABDB21DF55D885EAEBBFCEB85B50B1040EAF60497211D7709F49CB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • OpenEventLogW.ADVAPI32(00000000,Application), ref: 00BE4344
                                                                  • BackupEventLogW.ADVAPI32(00000000,00000000), ref: 00BE435A
                                                                  • CloseEventLog.ADVAPI32(00000000), ref: 00BE4363
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Event$BackupCloseOpen
                                                                  • String ID: Application
                                                                  • API String ID: 148420937-583488022
                                                                  • Opcode ID: 9e1e9ce46703c1c3f7b7b1371157e843dbbb5ce8ad00823e6e7d76ad13f92432
                                                                  • Instruction ID: eee6f9a9b92ae38fbbd7ce383402374fbaab3aca8fe081e1ef1868102af667cf
                                                                  • Opcode Fuzzy Hash: 9e1e9ce46703c1c3f7b7b1371157e843dbbb5ce8ad00823e6e7d76ad13f92432
                                                                  • Instruction Fuzzy Hash: B1E02B321012D093CF38162B680CB6F6AF8DF8671571602BEF552D7150CB248C01C994
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00BF6B99,?,00000000,?,00000001,?,?,00000001,00BF6B99,?), ref: 00BFAD6A
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00BFADF3
                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00BF5A74,?), ref: 00BFAE05
                                                                  • __freea.LIBCMT ref: 00BFAE0E
                                                                    • Part of subcall function 00BF5915: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BECC8F,?,?,00BE1050,?,?,?,?,?), ref: 00BF5947
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                  • String ID:
                                                                  • API String ID: 2652629310-0
                                                                  • Opcode ID: 5b6ae67af7f0d9cd836dbc8c5994cedb92875a4ef95f4c8d1c914130c9161ec8
                                                                  • Instruction ID: 63a16bf3245e4ac3f3e3804ff43430f22b6d317c6f56ad0f6142d706c90f621d
                                                                  • Opcode Fuzzy Hash: 5b6ae67af7f0d9cd836dbc8c5994cedb92875a4ef95f4c8d1c914130c9161ec8
                                                                  • Instruction Fuzzy Hash: D031C0B1A0020AABDF289F64DC81EBE7BE5EB04710F1541A8FD09D7190EB35CD58CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00BEB5BF
                                                                  • GetLastError.KERNEL32 ref: 00BEB5CE
                                                                  • CreateFileW.KERNEL32(000000FF,80000000,00000003,00000000,00000003,00000000,00000000), ref: 00BEB5EC
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile$ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 3733516855-0
                                                                  • Opcode ID: 169ae07accf87565357ad15a9036d9ea9b8e6451757a85f796bb0cf476c0d96d
                                                                  • Instruction ID: aa62be82109474e8579de1156e5b1560d2e8f51a6ee66e53c376fad9ba00dea3
                                                                  • Opcode Fuzzy Hash: 169ae07accf87565357ad15a9036d9ea9b8e6451757a85f796bb0cf476c0d96d
                                                                  • Instruction Fuzzy Hash: A431D874A00248FFEB24DFA5D999F9EBBB4EB44314F208198E5156B3C0C7759E84DB84
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8692ae03dc9c9282229b542db48df926eafc23153ed5a0fd6c58dfc12f4f22a7
                                                                  • Instruction ID: 9018412f8f5ebc99bd56bd851ba33ba3d11ae570f9964ece4ce3facbc19dfb30
                                                                  • Opcode Fuzzy Hash: 8692ae03dc9c9282229b542db48df926eafc23153ed5a0fd6c58dfc12f4f22a7
                                                                  • Instruction Fuzzy Hash: A8018FB260961E7EF6202A786CC1F7B228CDB417B9B3547A5B721732D1DF708E488570
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5e539de0c408254b5c0fc5443a160ac828cfefedf604a28c341ac745cef6ddc6
                                                                  • Instruction ID: 82dcb568d82d736ca89eb30cf0f4cf2c13341c7884378ca178debe7c64f30493
                                                                  • Opcode Fuzzy Hash: 5e539de0c408254b5c0fc5443a160ac828cfefedf604a28c341ac745cef6ddc6
                                                                  • Instruction Fuzzy Hash: 7501D6B210961A7FE620267C7CC0E7B63DCDFA13B833503A9B721631D5DB20CE088160
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,00BF8060,?,00000000,00000000,00000000,?,00BF82D1,00000006,FlsSetValue), ref: 00BF80EB
                                                                  • GetLastError.KERNEL32(?,00BF8060,?,00000000,00000000,00000000,?,00BF82D1,00000006,FlsSetValue,00C06040,00C06048,00000000,00000364,?,00BF683A), ref: 00BF80F7
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00BF8060,?,00000000,00000000,00000000,?,00BF82D1,00000006,FlsSetValue,00C06040,00C06048,00000000), ref: 00BF8105
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad$ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 3177248105-0
                                                                  • Opcode ID: ede456c9634c070b1d561ae8abc71a9ec366c3a7afe917838a1106a6b6781e86
                                                                  • Instruction ID: b27edd0558f167879e5939849cca6488b8852653fe39564a66c93772d8a01e67
                                                                  • Opcode Fuzzy Hash: ede456c9634c070b1d561ae8abc71a9ec366c3a7afe917838a1106a6b6781e86
                                                                  • Instruction Fuzzy Hash: B601843270562AABDB214A799C45B6B77DCEF0D7A17150761FA06E7140DF20DA06C6E0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 00BEDF12
                                                                    • Part of subcall function 00BEE54A: ___AdjustPointer.LIBCMT ref: 00BEE594
                                                                  • _UnwindNestedFrames.LIBCMT ref: 00BEDF29
                                                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 00BEDF3B
                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 00BEDF5F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                  • String ID:
                                                                  • API String ID: 2633735394-0
                                                                  • Opcode ID: 3cbc2fd64af02f7ea80bf5655e8957b77a38434c99618603e3bbdbadd6cbcd02
                                                                  • Instruction ID: fce3e9d2ba4a09ed64bc03930c32cc594d5fee58b610894c6366ab5a5f4af735
                                                                  • Opcode Fuzzy Hash: 3cbc2fd64af02f7ea80bf5655e8957b77a38434c99618603e3bbdbadd6cbcd02
                                                                  • Instruction Fuzzy Hash: 35012532000189BBCF12AF56CC01EEA3BFAFF48754F058164F91966121D372E861EBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00BEFF97
                                                                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00BEFF9C
                                                                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00BEFFA1
                                                                    • Part of subcall function 00BF0359: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 00BF036A
                                                                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00BEFFB6
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2043197260.0000000000BE1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00BE0000, based on PE: true
                                                                  • Associated: 00000008.00000002.2043179639.0000000000BE0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043231474.0000000000C03000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043252630.0000000000C0E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043272831.0000000000C10000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  • Associated: 00000008.00000002.2043293018.0000000000C12000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_be0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                  • String ID:
                                                                  • API String ID: 1761009282-0
                                                                  • Opcode ID: 567f552d64800ebde8380407fe9fe069553ec6f2a375e5d5452746e04cbc2f74
                                                                  • Instruction ID: 8b4e29cba8c21d9efbe041135dc62e31117e981059ecbbf4b8bdf8f9cbf906b7
                                                                  • Opcode Fuzzy Hash: 567f552d64800ebde8380407fe9fe069553ec6f2a375e5d5452746e04cbc2f74
                                                                  • Instruction Fuzzy Hash: F7C04C1403268B551C103B7211661BD63C08CAB3C5B9061E1FE501702BCB06041E62F7
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Execution Graph

                                                                  Execution Coverage:5.4%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:10.3%
                                                                  Total number of Nodes:1863
                                                                  Total number of Limit Nodes:62
                                                                  execution_graph 13518 43320b 13519 42e253 26 API calls 13518->13519 13520 433219 13519->13520 13521 433227 13520->13521 13522 433246 13520->13522 13524 42d0d6 __dosmaperr 20 API calls 13521->13524 13523 433253 13522->13523 13526 433260 13522->13526 13525 42d0d6 __dosmaperr 20 API calls 13523->13525 13527 43322c 13524->13527 13525->13527 13526->13527 13529 4335e7 26 API calls 13526->13529 13530 4332e3 13526->13530 13531 4332f0 13526->13531 13529->13530 13530->13531 13533 434f96 13530->13533 13538 433431 13531->13538 13534 42beea __onexit 21 API calls 13533->13534 13535 434fb1 13534->13535 13536 42beb0 __freea 20 API calls 13535->13536 13537 434fbb 13536->13537 13537->13531 13539 42e253 26 API calls 13538->13539 13540 433440 13539->13540 13541 433452 13540->13541 13542 4334e4 13540->13542 13544 43346f 13541->13544 13547 433495 13541->13547 13543 433eda 65 API calls 13542->13543 13546 43347c 13543->13546 13545 433eda 65 API calls 13544->13545 13545->13546 13546->13527 13547->13546 13549 434f60 13547->13549 13552 434ddd 13549->13552 13551 434f76 13551->13546 13553 434de9 ___BuildCatchObject 13552->13553 13554 434df1 13553->13554 13555 434e09 13553->13555 13557 42d0c3 __dosmaperr 20 API calls 13554->13557 13556 434ebd 13555->13556 13560 434e41 13555->13560 13558 42d0c3 __dosmaperr 20 API calls 13556->13558 13559 434df6 13557->13559 13561 434ec2 13558->13561 13562 42d0d6 __dosmaperr 20 API calls 13559->13562 13577 43065a EnterCriticalSection 13560->13577 13565 42d0d6 __dosmaperr 20 API calls 13561->13565 13563 434dfe ___BuildCatchObject 13562->13563 13563->13551 13567 434eca 13565->13567 13566 434e47 13568 434e80 13566->13568 13569 434e6b 13566->13569 13570 427ce1 pre_c_initialization 26 API calls 13567->13570 13578 434ee2 13568->13578 13571 42d0d6 __dosmaperr 20 API calls 13569->13571 13570->13563 13573 434e70 13571->13573 13575 42d0c3 __dosmaperr 20 API calls 13573->13575 13574 434e7b 13587 434eb5 13574->13587 13575->13574 13577->13566 13590 430731 13578->13590 13580 434ef4 13581 434f0d SetFilePointerEx 13580->13581 13582 434efc 13580->13582 13584 434f25 GetLastError 13581->13584 13585 434f01 13581->13585 13583 42d0d6 __dosmaperr 20 API calls 13582->13583 13583->13585 13603 42d0a0 13584->13603 13585->13574 13608 43067d LeaveCriticalSection 13587->13608 13589 434ebb 13589->13563 13591 430753 13590->13591 13592 43073e 13590->13592 13595 42d0c3 __dosmaperr 20 API calls 13591->13595 13597 430778 13591->13597 13593 42d0c3 __dosmaperr 20 API calls 13592->13593 13594 430743 13593->13594 13596 42d0d6 __dosmaperr 20 API calls 13594->13596 13598 430783 13595->13598 13599 43074b 13596->13599 13597->13580 13600 42d0d6 __dosmaperr 20 API calls 13598->13600 13599->13580 13601 43078b 13600->13601 13602 427ce1 pre_c_initialization 26 API calls 13601->13602 13602->13599 13604 42d0c3 __dosmaperr 20 API calls 13603->13604 13605 42d0ab __dosmaperr 13604->13605 13606 42d0d6 __dosmaperr 20 API calls 13605->13606 13607 42d0be 13606->13607 13607->13585 13608->13589 14652 42e511 14653 42e51d ___BuildCatchObject 14652->14653 14664 42ee32 EnterCriticalSection 14653->14664 14655 42e524 14665 4305c2 14655->14665 14657 42e533 14663 42e542 14657->14663 14678 42e3a5 GetStartupInfoW 14657->14678 14661 42e45b 2 API calls 14661->14663 14662 42e553 ___BuildCatchObject 14684 42e55e 14663->14684 14664->14655 14666 4305ce ___BuildCatchObject 14665->14666 14667 4305f2 14666->14667 14668 4305db 14666->14668 14687 42ee32 EnterCriticalSection 14667->14687 14669 42d0d6 __dosmaperr 20 API calls 14668->14669 14671 4305e0 14669->14671 14672 427ce1 pre_c_initialization 26 API calls 14671->14672 14673 4305ea ___BuildCatchObject 14672->14673 14673->14657 14674 43062a 14695 430651 14674->14695 14676 4305fe 14676->14674 14688 430513 14676->14688 14679 42e3c2 14678->14679 14680 42e454 14678->14680 14679->14680 14681 4305c2 27 API calls 14679->14681 14680->14661 14682 42e3eb 14681->14682 14682->14680 14683 42e419 GetFileType 14682->14683 14683->14682 14699 42ee7a LeaveCriticalSection 14684->14699 14686 42e565 14686->14662 14687->14676 14689 42bf38 __dosmaperr 20 API calls 14688->14689 14694 430525 14689->14694 14690 430532 14691 42beb0 __freea 20 API calls 14690->14691 14693 430584 14691->14693 14692 42e893 11 API calls 14692->14694 14693->14676 14694->14690 14694->14692 14698 42ee7a LeaveCriticalSection 14695->14698 14697 430658 14697->14673 14698->14697 14699->14686 14788 42a929 14798 42ec09 14788->14798 14792 42a936 14811 42ecea 14792->14811 14795 42a960 14796 42beb0 __freea 20 API calls 14795->14796 14797 42a96b 14796->14797 14815 42ec12 14798->14815 14800 42a931 14801 42eabc 14800->14801 14802 42eac8 ___BuildCatchObject 14801->14802 14835 42ee32 EnterCriticalSection 14802->14835 14804 42eb3e 14849 42eb53 14804->14849 14806 42ead3 14806->14804 14807 42eb12 DeleteCriticalSection 14806->14807 14836 43379b 14806->14836 14810 42beb0 __freea 20 API calls 14807->14810 14808 42eb4a ___BuildCatchObject 14808->14792 14810->14806 14812 42ed00 14811->14812 14814 42a945 DeleteCriticalSection 14811->14814 14813 42beb0 __freea 20 API calls 14812->14813 14812->14814 14813->14814 14814->14792 14814->14795 14816 42ec1e ___BuildCatchObject 14815->14816 14825 42ee32 EnterCriticalSection 14816->14825 14818 42ecc1 14830 42ece1 14818->14830 14821 42eccd ___BuildCatchObject 14821->14800 14823 42ec2d 14823->14818 14824 42ebc2 69 API calls 14823->14824 14826 42a975 EnterCriticalSection 14823->14826 14827 42ecb7 14823->14827 14824->14823 14825->14823 14826->14823 14833 42a989 LeaveCriticalSection 14827->14833 14829 42ecbf 14829->14823 14834 42ee7a LeaveCriticalSection 14830->14834 14832 42ece8 14832->14821 14833->14829 14834->14832 14835->14806 14837 4337a7 ___BuildCatchObject 14836->14837 14838 4337b8 14837->14838 14839 4337cd 14837->14839 14840 42d0d6 __dosmaperr 20 API calls 14838->14840 14848 4337c8 ___BuildCatchObject 14839->14848 14852 42a975 EnterCriticalSection 14839->14852 14842 4337bd 14840->14842 14844 427ce1 pre_c_initialization 26 API calls 14842->14844 14843 4337e9 14853 433725 14843->14853 14844->14848 14846 4337f4 14869 433811 14846->14869 14848->14806 14931 42ee7a LeaveCriticalSection 14849->14931 14851 42eb5a 14851->14808 14852->14843 14854 433732 14853->14854 14855 433747 14853->14855 14856 42d0d6 __dosmaperr 20 API calls 14854->14856 14858 42eb5c 65 API calls 14855->14858 14867 433742 14855->14867 14857 433737 14856->14857 14859 427ce1 pre_c_initialization 26 API calls 14857->14859 14860 43375b 14858->14860 14859->14867 14861 42ecea 20 API calls 14860->14861 14862 433763 14861->14862 14863 42e253 26 API calls 14862->14863 14864 433769 14863->14864 14872 43509d 14864->14872 14867->14846 14868 42beb0 __freea 20 API calls 14868->14867 14930 42a989 LeaveCriticalSection 14869->14930 14871 433819 14871->14848 14873 4350c1 14872->14873 14874 4350ac 14872->14874 14876 4350fc 14873->14876 14879 4350e8 14873->14879 14875 42d0c3 __dosmaperr 20 API calls 14874->14875 14878 4350b1 14875->14878 14877 42d0c3 __dosmaperr 20 API calls 14876->14877 14880 435101 14877->14880 14881 42d0d6 __dosmaperr 20 API calls 14878->14881 14887 435075 14879->14887 14883 42d0d6 __dosmaperr 20 API calls 14880->14883 14884 43376f 14881->14884 14885 435109 14883->14885 14884->14867 14884->14868 14886 427ce1 pre_c_initialization 26 API calls 14885->14886 14886->14884 14890 434ff3 14887->14890 14889 435099 14889->14884 14891 434fff ___BuildCatchObject 14890->14891 14901 43065a EnterCriticalSection 14891->14901 14893 43500d 14894 435034 14893->14894 14895 43503f 14893->14895 14902 43511c 14894->14902 14897 42d0d6 __dosmaperr 20 API calls 14895->14897 14898 43503a 14897->14898 14917 435069 14898->14917 14900 43505c ___BuildCatchObject 14900->14889 14901->14893 14903 430731 26 API calls 14902->14903 14905 43512c 14903->14905 14904 435132 14920 4306a0 14904->14920 14905->14904 14906 435164 14905->14906 14908 430731 26 API calls 14905->14908 14906->14904 14909 430731 26 API calls 14906->14909 14911 43515b 14908->14911 14912 435170 CloseHandle 14909->14912 14915 430731 26 API calls 14911->14915 14912->14904 14916 43517c GetLastError 14912->14916 14913 4351ac 14913->14898 14914 42d0a0 __dosmaperr 20 API calls 14914->14913 14915->14906 14916->14904 14929 43067d LeaveCriticalSection 14917->14929 14919 435073 14919->14900 14921 430716 14920->14921 14922 4306af 14920->14922 14923 42d0d6 __dosmaperr 20 API calls 14921->14923 14922->14921 14928 4306d9 14922->14928 14924 43071b 14923->14924 14925 42d0c3 __dosmaperr 20 API calls 14924->14925 14926 430706 14925->14926 14926->14913 14926->14914 14927 430700 SetStdHandle 14927->14926 14928->14926 14928->14927 14929->14919 14930->14871 14931->14851 13960 4346d0 13963 42f890 13960->13963 13964 42f899 13963->13964 13966 42f8a2 13963->13966 13967 42f78f 13964->13967 13968 42ccf8 pre_c_initialization 41 API calls 13967->13968 13969 42f79c 13968->13969 13970 42f8ae __fassign 41 API calls 13969->13970 13971 42f7a4 13970->13971 13987 42f523 13971->13987 13974 42f7bb 13974->13966 13975 42beea __onexit 21 API calls 13976 42f7cc 13975->13976 13977 42f7fe 13976->13977 13994 42f950 13976->13994 13980 42beb0 __freea 20 API calls 13977->13980 13980->13974 13981 42f7f9 13982 42d0d6 __dosmaperr 20 API calls 13981->13982 13982->13977 13983 42f842 13983->13977 14004 42f3f9 13983->14004 13984 42f816 13984->13983 13985 42beb0 __freea 20 API calls 13984->13985 13985->13983 13988 4286c0 __fassign 41 API calls 13987->13988 13989 42f535 13988->13989 13990 42f556 13989->13990 13991 42f544 GetOEMCP 13989->13991 13992 42f55b GetACP 13990->13992 13993 42f56d 13990->13993 13991->13993 13992->13993 13993->13974 13993->13975 13995 42f523 43 API calls 13994->13995 13996 42f96f 13995->13996 13997 42f976 13996->13997 13999 42f9c0 IsValidCodePage 13996->13999 14002 42f9e5 _abort 13996->14002 13998 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 13997->13998 14000 42f7f1 13998->14000 13999->13997 14001 42f9d2 GetCPInfo 13999->14001 14000->13981 14000->13984 14001->13997 14001->14002 14007 42f5fb GetCPInfo 14002->14007 14075 42f3b6 14004->14075 14006 42f41d 14006->13977 14013 42f635 14007->14013 14016 42f6df 14007->14016 14010 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 14012 42f78b 14010->14012 14012->13997 14017 430a8d 14013->14017 14015 431806 46 API calls 14015->14016 14016->14010 14018 4286c0 __fassign 41 API calls 14017->14018 14019 430aad MultiByteToWideChar 14018->14019 14021 430b83 14019->14021 14022 430aeb 14019->14022 14023 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 14021->14023 14026 42beea __onexit 21 API calls 14022->14026 14027 430b0c _abort 14022->14027 14024 42f696 14023->14024 14031 431806 14024->14031 14025 430b7d 14036 430baa 14025->14036 14026->14027 14027->14025 14029 430b51 MultiByteToWideChar 14027->14029 14029->14025 14030 430b6d GetStringTypeW 14029->14030 14030->14025 14032 4286c0 __fassign 41 API calls 14031->14032 14033 431819 14032->14033 14040 4315e9 14033->14040 14037 430bb6 14036->14037 14039 430bc7 14036->14039 14038 42beb0 __freea 20 API calls 14037->14038 14037->14039 14038->14039 14039->14021 14042 431604 14040->14042 14041 43162a MultiByteToWideChar 14043 4317de 14041->14043 14044 431654 14041->14044 14042->14041 14045 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 14043->14045 14049 42beea __onexit 21 API calls 14044->14049 14051 431675 14044->14051 14046 42f6b7 14045->14046 14046->14015 14047 43172a 14053 430baa __freea 20 API calls 14047->14053 14048 4316be MultiByteToWideChar 14048->14047 14050 4316d7 14048->14050 14049->14051 14067 42e8f5 14050->14067 14051->14047 14051->14048 14053->14043 14055 431701 14055->14047 14058 42e8f5 11 API calls 14055->14058 14056 431739 14057 42beea __onexit 21 API calls 14056->14057 14061 43175a 14056->14061 14057->14061 14058->14047 14059 4317cf 14060 430baa __freea 20 API calls 14059->14060 14060->14047 14061->14059 14062 42e8f5 11 API calls 14061->14062 14063 4317ae 14062->14063 14063->14059 14064 4317bd WideCharToMultiByte 14063->14064 14064->14059 14065 4317fd 14064->14065 14066 430baa __freea 20 API calls 14065->14066 14066->14047 14068 42e5ad __dosmaperr 5 API calls 14067->14068 14069 42e91c 14068->14069 14070 42e97d 10 API calls 14069->14070 14072 42e925 14069->14072 14071 42e965 LCMapStringW 14070->14071 14071->14072 14073 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 14072->14073 14074 42e977 14073->14074 14074->14047 14074->14055 14074->14056 14076 42f3c2 ___BuildCatchObject 14075->14076 14083 42ee32 EnterCriticalSection 14076->14083 14078 42f3cc 14084 42f421 14078->14084 14082 42f3e5 ___BuildCatchObject 14082->14006 14083->14078 14096 43318a 14084->14096 14086 42f46f 14087 43318a 26 API calls 14086->14087 14088 42f48b 14087->14088 14089 43318a 26 API calls 14088->14089 14090 42f4a9 14089->14090 14091 42f3d9 14090->14091 14092 42beb0 __freea 20 API calls 14090->14092 14093 42f3ed 14091->14093 14092->14091 14110 42ee7a LeaveCriticalSection 14093->14110 14095 42f3f7 14095->14082 14097 43319b 14096->14097 14106 433197 14096->14106 14098 4331a2 14097->14098 14102 4331b5 _abort 14097->14102 14099 42d0d6 __dosmaperr 20 API calls 14098->14099 14100 4331a7 14099->14100 14101 427ce1 pre_c_initialization 26 API calls 14100->14101 14101->14106 14103 4331e3 14102->14103 14104 4331ec 14102->14104 14102->14106 14105 42d0d6 __dosmaperr 20 API calls 14103->14105 14104->14106 14107 42d0d6 __dosmaperr 20 API calls 14104->14107 14108 4331e8 14105->14108 14106->14086 14107->14108 14109 427ce1 pre_c_initialization 26 API calls 14108->14109 14109->14106 14110->14095 14952 42cbe3 14953 42cbfe 14952->14953 14954 42cbee 14952->14954 14958 42cc04 14954->14958 14957 42beb0 __freea 20 API calls 14957->14953 14959 42cc1d 14958->14959 14960 42cc17 14958->14960 14962 42beb0 __freea 20 API calls 14959->14962 14961 42beb0 __freea 20 API calls 14960->14961 14961->14959 14963 42cc29 14962->14963 14964 42beb0 __freea 20 API calls 14963->14964 14965 42cc34 14964->14965 14966 42beb0 __freea 20 API calls 14965->14966 14967 42cc3f 14966->14967 14968 42beb0 __freea 20 API calls 14967->14968 14969 42cc4a 14968->14969 14970 42beb0 __freea 20 API calls 14969->14970 14971 42cc55 14970->14971 14972 42beb0 __freea 20 API calls 14971->14972 14973 42cc60 14972->14973 14974 42beb0 __freea 20 API calls 14973->14974 14975 42cc6b 14974->14975 14976 42beb0 __freea 20 API calls 14975->14976 14977 42cc76 14976->14977 14978 42beb0 __freea 20 API calls 14977->14978 14979 42cc84 14978->14979 14984 42caca 14979->14984 14990 42c9d6 14984->14990 14986 42caee 14987 42cb1a 14986->14987 15003 42ca37 14987->15003 14989 42cb3e 14989->14957 14991 42c9e2 ___BuildCatchObject 14990->14991 14998 42ee32 EnterCriticalSection 14991->14998 14994 42c9ec 14996 42beb0 __freea 20 API calls 14994->14996 14997 42ca16 14994->14997 14995 42ca23 ___BuildCatchObject 14995->14986 14996->14997 14999 42ca2b 14997->14999 14998->14994 15002 42ee7a LeaveCriticalSection 14999->15002 15001 42ca35 15001->14995 15002->15001 15004 42ca43 ___BuildCatchObject 15003->15004 15011 42ee32 EnterCriticalSection 15004->15011 15006 42ca4d 15012 42ccad 15006->15012 15008 42ca60 15016 42ca76 15008->15016 15010 42ca6e ___BuildCatchObject 15010->14989 15011->15006 15013 42ccbc __fassign 15012->15013 15014 42cce3 __fassign 15012->15014 15013->15014 15015 430c47 __fassign 20 API calls 15013->15015 15014->15008 15015->15014 15019 42ee7a LeaveCriticalSection 15016->15019 15018 42ca80 15018->15010 15019->15018 14217 42bc89 14218 42bc95 ___BuildCatchObject 14217->14218 14219 42bccc ___BuildCatchObject 14218->14219 14225 42ee32 EnterCriticalSection 14218->14225 14221 42bca9 14222 430f0b __fassign 20 API calls 14221->14222 14223 42bcb9 14222->14223 14226 42bcd2 14223->14226 14225->14221 14229 42ee7a LeaveCriticalSection 14226->14229 14228 42bcd9 14228->14219 14229->14228 14552 4224b2 14555 422500 14552->14555 14554 4224bd ISource 14556 422531 14555->14556 14557 42255a DeleteCriticalSection 14555->14557 14556->14557 14558 422537 GetProcAddress 14556->14558 14557->14554 14559 422551 FreeLibrary 14558->14559 14560 422549 14558->14560 14559->14557 14560->14559 11556 4247b9 11557 4247c5 ___BuildCatchObject 11556->11557 11580 42450c 11557->11580 11559 4247cc 11561 4247f5 11559->11561 11678 424bb8 IsProcessorFeaturePresent 11559->11678 11564 424834 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 11561->11564 11682 42bbd7 11561->11682 11567 424894 11564->11567 11690 42af99 11564->11690 11566 424814 ___BuildCatchObject 11591 42b5c3 11567->11591 11575 4248c6 11577 4248cf 11575->11577 11696 42af74 11575->11696 11699 424683 11577->11699 11581 424515 11580->11581 11705 424d72 IsProcessorFeaturePresent 11581->11705 11585 424526 11586 42452a 11585->11586 11716 42bab7 11585->11716 11586->11559 11589 424541 11589->11559 11592 4248a8 11591->11592 11593 42b5cc 11591->11593 11595 423a4b 11592->11595 11805 42b2ec 11593->11805 11596 423a5a __EH_prolog3_GS 11595->11596 12007 42257a 11596->12007 11599 423a83 LeaveCriticalSection 12034 42386c 11599->12034 11600 423a74 12016 423e1a RegOpenKeyExW 11600->12016 11606 423d4d 12229 4225e8 11606->12229 11607 423aad 12060 42a99d 11607->12060 11611 423e05 12242 422676 11611->12242 11612 423d9e 11614 42257a 35 API calls 11612->11614 11613 423abb 11616 423ac5 11613->11616 11617 423c8d 11613->11617 11619 423da3 11614->11619 11618 42257a 35 API calls 11616->11618 11620 42a99d 43 API calls 11617->11620 11622 423aca 11618->11622 11623 423df8 GetLastError 11619->11623 11629 4222ef 54 API calls 11619->11629 11621 423c9e 11620->11621 11626 423cf7 11621->11626 11627 423ca4 11621->11627 11628 423aff 11622->11628 12150 4222ef GetCurrentThreadId 11622->12150 12238 423840 11623->12238 11631 42257a 35 API calls 11626->11631 11632 42257a 35 API calls 11627->11632 12070 4232c3 GetModuleFileNameW 11628->12070 11634 423dcc 11629->11634 11630 423e19 11673 424cd3 GetModuleHandleW 11630->11673 11636 423cfc 11631->11636 11637 423ca9 11632->11637 11640 423dda GetLastError 11634->11640 11643 4222ef 54 API calls 11636->11643 11665 423c52 11636->11665 11644 4222ef 54 API calls 11637->11644 11666 423ce7 11637->11666 11638 423aec 11651 42257a 35 API calls 11638->11651 12232 422203 11640->12232 11641 423c57 11646 42257a 35 API calls 11641->11646 11642 423b1f 11648 42257a 35 API calls 11642->11648 11661 423c83 11643->11661 11650 423ccd 11644->11650 11653 423c5c 11646->11653 11649 423b24 11648->11649 11656 4222ef 54 API calls 11649->11656 11671 423b57 _abort 11649->11671 11660 42257a 35 API calls 11650->11660 11651->11628 11658 4222ef 54 API calls 11653->11658 11653->11665 11655 42257a 35 API calls 11657 423deb 11655->11657 11659 423b44 11656->11659 11657->11623 11658->11661 11667 42257a 35 API calls 11659->11667 11663 423ce0 11660->11663 11662 42257a 35 API calls 11661->11662 11662->11665 11663->11666 11664 423b86 CreateWellKnownSid 11664->11671 12147 424947 11665->12147 12165 42359f OpenSCManagerW 11666->12165 11667->11671 11668 42257a 35 API calls 11668->11671 11670 4222ef 54 API calls 11670->11671 11671->11664 11671->11665 11671->11668 11671->11670 12138 42184c GetNamedSecurityInfoW 11671->12138 12159 42219e 11671->12159 11674 4248bc 11673->11674 11674->11575 11675 42afd1 11674->11675 11676 42ad92 _abort 31 API calls 11675->11676 11677 42afe2 11676->11677 11677->11575 11679 424bce _abort 11678->11679 11680 424c76 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11679->11680 11681 424cc0 11680->11681 11681->11559 11683 42bbee 11682->11683 11684 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11683->11684 11685 42480e 11684->11685 11685->11566 11686 42bb7b 11685->11686 11687 42bbaa 11686->11687 11688 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11687->11688 11689 42bbd3 11688->11689 11689->11564 11691 42afc1 pre_c_initialization _abort 11690->11691 11691->11567 11692 42ccf8 pre_c_initialization 41 API calls 11691->11692 11695 42bd89 11692->11695 11693 42be6d _abort 41 API calls 11694 42bdb3 11693->11694 11695->11693 11697 42ad92 _abort 31 API calls 11696->11697 11698 42af7f 11697->11698 11698->11577 11700 42468f 11699->11700 11704 4246a5 11700->11704 13269 42bac9 11700->13269 11703 427463 ___vcrt_uninitialize 8 API calls 11703->11704 11704->11566 11706 424521 11705->11706 11707 42743a 11706->11707 11708 42743f ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 11707->11708 11727 427809 11708->11727 11711 42744d 11711->11585 11713 427455 11714 427460 11713->11714 11741 427845 11713->11741 11714->11585 11782 43001c 11716->11782 11719 427463 11720 42747d 11719->11720 11721 42746c 11719->11721 11720->11586 11722 42777d ___vcrt_uninitialize_ptd 6 API calls 11721->11722 11723 427471 11722->11723 11724 427845 ___vcrt_uninitialize_locks DeleteCriticalSection 11723->11724 11725 427476 11724->11725 11801 427408 11725->11801 11728 427812 11727->11728 11730 42783b 11728->11730 11731 427449 11728->11731 11745 427388 11728->11745 11732 427845 ___vcrt_uninitialize_locks DeleteCriticalSection 11730->11732 11731->11711 11733 42774a 11731->11733 11732->11731 11763 42729d 11733->11763 11735 427754 11736 42775f 11735->11736 11768 42734b 11735->11768 11736->11713 11738 42776d 11739 42777a 11738->11739 11773 42777d 11738->11773 11739->11713 11742 427850 11741->11742 11744 42786f 11741->11744 11743 42785a DeleteCriticalSection 11742->11743 11743->11743 11743->11744 11744->11711 11750 42717c 11745->11750 11747 4273a2 11748 4273bf InitializeCriticalSectionAndSpinCount 11747->11748 11749 4273ab 11747->11749 11748->11749 11749->11728 11751 4271ac 11750->11751 11752 4271b0 __crt_fast_encode_pointer 11750->11752 11751->11752 11755 4271d0 11751->11755 11756 42721c 11751->11756 11752->11747 11754 4271dc GetProcAddress 11754->11752 11755->11752 11755->11754 11757 427244 LoadLibraryExW 11756->11757 11761 427239 11756->11761 11758 427260 GetLastError 11757->11758 11759 427278 11757->11759 11758->11759 11760 42726b LoadLibraryExW 11758->11760 11759->11761 11762 42728f FreeLibrary 11759->11762 11760->11759 11761->11751 11762->11761 11764 42717c try_get_function 5 API calls 11763->11764 11765 4272b7 11764->11765 11766 4272cf TlsAlloc 11765->11766 11767 4272c0 11765->11767 11767->11735 11769 42717c try_get_function 5 API calls 11768->11769 11770 427365 11769->11770 11771 42737f TlsSetValue 11770->11771 11772 427374 11770->11772 11771->11772 11772->11738 11774 427787 11773->11774 11775 42778d 11773->11775 11777 4272d7 11774->11777 11775->11736 11778 42717c try_get_function 5 API calls 11777->11778 11779 4272f1 11778->11779 11780 427308 TlsFree 11779->11780 11781 4272fd 11779->11781 11780->11781 11781->11775 11785 430039 11782->11785 11786 430035 11782->11786 11784 424533 11784->11589 11784->11719 11785->11786 11788 42e45b 11785->11788 11793 4241cf 11786->11793 11792 42e462 11788->11792 11789 42e4a5 GetStdHandle 11789->11792 11790 42e50d 11790->11785 11791 42e4b8 GetFileType 11791->11792 11792->11789 11792->11790 11792->11791 11794 4241da IsProcessorFeaturePresent 11793->11794 11795 4241d8 11793->11795 11797 424a81 11794->11797 11795->11784 11800 424a45 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 11797->11800 11799 424b64 11799->11784 11800->11799 11802 427437 11801->11802 11804 427411 11801->11804 11802->11720 11803 427421 FreeLibrary 11803->11804 11804->11802 11804->11803 11806 42b2f5 11805->11806 11807 42b30e 11805->11807 11808 42b2fd 11806->11808 11812 42b31b 11806->11812 11807->11592 11808->11592 11810 42b305 11810->11808 11823 42b498 11810->11823 11813 42b327 11812->11813 11814 42b324 11812->11814 11833 42fbdc GetEnvironmentStringsW 11813->11833 11814->11810 11817 42b334 11819 42beb0 __freea 20 API calls 11817->11819 11820 42b369 11819->11820 11820->11810 11821 42b33f 11857 42beb0 11821->11857 11824 42b4a5 11823->11824 11827 42b4aa 11823->11827 11824->11807 11825 42b4b0 MultiByteToWideChar 11826 42b4ff 11825->11826 11825->11827 11826->11807 11827->11825 11827->11826 11828 42bf38 __dosmaperr 20 API calls 11827->11828 11829 42b4d4 MultiByteToWideChar 11827->11829 11830 42b505 11827->11830 11832 42beb0 __freea 20 API calls 11827->11832 11828->11827 11829->11827 11829->11830 11831 42beb0 __freea 20 API calls 11830->11831 11831->11826 11832->11827 11834 42fbf0 11833->11834 11835 42b32e 11833->11835 11863 42beea 11834->11863 11835->11817 11840 42b36f 11835->11840 11837 42beb0 __freea 20 API calls 11839 42fc1e FreeEnvironmentStringsW 11837->11839 11838 42fc04 11838->11837 11839->11835 11841 42b38d 11840->11841 11842 42bf38 __dosmaperr 20 API calls 11841->11842 11843 42b3c7 11842->11843 11846 42bf38 __dosmaperr 20 API calls 11843->11846 11847 42b43a 11843->11847 11851 42b45c 11843->11851 11854 42beb0 __freea 20 API calls 11843->11854 11855 42b438 11843->11855 11968 42fb41 11843->11968 11844 42beb0 __freea 20 API calls 11845 42b452 11844->11845 11845->11821 11846->11843 11977 42b469 11847->11977 11983 427d0e IsProcessorFeaturePresent 11851->11983 11852 42beb0 __freea 20 API calls 11852->11855 11854->11843 11855->11844 11856 42b468 11858 42bebb HeapFree 11857->11858 11859 42bee4 __dosmaperr 11857->11859 11858->11859 11860 42bed0 11858->11860 11859->11817 11861 42d0d6 __dosmaperr 18 API calls 11860->11861 11862 42bed6 GetLastError 11861->11862 11862->11859 11864 42bf28 11863->11864 11869 42bef8 __dosmaperr 11863->11869 11875 42d0d6 11864->11875 11865 42bf13 RtlAllocateHeap 11867 42bf26 11865->11867 11865->11869 11867->11838 11869->11864 11869->11865 11870 42ab57 11869->11870 11878 42ab9b 11870->11878 11872 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11873 42ab97 11872->11873 11873->11869 11874 42ab6d 11874->11872 11889 42cd7c GetLastError 11875->11889 11879 42aba7 ___BuildCatchObject 11878->11879 11884 42ee32 EnterCriticalSection 11879->11884 11881 42abb2 11885 42abe4 11881->11885 11883 42abd9 ___BuildCatchObject 11883->11874 11884->11881 11888 42ee7a LeaveCriticalSection 11885->11888 11887 42abeb 11887->11883 11888->11887 11890 42cd9b 11889->11890 11891 42cd95 11889->11891 11895 42cdf2 SetLastError 11890->11895 11915 42bf38 11890->11915 11908 42e7e4 11891->11908 11898 42cdfb 11895->11898 11896 42cdb5 11900 42beb0 __freea 17 API calls 11896->11900 11898->11867 11901 42cdbb 11900->11901 11903 42cde9 SetLastError 11901->11903 11902 42cdd1 11929 42cb6a 11902->11929 11903->11898 11906 42beb0 __freea 17 API calls 11907 42cde2 11906->11907 11907->11895 11907->11903 11934 42e5ad 11908->11934 11911 42e823 TlsGetValue 11914 42e817 11911->11914 11912 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11913 42e834 11912->11913 11913->11890 11914->11912 11920 42bf45 __dosmaperr 11915->11920 11916 42bf85 11919 42d0d6 __dosmaperr 19 API calls 11916->11919 11917 42bf70 HeapAlloc 11918 42bf83 11917->11918 11917->11920 11918->11896 11922 42e83a 11918->11922 11919->11918 11920->11916 11920->11917 11921 42ab57 new 7 API calls 11920->11921 11921->11920 11923 42e5ad __dosmaperr 5 API calls 11922->11923 11924 42e861 11923->11924 11925 42e87c TlsSetValue 11924->11925 11926 42e870 11924->11926 11925->11926 11927 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11926->11927 11928 42cdca 11927->11928 11928->11896 11928->11902 11948 42cb42 11929->11948 11935 42e5dd 11934->11935 11938 42e5d9 11934->11938 11935->11911 11935->11914 11936 42e5fd 11936->11935 11939 42e609 GetProcAddress 11936->11939 11938->11935 11938->11936 11941 42e649 11938->11941 11940 42e619 __crt_fast_encode_pointer 11939->11940 11940->11935 11942 42e66a LoadLibraryExW 11941->11942 11947 42e65f 11941->11947 11943 42e687 GetLastError 11942->11943 11946 42e69f 11942->11946 11944 42e692 LoadLibraryExW 11943->11944 11943->11946 11944->11946 11945 42e6b6 FreeLibrary 11945->11947 11946->11945 11946->11947 11947->11938 11954 42ca82 11948->11954 11950 42cb66 11951 42caf2 11950->11951 11960 42c986 11951->11960 11953 42cb16 11953->11906 11955 42ca8e ___BuildCatchObject 11954->11955 11956 42ee32 _abort EnterCriticalSection 11955->11956 11957 42ca98 11956->11957 11958 42cabe __dosmaperr LeaveCriticalSection 11957->11958 11959 42cab6 ___BuildCatchObject 11958->11959 11959->11950 11961 42c992 ___BuildCatchObject 11960->11961 11962 42ee32 _abort EnterCriticalSection 11961->11962 11963 42c99c 11962->11963 11964 42ccad __dosmaperr 20 API calls 11963->11964 11965 42c9b4 11964->11965 11966 42c9ca __dosmaperr LeaveCriticalSection 11965->11966 11967 42c9c2 ___BuildCatchObject 11966->11967 11967->11953 11969 42fb5c 11968->11969 11970 42fb4e 11968->11970 11971 42d0d6 __dosmaperr 20 API calls 11969->11971 11970->11969 11974 42fb75 11970->11974 11972 42fb66 11971->11972 11987 427ce1 11972->11987 11975 42fb70 11974->11975 11976 42d0d6 __dosmaperr 20 API calls 11974->11976 11975->11843 11976->11972 11978 42b440 11977->11978 11979 42b476 11977->11979 11978->11852 11980 42b48d 11979->11980 11981 42beb0 __freea 20 API calls 11979->11981 11982 42beb0 __freea 20 API calls 11980->11982 11981->11979 11982->11978 11984 427d19 11983->11984 12001 427b17 11984->12001 11990 427c66 11987->11990 11989 427ced 11989->11975 11991 42cd7c __dosmaperr 20 API calls 11990->11991 11992 427c7c 11991->11992 11993 427cdb 11992->11993 11997 427c8a 11992->11997 11994 427d0e std::_Deallocate 11 API calls 11993->11994 11995 427ce0 11994->11995 11996 427c66 std::_Deallocate 26 API calls 11995->11996 11998 427ced 11996->11998 11999 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 11997->11999 11998->11989 12000 427cb1 11999->12000 12000->11989 12002 427b33 _abort 12001->12002 12003 427b5f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12002->12003 12004 427c30 _abort 12003->12004 12005 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12004->12005 12006 427c4e GetCurrentProcess TerminateProcess 12005->12006 12006->11856 12008 422591 EnterCriticalSection 12007->12008 12009 42258f 12007->12009 12008->11599 12008->11600 12249 424372 12009->12249 12017 423e45 RegQueryValueExW 12016->12017 12018 423a79 12016->12018 12019 423e71 12017->12019 12020 423e7f RegCloseKey 12017->12020 12021 423f39 12018->12021 12019->12020 12020->12018 12022 42406f 12021->12022 12025 423f5d _abort 12021->12025 12023 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12022->12023 12024 424095 12023->12024 12024->11599 12026 42257a 35 API calls 12025->12026 12027 423fc7 GetModuleHandleExW 12026->12027 12028 424032 LoadLibraryW 12027->12028 12029 423fd4 GetModuleFileNameW 12027->12029 12028->12022 12030 424046 GetProcAddress 12028->12030 12029->12028 12033 423ff0 _wcsrchr 12029->12033 12031 424056 12030->12031 12031->12022 12032 424079 FreeLibrary 12031->12032 12032->12022 12033->12028 12035 42387b __EH_prolog3_catch_GS _abort 12034->12035 12263 421b27 GetCurrentProcess OpenProcessToken 12035->12263 12037 423894 _strcat 12038 42257a 35 API calls 12037->12038 12039 4238fb 12038->12039 12040 423905 12039->12040 12041 42399c 12039->12041 12042 4222ef 54 API calls 12040->12042 12280 424958 12041->12280 12044 423920 12042->12044 12283 4218f8 GetCurrentProcess OpenProcessToken 12044->12283 12045 4239a1 12045->11606 12045->11607 12048 42219e 53 API calls 12049 42393b 12048->12049 12306 421a10 AllocateAndInitializeSid 12049->12306 12052 42219e 53 API calls 12053 423956 12052->12053 12318 421aaa GetCurrentProcess OpenProcessToken 12053->12318 12056 42219e 53 API calls 12057 423971 12056->12057 12058 42257a 35 API calls 12057->12058 12059 42398f 12058->12059 12059->12041 12061 42aa20 12060->12061 12062 42a9ab 12060->12062 12342 42aa32 12061->12342 12064 42d0d6 __dosmaperr 20 API calls 12062->12064 12069 42a9d0 12062->12069 12066 42a9b7 12064->12066 12067 427ce1 pre_c_initialization 26 API calls 12066->12067 12068 42a9c2 12067->12068 12068->11613 12069->11613 12071 423363 OpenSCManagerW 12070->12071 12072 4232f8 12070->12072 12074 4233d6 CreateServiceW 12071->12074 12075 423375 12071->12075 12073 42257a 35 API calls 12072->12073 12076 4232fd 12073->12076 12077 42347b ChangeServiceConfig2W 12074->12077 12078 42340e 12074->12078 12079 42257a 35 API calls 12075->12079 12080 42334f GetLastError 12076->12080 12086 4222ef 54 API calls 12076->12086 12082 4234fe 12077->12082 12083 423499 12077->12083 12081 42257a 35 API calls 12078->12081 12084 42337a 12079->12084 12085 423357 12080->12085 12087 423413 12081->12087 12090 423840 80 API calls 12082->12090 12088 42257a 35 API calls 12083->12088 12089 4233cc GetLastError 12084->12089 12095 4222ef 54 API calls 12084->12095 12091 423840 80 API calls 12085->12091 12092 423323 12086->12092 12093 423463 GetLastError 12087->12093 12099 4222ef 54 API calls 12087->12099 12094 42349e 12088->12094 12089->12085 12096 423516 12090->12096 12097 42335c 12091->12097 12105 423331 GetLastError 12092->12105 12098 423840 80 API calls 12093->12098 12100 4234ed GetLastError 12094->12100 12107 4222ef 54 API calls 12094->12107 12101 4233a0 12095->12101 12102 42257a 35 API calls 12096->12102 12113 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12097->12113 12103 423474 12098->12103 12106 423433 12099->12106 12104 423840 80 API calls 12100->12104 12112 4233ae GetLastError 12101->12112 12108 42351d 12102->12108 12109 423578 CloseServiceHandle 12103->12109 12104->12082 12110 422203 53 API calls 12105->12110 12116 423441 GetLastError 12106->12116 12111 4234bd 12107->12111 12108->12109 12119 4222ef 54 API calls 12108->12119 12109->12097 12114 423585 CloseServiceHandle 12109->12114 12115 42333b 12110->12115 12122 4234cb GetLastError 12111->12122 12117 422203 53 API calls 12112->12117 12118 42359b 12113->12118 12114->12097 12120 42257a 35 API calls 12115->12120 12121 422203 53 API calls 12116->12121 12123 4233b8 12117->12123 12118->11641 12118->11642 12124 42353e 12119->12124 12125 423342 12120->12125 12126 42344f 12121->12126 12127 422203 53 API calls 12122->12127 12128 42257a 35 API calls 12123->12128 12658 423293 12124->12658 12125->12080 12131 42257a 35 API calls 12126->12131 12129 4234d9 12127->12129 12130 4233bf 12128->12130 12133 42257a 35 API calls 12129->12133 12130->12089 12132 423456 12131->12132 12132->12093 12135 4234e0 12133->12135 12135->12100 12136 423558 12137 42257a 35 API calls 12136->12137 12137->12103 12139 421881 _abort 12138->12139 12140 4218d4 12138->12140 12143 42188d SetEntriesInAclW 12139->12143 12141 4218e4 12140->12141 12142 4218df LocalFree 12140->12142 12144 4218ea LocalFree 12141->12144 12145 4218ef 12141->12145 12142->12141 12143->12140 12146 4218c1 SetNamedSecurityInfoW 12143->12146 12144->12145 12145->11671 12146->12140 12148 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12147->12148 12149 424952 12148->12149 12149->12149 12677 42229b 12150->12677 12153 42229b 53 API calls 12154 4223ab _abort 12153->12154 12155 42229b 53 API calls 12154->12155 12156 422417 12155->12156 12157 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12156->12157 12158 422437 12157->12158 12158->11638 12160 4221c7 12159->12160 12161 42229b 53 API calls 12160->12161 12162 4221db 12161->12162 12163 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12162->12163 12164 4221fd 12163->12164 12164->11671 12166 4235d1 12165->12166 12167 42363f OpenServiceW 12165->12167 12168 42257a 35 API calls 12166->12168 12169 4236c7 ControlService 12167->12169 12170 423657 12167->12170 12173 4235d6 12168->12173 12171 42373a DeleteService 12169->12171 12172 4236d8 12169->12172 12174 42257a 35 API calls 12170->12174 12175 423745 12171->12175 12176 4237af 12171->12176 12178 423840 80 API calls 12172->12178 12179 42362b GetLastError 12173->12179 12181 4222ef 54 API calls 12173->12181 12177 42365c 12174->12177 12182 42257a 35 API calls 12175->12182 12180 423840 80 API calls 12176->12180 12183 4236af GetLastError 12177->12183 12188 4222ef 54 API calls 12177->12188 12201 4236e3 12178->12201 12184 423840 80 API calls 12179->12184 12185 4237ba 12180->12185 12186 4235ff 12181->12186 12187 42374a 12182->12187 12191 4236bb 12183->12191 12190 423638 12184->12190 12192 42257a 35 API calls 12185->12192 12198 42360d GetLastError 12186->12198 12193 42379e GetLastError 12187->12193 12199 4222ef 54 API calls 12187->12199 12194 42367f 12188->12194 12189 423708 Sleep QueryServiceStatus 12195 42371c 12189->12195 12189->12201 12200 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12190->12200 12196 423840 80 API calls 12191->12196 12197 4237c1 12192->12197 12193->12191 12205 42368d GetLastError 12194->12205 12212 423840 80 API calls 12195->12212 12228 4236c0 12196->12228 12202 42381f CloseServiceHandle 12197->12202 12209 4222ef 54 API calls 12197->12209 12203 422203 53 API calls 12198->12203 12204 42376e 12199->12204 12206 42383c 12200->12206 12201->12189 12201->12195 12207 423840 80 API calls 12201->12207 12202->12190 12208 42382c CloseServiceHandle 12202->12208 12210 423617 12203->12210 12215 42377c GetLastError 12204->12215 12211 422203 53 API calls 12205->12211 12206->11665 12207->12201 12208->12190 12213 4237e5 12209->12213 12214 42257a 35 API calls 12210->12214 12216 42369b 12211->12216 12217 423738 12212->12217 12222 423293 23 API calls 12213->12222 12218 42361e 12214->12218 12219 422203 53 API calls 12215->12219 12220 42257a 35 API calls 12216->12220 12217->12171 12218->12179 12221 42378a 12219->12221 12224 4236a2 12220->12224 12223 42257a 35 API calls 12221->12223 12225 4237ff 12222->12225 12226 423791 12223->12226 12224->12183 12227 42257a 35 API calls 12225->12227 12226->12193 12227->12228 12228->12202 12899 4217ca ConvertStringSecurityDescriptorToSecurityDescriptorW 12229->12899 12231 42262e StartServiceCtrlDispatcherW 12231->11611 12231->11612 12233 42222c 12232->12233 12234 42229b 53 API calls 12233->12234 12235 422240 12234->12235 12236 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12235->12236 12237 422262 12236->12237 12237->11655 12239 42384e ___scrt_initialize_default_local_stdio_options 12238->12239 12904 42a782 12239->12904 13224 4211b9 12242->13224 12254 4243b8 EnterCriticalSection 12249->12254 12251 42437b 12252 424392 12251->12252 12255 424411 12251->12255 12254->12251 12256 42444f 12255->12256 12260 42441e 12255->12260 12261 424405 LeaveCriticalSection 12256->12261 12258 424454 WaitForSingleObjectEx 12262 4243b8 EnterCriticalSection 12258->12262 12260->12251 12261->12258 12262->12260 12264 421b60 GetTokenInformation 12263->12264 12265 421b56 GetLastError 12263->12265 12266 421b8c LocalAlloc 12264->12266 12267 421b7d GetLastError 12264->12267 12276 421ba1 12265->12276 12271 421ba6 GetTokenInformation 12266->12271 12272 421b9d GetLastError 12266->12272 12267->12266 12270 421b84 GetLastError 12267->12270 12268 421be5 12274 421bf4 12268->12274 12275 421be9 LocalFree 12268->12275 12269 421bd8 FindCloseChangeNotification 12269->12268 12270->12276 12271->12272 12273 421bbd GetSidSubAuthority 12271->12273 12272->12276 12273->12276 12277 421bf8 12274->12277 12327 426d38 12274->12327 12275->12274 12276->12268 12276->12269 12277->12037 12279 421c12 12281 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12280->12281 12282 424963 12281->12282 12282->12282 12284 421936 12283->12284 12285 4219be GetLastError 12283->12285 12330 421cef 12284->12330 12287 4219c6 12285->12287 12289 4219d1 CloseHandle 12287->12289 12290 4219d9 12287->12290 12289->12290 12293 4219e6 12290->12293 12294 4219de CloseHandle 12290->12294 12291 421975 12298 42197a DuplicateToken 12291->12298 12299 42198d CreateWellKnownSid 12291->12299 12292 42193f GetTokenInformation 12292->12285 12297 42195a 12292->12297 12295 4219ea 12293->12295 12296 4219fe 12293->12296 12294->12293 12300 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12295->12300 12301 426d38 __CxxThrowException@8 RaiseException 12296->12301 12297->12291 12302 421960 GetTokenInformation 12297->12302 12298->12285 12298->12299 12299->12285 12303 4219a9 CheckTokenMembership 12299->12303 12304 4219fa 12300->12304 12305 421a0f 12301->12305 12302->12285 12302->12291 12303->12285 12303->12287 12304->12048 12307 421a56 CheckTokenMembership 12306->12307 12308 421a68 GetLastError 12306->12308 12307->12308 12309 421a70 12307->12309 12308->12309 12310 421a81 12309->12310 12311 421a75 FreeSid 12309->12311 12312 421a85 12310->12312 12313 421a98 12310->12313 12311->12310 12314 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12312->12314 12315 426d38 __CxxThrowException@8 RaiseException 12313->12315 12316 421a94 12314->12316 12317 421aa9 12315->12317 12316->12052 12319 421ad0 GetLastError 12318->12319 12320 421ada GetTokenInformation 12318->12320 12321 421af3 12319->12321 12320->12319 12320->12321 12322 421b09 12321->12322 12323 421afc CloseHandle 12321->12323 12324 421b0d 12322->12324 12325 426d38 __CxxThrowException@8 RaiseException 12322->12325 12323->12322 12324->12056 12326 421b26 12325->12326 12329 426d58 12327->12329 12328 426d8a RaiseException 12328->12279 12329->12328 12333 421c13 NetWkstaGetInfo 12330->12333 12334 421c60 12333->12334 12335 421c75 _abort 12334->12335 12336 421c6e NetApiBufferFree 12334->12336 12337 421c8d GetVersionExW 12335->12337 12339 421cc0 12335->12339 12336->12335 12337->12339 12340 421ca9 GetVersionExW 12337->12340 12338 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12341 42193b 12338->12341 12339->12338 12340->12339 12341->12291 12341->12292 12352 4286c0 12342->12352 12345 42aa55 12346 42d0d6 __dosmaperr 20 API calls 12345->12346 12347 42aa5a 12346->12347 12349 427ce1 pre_c_initialization 26 API calls 12347->12349 12348 42ed28 43 API calls 12350 42aa6f 12348->12350 12351 42aa2d 12349->12351 12350->12348 12350->12351 12351->11613 12353 4286d3 12352->12353 12354 4286dd 12352->12354 12353->12345 12353->12350 12354->12353 12360 42ccf8 GetLastError 12354->12360 12356 4286fe 12380 42d68c 12356->12380 12361 42cd14 12360->12361 12362 42cd0e 12360->12362 12364 42bf38 __dosmaperr 20 API calls 12361->12364 12366 42cd63 SetLastError 12361->12366 12363 42e7e4 __dosmaperr 11 API calls 12362->12363 12363->12361 12365 42cd26 12364->12365 12367 42cd2e 12365->12367 12368 42e83a __dosmaperr 11 API calls 12365->12368 12366->12356 12369 42beb0 __freea 20 API calls 12367->12369 12370 42cd43 12368->12370 12371 42cd34 12369->12371 12370->12367 12372 42cd4a 12370->12372 12373 42cd6f SetLastError 12371->12373 12374 42cb6a __dosmaperr 20 API calls 12372->12374 12388 42be6d 12373->12388 12375 42cd55 12374->12375 12377 42beb0 __freea 20 API calls 12375->12377 12379 42cd5c 12377->12379 12379->12366 12379->12373 12381 428717 12380->12381 12382 42d69f 12380->12382 12384 42d6b9 12381->12384 12382->12381 12513 430e94 12382->12513 12385 42d6e1 12384->12385 12386 42d6cc 12384->12386 12385->12353 12386->12385 12644 42f8ae 12386->12644 12399 4301d8 12388->12399 12392 42be87 IsProcessorFeaturePresent 12394 42be92 12392->12394 12393 42bea5 12429 42af83 12393->12429 12397 427b17 _abort 8 API calls 12394->12397 12396 42be7d 12396->12392 12396->12393 12397->12393 12432 430146 12399->12432 12402 430233 12403 43023f _abort 12402->12403 12404 42cd7c __dosmaperr 20 API calls 12403->12404 12408 43026c _abort 12403->12408 12409 430266 _abort 12403->12409 12404->12409 12405 4302b8 12406 42d0d6 __dosmaperr 20 API calls 12405->12406 12407 4302bd 12406->12407 12410 427ce1 pre_c_initialization 26 API calls 12407->12410 12414 4302e4 12408->12414 12445 42ee32 EnterCriticalSection 12408->12445 12409->12405 12409->12408 12428 43029b 12409->12428 12410->12428 12415 430343 12414->12415 12417 43033b 12414->12417 12425 43036e 12414->12425 12446 42ee7a LeaveCriticalSection 12414->12446 12415->12425 12447 43022a 12415->12447 12420 42af83 _abort 31 API calls 12417->12420 12420->12415 12422 42ccf8 pre_c_initialization 41 API calls 12426 4303d1 12422->12426 12424 43022a _abort 41 API calls 12424->12425 12450 4303f3 12425->12450 12427 42ccf8 pre_c_initialization 41 API calls 12426->12427 12426->12428 12427->12428 12454 4370e9 12428->12454 12458 42ad92 12429->12458 12435 4300ec 12432->12435 12434 42be72 12434->12396 12434->12402 12436 4300f8 ___BuildCatchObject 12435->12436 12441 42ee32 EnterCriticalSection 12436->12441 12438 430106 12442 43013a 12438->12442 12440 43012d ___BuildCatchObject 12440->12434 12441->12438 12443 42ee7a _abort LeaveCriticalSection 12442->12443 12444 430144 12443->12444 12444->12440 12445->12414 12446->12417 12448 42ccf8 pre_c_initialization 41 API calls 12447->12448 12449 43022f 12448->12449 12449->12424 12451 4303c2 12450->12451 12452 4303f9 12450->12452 12451->12422 12451->12426 12451->12428 12457 42ee7a LeaveCriticalSection 12452->12457 12455 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12454->12455 12456 4370f4 12455->12456 12456->12456 12457->12451 12459 42ad9e _abort 12458->12459 12460 42adb6 12459->12460 12461 424cd3 _abort GetModuleHandleW 12459->12461 12480 42ee32 EnterCriticalSection 12460->12480 12463 42adaa 12461->12463 12463->12460 12495 42aeec GetModuleHandleExW 12463->12495 12467 42adbe 12470 42ae33 12467->12470 12479 42ae5c 12467->12479 12481 42b945 12467->12481 12468 42aea5 12474 4370e9 _abort 5 API calls 12468->12474 12469 42ae79 12487 42aeab 12469->12487 12471 42ae4b 12470->12471 12475 42bb7b _abort 5 API calls 12470->12475 12476 42bb7b _abort 5 API calls 12471->12476 12478 42aeaa 12474->12478 12475->12471 12476->12479 12484 42ae9c 12479->12484 12480->12467 12503 42b67e 12481->12503 12506 42ee7a LeaveCriticalSection 12484->12506 12486 42ae75 12486->12468 12486->12469 12507 42e9ff 12487->12507 12490 42aed9 12493 42aeec _abort 8 API calls 12490->12493 12491 42aeb9 GetPEB 12491->12490 12492 42aec9 GetCurrentProcess TerminateProcess 12491->12492 12492->12490 12494 42aee1 ExitProcess 12493->12494 12496 42af16 GetProcAddress 12495->12496 12497 42af39 12495->12497 12501 42af2b 12496->12501 12498 42af48 12497->12498 12499 42af3f FreeLibrary 12497->12499 12500 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12498->12500 12499->12498 12502 42af52 12500->12502 12501->12497 12502->12460 12504 42b62d _abort 23 API calls 12503->12504 12505 42b6a2 12504->12505 12505->12470 12506->12486 12508 42ea24 12507->12508 12512 42ea1a 12507->12512 12509 42e5ad __dosmaperr 5 API calls 12508->12509 12509->12512 12510 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12511 42aeb5 12510->12511 12511->12490 12511->12491 12512->12510 12514 430ea0 ___BuildCatchObject 12513->12514 12515 42ccf8 pre_c_initialization 41 API calls 12514->12515 12516 430ea9 12515->12516 12517 430ef7 ___BuildCatchObject 12516->12517 12525 42ee32 EnterCriticalSection 12516->12525 12517->12381 12519 430ec7 12526 430f0b 12519->12526 12524 42be6d _abort 41 API calls 12524->12517 12525->12519 12527 430f19 __fassign 12526->12527 12529 430edb 12526->12529 12527->12529 12533 430c47 12527->12533 12530 430efa 12529->12530 12643 42ee7a LeaveCriticalSection 12530->12643 12532 430eee 12532->12517 12532->12524 12534 430c5d 12533->12534 12536 430cc7 12533->12536 12534->12536 12539 430c90 12534->12539 12544 42beb0 __freea 20 API calls 12534->12544 12537 42beb0 __freea 20 API calls 12536->12537 12560 430d15 12536->12560 12538 430ce9 12537->12538 12540 42beb0 __freea 20 API calls 12538->12540 12541 430cb2 12539->12541 12546 42beb0 __freea 20 API calls 12539->12546 12542 430cfc 12540->12542 12543 42beb0 __freea 20 API calls 12541->12543 12545 42beb0 __freea 20 API calls 12542->12545 12547 430cbc 12543->12547 12549 430c85 12544->12549 12551 430d0a 12545->12551 12552 430ca7 12546->12552 12553 42beb0 __freea 20 API calls 12547->12553 12548 430d83 12554 42beb0 __freea 20 API calls 12548->12554 12561 4307c1 12549->12561 12550 430d23 12550->12548 12556 42beb0 20 API calls __freea 12550->12556 12557 42beb0 __freea 20 API calls 12551->12557 12589 4308bf 12552->12589 12553->12536 12559 430d89 12554->12559 12556->12550 12557->12560 12559->12529 12601 430dba 12560->12601 12562 4307d2 12561->12562 12588 4308bb 12561->12588 12563 4307e3 12562->12563 12564 42beb0 __freea 20 API calls 12562->12564 12565 4307f5 12563->12565 12566 42beb0 __freea 20 API calls 12563->12566 12564->12563 12567 430807 12565->12567 12568 42beb0 __freea 20 API calls 12565->12568 12566->12565 12569 430819 12567->12569 12570 42beb0 __freea 20 API calls 12567->12570 12568->12567 12571 43082b 12569->12571 12572 42beb0 __freea 20 API calls 12569->12572 12570->12569 12573 43083d 12571->12573 12574 42beb0 __freea 20 API calls 12571->12574 12572->12571 12575 43084f 12573->12575 12576 42beb0 __freea 20 API calls 12573->12576 12574->12573 12577 430861 12575->12577 12578 42beb0 __freea 20 API calls 12575->12578 12576->12575 12579 430873 12577->12579 12580 42beb0 __freea 20 API calls 12577->12580 12578->12577 12581 430885 12579->12581 12582 42beb0 __freea 20 API calls 12579->12582 12580->12579 12583 42beb0 __freea 20 API calls 12581->12583 12584 430897 12581->12584 12582->12581 12583->12584 12585 42beb0 __freea 20 API calls 12584->12585 12586 4308a9 12584->12586 12585->12586 12587 42beb0 __freea 20 API calls 12586->12587 12586->12588 12587->12588 12588->12539 12590 430924 12589->12590 12591 4308cc 12589->12591 12590->12541 12592 4308dc 12591->12592 12593 42beb0 __freea 20 API calls 12591->12593 12594 4308ee 12592->12594 12595 42beb0 __freea 20 API calls 12592->12595 12593->12592 12596 430900 12594->12596 12598 42beb0 __freea 20 API calls 12594->12598 12595->12594 12597 430912 12596->12597 12599 42beb0 __freea 20 API calls 12596->12599 12597->12590 12600 42beb0 __freea 20 API calls 12597->12600 12598->12596 12599->12597 12600->12590 12602 430de5 12601->12602 12603 430dc7 12601->12603 12602->12550 12603->12602 12607 430964 12603->12607 12606 42beb0 __freea 20 API calls 12606->12602 12608 430a42 12607->12608 12609 430975 12607->12609 12608->12606 12610 430928 __fassign 20 API calls 12609->12610 12611 43097d 12610->12611 12612 430928 __fassign 20 API calls 12611->12612 12613 430988 12612->12613 12614 430928 __fassign 20 API calls 12613->12614 12615 430993 12614->12615 12616 430928 __fassign 20 API calls 12615->12616 12617 43099e 12616->12617 12618 430928 __fassign 20 API calls 12617->12618 12619 4309ac 12618->12619 12620 42beb0 __freea 20 API calls 12619->12620 12621 4309b7 12620->12621 12622 42beb0 __freea 20 API calls 12621->12622 12623 4309c2 12622->12623 12624 42beb0 __freea 20 API calls 12623->12624 12625 4309cd 12624->12625 12626 430928 __fassign 20 API calls 12625->12626 12627 4309db 12626->12627 12628 430928 __fassign 20 API calls 12627->12628 12629 4309e9 12628->12629 12630 430928 __fassign 20 API calls 12629->12630 12631 4309fa 12630->12631 12632 430928 __fassign 20 API calls 12631->12632 12633 430a08 12632->12633 12634 430928 __fassign 20 API calls 12633->12634 12635 430a16 12634->12635 12636 42beb0 __freea 20 API calls 12635->12636 12637 430a21 12636->12637 12638 42beb0 __freea 20 API calls 12637->12638 12639 430a2c 12638->12639 12640 42beb0 __freea 20 API calls 12639->12640 12641 430a37 12640->12641 12642 42beb0 __freea 20 API calls 12641->12642 12642->12608 12643->12532 12645 42f8ba ___BuildCatchObject 12644->12645 12646 42ccf8 pre_c_initialization 41 API calls 12645->12646 12651 42f8c4 12646->12651 12648 42f948 ___BuildCatchObject 12648->12385 12649 42be6d _abort 41 API calls 12649->12651 12651->12648 12651->12649 12652 42beb0 __freea 20 API calls 12651->12652 12653 42ee32 EnterCriticalSection 12651->12653 12654 42f93f 12651->12654 12652->12651 12653->12651 12657 42ee7a LeaveCriticalSection 12654->12657 12656 42f946 12656->12651 12657->12656 12659 4232a0 12658->12659 12661 4232a6 ___std_exception_destroy 12658->12661 12662 42320a 12659->12662 12661->12136 12663 42321e 12662->12663 12664 42323d WideCharToMultiByte 12663->12664 12669 423239 ___std_exception_destroy 12663->12669 12665 423256 12664->12665 12664->12669 12670 42a846 12665->12670 12668 423269 WideCharToMultiByte 12668->12669 12669->12661 12675 42beea __dosmaperr 12670->12675 12671 42bf28 12673 42d0d6 __dosmaperr 20 API calls 12671->12673 12672 42bf13 RtlAllocateHeap 12674 423260 12672->12674 12672->12675 12673->12674 12674->12668 12674->12669 12675->12671 12675->12672 12676 42ab57 new 7 API calls 12675->12676 12676->12675 12678 4222a9 12677->12678 12680 4222d1 12678->12680 12681 42226e 12678->12681 12680->12153 12682 422280 ___scrt_initialize_default_local_stdio_options 12681->12682 12685 42a7f9 12682->12685 12688 427f74 12685->12688 12689 427fb4 12688->12689 12690 427f9c 12688->12690 12689->12690 12691 427fbc 12689->12691 12692 42d0d6 __dosmaperr 20 API calls 12690->12692 12693 4286c0 __fassign 41 API calls 12691->12693 12694 427fa1 12692->12694 12695 427fcc 12693->12695 12696 427ce1 pre_c_initialization 26 API calls 12694->12696 12705 428656 12695->12705 12704 427fac 12696->12704 12697 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12699 42228e 12697->12699 12699->12680 12704->12697 12706 428675 12705->12706 12707 42d0d6 __dosmaperr 20 API calls 12706->12707 12708 428044 12707->12708 12709 428a11 12708->12709 12725 42a329 12709->12725 12711 42804f 12722 428743 12711->12722 12712 428a36 12713 42d0d6 __dosmaperr 20 API calls 12712->12713 12714 428a3b 12713->12714 12715 427ce1 pre_c_initialization 26 API calls 12714->12715 12715->12711 12717 428a21 12717->12711 12717->12712 12732 428de7 12717->12732 12740 429aa0 12717->12740 12745 428f05 12717->12745 12750 428f56 12717->12750 12779 4293b7 12717->12779 12723 42beb0 __freea 20 API calls 12722->12723 12724 428753 12723->12724 12724->12704 12726 42a341 12725->12726 12727 42a32e 12725->12727 12726->12717 12728 42d0d6 __dosmaperr 20 API calls 12727->12728 12729 42a333 12728->12729 12730 427ce1 pre_c_initialization 26 API calls 12729->12730 12731 42a33e 12730->12731 12731->12717 12801 428e44 12732->12801 12734 428dec 12735 428e03 12734->12735 12736 42d0d6 __dosmaperr 20 API calls 12734->12736 12735->12717 12737 428df5 12736->12737 12738 427ce1 pre_c_initialization 26 API calls 12737->12738 12739 428e00 12738->12739 12739->12717 12741 429ab0 12740->12741 12742 429aa6 12740->12742 12741->12717 12810 428957 12742->12810 12746 428f15 12745->12746 12747 428f0b 12745->12747 12746->12717 12748 428957 45 API calls 12747->12748 12749 428f14 12748->12749 12749->12717 12751 428f77 12750->12751 12752 428f5d 12750->12752 12753 42d0d6 __dosmaperr 20 API calls 12751->12753 12763 428fa7 12751->12763 12754 42943b 12752->12754 12756 4293cf 12752->12756 12752->12763 12755 428f93 12753->12755 12757 429442 12754->12757 12758 429481 12754->12758 12765 429413 12754->12765 12759 427ce1 pre_c_initialization 26 API calls 12755->12759 12756->12765 12767 4293dc 12756->12767 12760 429447 12757->12760 12761 4293ea 12757->12761 12845 42a1ea 12758->12845 12762 428f9e 12759->12762 12760->12765 12766 42944c 12760->12766 12777 4293f8 12761->12777 12778 42940c 12761->12778 12837 429c19 12761->12837 12762->12717 12763->12717 12765->12777 12765->12778 12831 42a00d 12765->12831 12771 429451 12766->12771 12772 42945f 12766->12772 12767->12761 12770 429422 12767->12770 12767->12777 12770->12778 12817 429ee5 12770->12817 12771->12778 12821 42a1cb 12771->12821 12825 42a157 12772->12825 12777->12778 12848 42a40b 12777->12848 12778->12717 12780 42943b 12779->12780 12781 4293cf 12779->12781 12782 429442 12780->12782 12783 429481 12780->12783 12791 429413 12780->12791 12787 4293dc 12781->12787 12781->12791 12784 429447 12782->12784 12785 4293ea 12782->12785 12786 42a1ea 26 API calls 12783->12786 12790 42944c 12784->12790 12784->12791 12789 429c19 51 API calls 12785->12789 12799 4293f8 12785->12799 12800 42940c 12785->12800 12786->12799 12787->12785 12792 429422 12787->12792 12787->12799 12788 42a00d 26 API calls 12788->12799 12789->12799 12793 429451 12790->12793 12794 42945f 12790->12794 12791->12788 12791->12799 12791->12800 12796 429ee5 43 API calls 12792->12796 12792->12800 12797 42a1cb 26 API calls 12793->12797 12793->12800 12795 42a157 26 API calls 12794->12795 12795->12799 12796->12799 12797->12799 12798 42a40b 43 API calls 12798->12800 12799->12798 12799->12800 12800->12717 12804 428ea4 12801->12804 12803 428e50 12803->12734 12805 428ec6 12804->12805 12809 428efa 12804->12809 12806 42d0d6 __dosmaperr 20 API calls 12805->12806 12805->12809 12807 428eef 12806->12807 12808 427ce1 pre_c_initialization 26 API calls 12807->12808 12808->12809 12809->12803 12813 42d104 12810->12813 12814 42d11f 12813->12814 12815 42bfc8 45 API calls 12814->12815 12816 42897e 12815->12816 12816->12717 12818 429efd 12817->12818 12819 429f32 12818->12819 12854 42d391 12818->12854 12819->12777 12822 42a1d7 12821->12822 12823 42a00d 26 API calls 12822->12823 12824 42a1e9 12823->12824 12824->12777 12826 42a16c 12825->12826 12827 42d0d6 __dosmaperr 20 API calls 12826->12827 12830 42a180 12826->12830 12828 42a175 12827->12828 12829 427ce1 pre_c_initialization 26 API calls 12828->12829 12829->12830 12830->12777 12832 42a01e 12831->12832 12833 42d0d6 __dosmaperr 20 API calls 12832->12833 12836 42a048 12832->12836 12834 42a03d 12833->12834 12835 427ce1 pre_c_initialization 26 API calls 12834->12835 12835->12836 12836->12777 12838 429c2f 12837->12838 12857 42828d 12838->12857 12840 429c76 12867 42dfb1 12840->12867 12844 429d0f 12844->12777 12846 42a00d 26 API calls 12845->12846 12847 42a201 12846->12847 12847->12777 12852 42a47d 12848->12852 12853 42a428 12848->12853 12849 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12851 42a4ac 12849->12851 12850 42d391 __cftof 43 API calls 12850->12853 12851->12778 12852->12849 12853->12850 12853->12852 12855 42d270 __cftof 43 API calls 12854->12855 12856 42d3a9 12855->12856 12856->12819 12858 4282b8 12857->12858 12859 4282a9 12857->12859 12861 4282ae 12858->12861 12862 42beea __onexit 21 API calls 12858->12862 12860 42d0d6 __dosmaperr 20 API calls 12859->12860 12860->12861 12861->12840 12863 4282df 12862->12863 12864 4282f6 12863->12864 12865 42875d 20 API calls 12863->12865 12866 42beb0 __freea 20 API calls 12864->12866 12865->12864 12866->12861 12868 42dfc1 12867->12868 12869 42dfd7 12867->12869 12870 42d0d6 __dosmaperr 20 API calls 12868->12870 12871 42dfeb 12869->12871 12875 42e001 12869->12875 12872 42dfc6 12870->12872 12873 42d0d6 __dosmaperr 20 API calls 12871->12873 12874 427ce1 pre_c_initialization 26 API calls 12872->12874 12876 42dff0 12873->12876 12878 429cf0 12874->12878 12879 42e05d 12875->12879 12881 42e03b 12875->12881 12877 427ce1 pre_c_initialization 26 API calls 12876->12877 12877->12878 12878->12844 12892 4288fb 12878->12892 12880 42e07b 12879->12880 12882 42e080 12879->12882 12884 42e0a4 12880->12884 12885 42e0da 12880->12885 12889 42de85 26 API calls 12881->12889 12883 42d770 43 API calls 12882->12883 12883->12878 12887 42e0c2 12884->12887 12888 42e0a9 12884->12888 12886 42da73 43 API calls 12885->12886 12886->12878 12891 42dc59 43 API calls 12887->12891 12890 42ddbd 43 API calls 12888->12890 12889->12878 12890->12878 12891->12878 12893 42d02d 49 API calls 12892->12893 12894 42890d 12893->12894 12895 428921 12894->12895 12896 42ce7f 45 API calls 12894->12896 12897 42d02d 49 API calls 12895->12897 12896->12894 12898 42892a 12897->12898 12898->12844 12900 4217ef 12899->12900 12903 42180f 12899->12903 12901 4217f4 LocalAlloc 12900->12901 12900->12903 12902 421804 LocalFree 12901->12902 12901->12903 12902->12903 12903->12231 12905 42a7b2 12904->12905 12906 42a7c7 12904->12906 12907 42d0d6 __dosmaperr 20 API calls 12905->12907 12906->12905 12908 42a7cb 12906->12908 12909 42a7b7 12907->12909 12913 427f4c 12908->12913 12911 427ce1 pre_c_initialization 26 API calls 12909->12911 12912 423866 12911->12912 12912->11611 12916 427efb 12913->12916 12915 427f70 12915->12912 12917 427f07 ___BuildCatchObject 12916->12917 12924 42a975 EnterCriticalSection 12917->12924 12919 427f15 12925 428781 12919->12925 12923 427f33 ___BuildCatchObject 12923->12915 12924->12919 12943 42e2b7 12925->12943 12928 4286c0 __fassign 41 API calls 12929 4287bb 12928->12929 12952 42868b 12929->12952 12934 428743 20 API calls 12935 428808 12934->12935 12969 42e36c 12935->12969 12938 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 12939 427f22 12938->12939 12940 427f40 12939->12940 13223 42a989 LeaveCriticalSection 12940->13223 12942 427f4a 12942->12923 12973 42e253 12943->12973 12945 42e2c6 12980 4335e7 12945->12980 12947 4287a4 12947->12928 12948 42e2cc 12948->12947 12949 42beea __onexit 21 API calls 12948->12949 12950 42e32b 12949->12950 12951 42beb0 __freea 20 API calls 12950->12951 12951->12947 12953 4286aa 12952->12953 12954 42d0d6 __dosmaperr 20 API calls 12953->12954 12955 4286b6 12954->12955 12956 428b2d 12955->12956 12957 42a329 26 API calls 12956->12957 12963 428b3d 12957->12963 12958 428b52 12959 42d0d6 __dosmaperr 20 API calls 12958->12959 12960 428b57 12959->12960 12962 427ce1 pre_c_initialization 26 API calls 12960->12962 12961 4287fb 12961->12934 12962->12961 12963->12958 12963->12961 12989 428e06 12963->12989 12997 429acb 12963->12997 13002 428f2d 12963->13002 13007 4290bf 12963->13007 13046 4295e6 12963->13046 12970 42882a 12969->12970 12971 42e377 12969->12971 12970->12938 12971->12970 13132 42eb5c 12971->13132 12974 42e274 12973->12974 12975 42e25f 12973->12975 12974->12945 12976 42d0d6 __dosmaperr 20 API calls 12975->12976 12977 42e264 12976->12977 12978 427ce1 pre_c_initialization 26 API calls 12977->12978 12979 42e26f 12978->12979 12979->12945 12981 433601 12980->12981 12982 4335f4 12980->12982 12984 43360d 12981->12984 12985 42d0d6 __dosmaperr 20 API calls 12981->12985 12983 42d0d6 __dosmaperr 20 API calls 12982->12983 12986 4335f9 12983->12986 12984->12948 12987 43362e 12985->12987 12986->12948 12988 427ce1 pre_c_initialization 26 API calls 12987->12988 12988->12986 13078 428e6e 12989->13078 12991 428e22 12991->12963 12993 42d0d6 __dosmaperr 20 API calls 12994 428e14 12993->12994 12995 427ce1 pre_c_initialization 26 API calls 12994->12995 12996 428e1f 12995->12996 12996->12963 12998 429ad2 12997->12998 12999 429adc 12997->12999 13085 4289b3 12998->13085 12999->12963 13003 428f34 13002->13003 13004 428f3e 13002->13004 13005 4289b3 42 API calls 13003->13005 13004->12963 13006 428f3d 13005->13006 13006->12963 13008 4290e2 13007->13008 13009 4290c8 13007->13009 13010 42d0d6 __dosmaperr 20 API calls 13008->13010 13029 429113 13008->13029 13011 429678 13009->13011 13012 42960d 13009->13012 13009->13029 13013 4290ff 13010->13013 13015 4296be 13011->13015 13016 42967f 13011->13016 13025 42964f 13011->13025 13022 429619 13012->13022 13012->13025 13014 427ce1 pre_c_initialization 26 API calls 13013->13014 13017 42910a 13014->13017 13020 42a1ea 26 API calls 13015->13020 13018 429684 13016->13018 13019 429626 13016->13019 13017->12963 13021 429689 13018->13021 13018->13025 13036 429634 13019->13036 13044 429648 13019->13044 13096 429d73 13019->13096 13020->13036 13027 42968e 13021->13027 13028 42969c 13021->13028 13022->13019 13026 42965f 13022->13026 13022->13036 13023 42a00d 26 API calls 13023->13036 13025->13023 13025->13036 13025->13044 13026->13044 13092 429f75 13026->13092 13033 42a1cb 26 API calls 13027->13033 13027->13044 13030 42a157 26 API calls 13028->13030 13029->12963 13030->13036 13031 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 13034 42983f 13031->13034 13033->13036 13034->12963 13035 4297c1 13108 42a5c8 13035->13108 13036->13035 13036->13044 13104 4284bd 13036->13104 13040 429802 13112 42a4b2 13040->13112 13043 4284bd 43 API calls 13043->13040 13044->13031 13045 4284bd 43 API calls 13045->13044 13047 429678 13046->13047 13048 42960d 13046->13048 13049 4296be 13047->13049 13050 42967f 13047->13050 13057 42964f 13047->13057 13048->13057 13060 429619 13048->13060 13053 42a1ea 26 API calls 13049->13053 13051 429684 13050->13051 13052 429626 13050->13052 13056 429689 13051->13056 13051->13057 13054 429634 13052->13054 13055 429d73 51 API calls 13052->13055 13059 429648 13052->13059 13053->13054 13054->13059 13069 4297c1 13054->13069 13070 4284bd 43 API calls 13054->13070 13055->13054 13062 42968e 13056->13062 13063 42969c 13056->13063 13057->13054 13057->13059 13061 42a00d 26 API calls 13057->13061 13058 42965f 13058->13059 13066 429f75 43 API calls 13058->13066 13065 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 13059->13065 13060->13052 13060->13054 13060->13058 13061->13054 13062->13059 13067 42a1cb 26 API calls 13062->13067 13064 42a157 26 API calls 13063->13064 13064->13054 13068 42983f 13065->13068 13066->13054 13067->13054 13068->12963 13071 42a5c8 43 API calls 13069->13071 13070->13069 13072 4297db 13071->13072 13073 429802 13072->13073 13076 4284bd 43 API calls 13072->13076 13074 42a4b2 45 API calls 13073->13074 13075 42980e 13074->13075 13075->13059 13077 4284bd 43 API calls 13075->13077 13076->13073 13077->13059 13081 42a344 13078->13081 13082 42a355 13081->13082 13083 428e0b 13082->13083 13084 42e12d 43 API calls 13082->13084 13083->12991 13083->12993 13084->13083 13088 42d130 13085->13088 13089 42d14b 13088->13089 13090 42c1f0 42 API calls 13089->13090 13091 4289dc 13090->13091 13091->12963 13094 429fa1 13092->13094 13093 429fd0 13093->13036 13094->13093 13120 42d15c 13094->13120 13097 429d8f 13096->13097 13098 42828d 21 API calls 13097->13098 13099 429ddc 13098->13099 13100 42dfb1 43 API calls 13099->13100 13101 429e56 13100->13101 13102 4288fb 49 API calls 13101->13102 13103 429e75 13101->13103 13102->13103 13103->13036 13103->13103 13105 4284e9 13104->13105 13107 4284ca 13104->13107 13105->13035 13106 42a344 43 API calls 13106->13107 13107->13105 13107->13106 13109 42a5de 13108->13109 13110 4297db 13109->13110 13111 42a344 43 API calls 13109->13111 13110->13040 13110->13043 13111->13109 13113 42a4c4 13112->13113 13114 42a51a 13112->13114 13113->13114 13117 42a4cb 13113->13117 13115 42a5c8 43 API calls 13114->13115 13119 42980e 13115->13119 13116 42d15c __fassign 43 API calls 13116->13117 13117->13116 13118 42a344 43 API calls 13117->13118 13117->13119 13118->13117 13119->13044 13119->13045 13121 42d16d 13120->13121 13126 42d179 13120->13126 13122 4286c0 __fassign 41 API calls 13121->13122 13121->13126 13123 42d199 13122->13123 13124 4315b0 __fassign 41 API calls 13123->13124 13123->13126 13125 42d1c7 13124->13125 13127 42d20d MultiByteToWideChar 13125->13127 13128 42d1cd 13125->13128 13126->13093 13127->13126 13129 42d1fd 13127->13129 13128->13129 13130 42d1db MultiByteToWideChar 13128->13130 13129->13126 13131 42d0d6 __dosmaperr 20 API calls 13129->13131 13130->13126 13130->13129 13131->13126 13133 42eb74 13132->13133 13134 42eb70 13132->13134 13133->13134 13135 42e253 26 API calls 13133->13135 13134->12970 13136 42eb94 13135->13136 13138 433eda 13136->13138 13139 433ee6 ___BuildCatchObject 13138->13139 13140 433f06 13139->13140 13141 433eee 13139->13141 13143 433fa4 13140->13143 13148 433f3b 13140->13148 13217 42d0c3 13141->13217 13145 42d0c3 __dosmaperr 20 API calls 13143->13145 13147 433fa9 13145->13147 13146 42d0d6 __dosmaperr 20 API calls 13149 433efb ___BuildCatchObject 13146->13149 13150 42d0d6 __dosmaperr 20 API calls 13147->13150 13163 43065a EnterCriticalSection 13148->13163 13149->13134 13152 433fb1 13150->13152 13154 427ce1 pre_c_initialization 26 API calls 13152->13154 13153 433f41 13155 433f72 13153->13155 13156 433f5d 13153->13156 13154->13149 13164 433fc5 13155->13164 13157 42d0d6 __dosmaperr 20 API calls 13156->13157 13159 433f62 13157->13159 13161 42d0c3 __dosmaperr 20 API calls 13159->13161 13160 433f6d 13220 433f9c 13160->13220 13161->13160 13163->13153 13165 433ff3 13164->13165 13202 433fec 13164->13202 13166 433ff7 13165->13166 13167 434016 13165->13167 13169 42d0c3 __dosmaperr 20 API calls 13166->13169 13170 434067 13167->13170 13171 43404a 13167->13171 13168 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 13172 4341cd 13168->13172 13173 433ffc 13169->13173 13175 43407d 13170->13175 13178 434f7b 28 API calls 13170->13178 13174 42d0c3 __dosmaperr 20 API calls 13171->13174 13172->13160 13176 42d0d6 __dosmaperr 20 API calls 13173->13176 13177 43404f 13174->13177 13180 433b6a 42 API calls 13175->13180 13179 434003 13176->13179 13181 42d0d6 __dosmaperr 20 API calls 13177->13181 13178->13175 13182 427ce1 pre_c_initialization 26 API calls 13179->13182 13183 434086 13180->13183 13186 434057 13181->13186 13182->13202 13184 4340c4 13183->13184 13185 43408b 13183->13185 13190 4340d8 13184->13190 13191 43411e WriteFile 13184->13191 13187 4340b1 13185->13187 13188 43408f 13185->13188 13189 427ce1 pre_c_initialization 26 API calls 13186->13189 13193 43394a 48 API calls 13187->13193 13192 434185 13188->13192 13197 433afd GetLastError WriteConsoleW CreateFileW 13188->13197 13189->13202 13195 4340e0 13190->13195 13196 43410e 13190->13196 13194 434141 GetLastError 13191->13194 13206 4340fc 13191->13206 13192->13202 13203 42d0d6 __dosmaperr 20 API calls 13192->13203 13204 4340a7 13193->13204 13194->13206 13199 4340e5 13195->13199 13200 4340fe 13195->13200 13198 433be0 7 API calls 13196->13198 13197->13204 13198->13204 13199->13192 13205 4340ee 13199->13205 13201 433dad 8 API calls 13200->13201 13201->13206 13202->13168 13207 4341aa 13203->13207 13204->13192 13204->13202 13208 434161 13204->13208 13209 433cbf 7 API calls 13205->13209 13206->13204 13210 42d0c3 __dosmaperr 20 API calls 13207->13210 13211 434168 13208->13211 13212 43417c 13208->13212 13209->13206 13210->13202 13214 42d0d6 __dosmaperr 20 API calls 13211->13214 13213 42d0a0 __dosmaperr 20 API calls 13212->13213 13213->13202 13215 43416d 13214->13215 13216 42d0c3 __dosmaperr 20 API calls 13215->13216 13216->13202 13218 42cd7c __dosmaperr 20 API calls 13217->13218 13219 42d0c8 13218->13219 13219->13146 13221 43067d LeaveCriticalSection 13220->13221 13222 433fa2 13221->13222 13222->13149 13223->12942 13225 4211c6 13224->13225 13226 42129c 13225->13226 13228 4211e6 WaitForSingleObject 13225->13228 13235 421285 13225->13235 13227 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 13226->13227 13230 4212aa 13227->13230 13231 42126b 13228->13231 13232 4211ff _abort 13228->13232 13229 42128f CloseHandle 13229->13226 13241 421502 13230->13241 13233 42127a TerminateThread 13231->13233 13234 42126f CloseHandle 13231->13234 13236 421219 InitializeCriticalSection 13232->13236 13233->13235 13234->13235 13235->13226 13235->13229 13250 421421 13236->13250 13240 421250 DeleteCriticalSection WaitForSingleObject 13240->13231 13242 421537 13241->13242 13243 421512 13241->13243 13245 42182a 13242->13245 13243->13242 13262 421079 13243->13262 13246 421833 13245->13246 13247 42184a 13245->13247 13248 421842 LocalFree 13246->13248 13249 421839 LocalFree 13246->13249 13247->11665 13248->13247 13249->13248 13251 421437 13250->13251 13258 421245 13250->13258 13252 421446 CreateFileW 13251->13252 13257 421478 WaitNamedPipeW 13251->13257 13253 42149a SetNamedPipeHandleState 13252->13253 13254 42145f GetLastError 13252->13254 13255 4214b2 13253->13255 13253->13258 13254->13251 13254->13258 13256 4214ba CloseHandle 13255->13256 13255->13258 13256->13258 13257->13251 13257->13258 13259 4214ce EnterCriticalSection 13258->13259 13260 4214e1 CloseHandle 13259->13260 13261 4214ec LeaveCriticalSection 13259->13261 13260->13261 13261->13240 13263 42108b 13262->13263 13264 427c66 std::_Deallocate 26 API calls 13263->13264 13267 4210b8 13263->13267 13265 427d00 13264->13265 13266 427d0e std::_Deallocate 11 API calls 13265->13266 13268 427d0d 13266->13268 13267->13242 13272 43009f 13269->13272 13275 4300b8 13272->13275 13273 4241cf __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 13274 42469d 13273->13274 13274->11703 13275->13273

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004232EE
                                                                  • GetLastError.KERNEL32(GetModuleFileName() FAILED. GetLastError()=), ref: 00423331
                                                                  • GetLastError.KERNEL32 ref: 0042334F
                                                                  • OpenSCManagerW.SECHOST(00000000,00000000,00000003), ref: 00423369
                                                                  • GetLastError.KERNEL32(OpenSCManager() FAILED. GetLastError()=), ref: 004233AE
                                                                  • CreateServiceW.ADVAPI32(00000000,SoundBoosterService,Letasoft Sound Booster Service,00020006,00000010,00000003,00000001,?,00000000,00000000,0043EA30,.\LocalSystem,00000000), ref: 00423402
                                                                  • GetLastError.KERNEL32(CreateService() FAILED. GetLastError()=), ref: 00423441
                                                                  • GetLastError.KERNEL32 ref: 00423463
                                                                  • ChangeServiceConfig2W.ADVAPI32(00000000,00000001,?), ref: 0042348F
                                                                  • GetLastError.KERNEL32(ChangeServiceConfig2() FAILED. GetLastError()=), ref: 004234CB
                                                                  • GetLastError.KERNEL32 ref: 004234ED
                                                                  • GetLastError.KERNEL32 ref: 004233CC
                                                                    • Part of subcall function 0042257A: InitializeCriticalSection.KERNEL32(004434B8,?,00422741), ref: 004225CE
                                                                    • Part of subcall function 0042257A: __Init_thread_footer.LIBCMT ref: 004225DF
                                                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 0042357F
                                                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00423586
                                                                    • Part of subcall function 004222EF: GetCurrentThreadId.KERNEL32 ref: 0042236B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$Service$CloseHandle$ChangeConfig2CreateCriticalCurrentFileInit_thread_footerInitializeManagerModuleNameOpenSectionThread
                                                                  • String ID: is installed$%s is installed.$.\LocalSystem$ChangeServiceConfig2 failed w/err 0x%08lx$ChangeServiceConfig2() FAILED. GetLastError()=$CreateService failed w/err 0x%08lx$CreateService() FAILED. GetLastError()=$GetModuleFileName failed w/err 0x%08lx$GetModuleFileName() FAILED. GetLastError()=$InstallService$Letasoft Sound Booster Service$OpenSCManager failed w/err 0x%08lx$OpenSCManager() FAILED. GetLastError()=$Service $ServiceInstaller.cpp$SoundBoosterService
                                                                  • API String ID: 1288437450-1163846380
                                                                  • Opcode ID: 278a48ff3c360ea8ef44b427cf3a850200caa620ffa126872d43cf0ec0a24eb4
                                                                  • Instruction ID: cb47be0430f6faf93e95387e945cf2dd28adffb6207b2ba27f3dec740665fd1b
                                                                  • Opcode Fuzzy Hash: 278a48ff3c360ea8ef44b427cf3a850200caa620ffa126872d43cf0ec0a24eb4
                                                                  • Instruction Fuzzy Hash: C9711730741324BBD214BB22AD56F6E7768AF04B05F50509EF501AB1D2CEEC9E45CA9C
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 89 423a4b-423a72 call 42499d call 42257a EnterCriticalSection 94 423a83-423a93 LeaveCriticalSection call 42386c 89->94 95 423a74-423a7e call 423e1a call 423f39 89->95 101 423a99-423aa2 94->101 102 423d4d-423d9c call 4225e8 StartServiceCtrlDispatcherW 94->102 95->94 103 423aa4-423aa7 101->103 104 423aad-423abf call 42a99d 101->104 108 423e07-423e0d call 422676 102->108 109 423d9e-423dad call 42257a 102->109 103->102 103->104 113 423ac5-423ad0 call 42257a 104->113 114 423c8d-423ca2 call 42a99d 104->114 117 423e12-423e19 call 424947 108->117 121 423df8-423e06 GetLastError call 423840 109->121 122 423daf-423df0 call 4222ef call 42243d GetLastError call 422203 call 42257a 109->122 127 423ad2-423b04 call 4222ef call 42243d call 42257a 113->127 128 423b0c-423b19 call 4232c3 113->128 125 423cf7-423d00 call 42257a 114->125 126 423ca4-423cad call 42257a 114->126 121->108 122->121 181 423df2-423df4 122->181 125->117 142 423d06-423d24 call 4222ef 125->142 143 423caf-423ce5 call 4222ef call 42243d call 42257a 126->143 144 423ced-423cf2 call 42359f 126->144 127->128 173 423b06-423b08 127->173 147 423c57-423c60 call 42257a 128->147 148 423b1f-423b28 call 42257a 128->148 165 423d29-423d3c call 42243d call 42257a 142->165 143->144 189 423ce7-423ce9 143->189 144->117 147->117 169 423c66-423c88 call 4222ef 147->169 163 423b64-423b70 148->163 164 423b2a-423b5c call 4222ef call 42243d call 42257a 148->164 174 423b7a-423bae call 426940 CreateWellKnownSid 163->174 164->163 201 423b5e-423b60 164->201 165->117 194 423d42-423d48 165->194 169->165 173->128 190 423bb0-423bb7 call 42184c 174->190 191 423bf6-423bff call 42257a 174->191 181->121 189->144 196 423bbc-423bc1 190->196 200 423c48-423c4c 191->200 202 423c01-423c1e call 4222ef 191->202 194->117 199 423bc7-423bd0 call 42257a 196->199 196->200 199->200 209 423bd2-423bf4 call 4222ef 199->209 200->174 205 423c52 200->205 201->163 210 423c23-423c40 call 42243d call 42219e call 42257a 202->210 205->117 209->210 210->200 219 423c42-423c44 210->219 219->200
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00423A55
                                                                    • Part of subcall function 0042257A: InitializeCriticalSection.KERNEL32(004434B8,?,00422741), ref: 004225CE
                                                                    • Part of subcall function 0042257A: __Init_thread_footer.LIBCMT ref: 004225DF
                                                                  • EnterCriticalSection.KERNEL32(00000004,000002C0), ref: 00423A68
                                                                  • LeaveCriticalSection.KERNEL32(00000004), ref: 00423A84
                                                                  • CreateWellKnownSid.ADVAPI32(?,00000000,?,00000044), ref: 00423BA6
                                                                    • Part of subcall function 00423E1A: RegOpenKeyExW.KERNELBASE(80000002,SOFTWARE\Letasoft\Sound Booster,00000000,00000101,?), ref: 00423E3B
                                                                    • Part of subcall function 00423E1A: RegQueryValueExW.KERNELBASE(?,MLS,00000000,?,?,?), ref: 00423E67
                                                                    • Part of subcall function 00423E1A: RegCloseKey.KERNELBASE(?), ref: 00423E82
                                                                    • Part of subcall function 00423F39: GetModuleHandleExW.KERNEL32(00000006,00000000,?), ref: 00423FCA
                                                                    • Part of subcall function 00423F39: GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 00423FE6
                                                                    • Part of subcall function 00423F39: _wcsrchr.LIBVCRUNTIME ref: 00423FF9
                                                                    • Part of subcall function 00423F39: _wcsrchr.LIBVCRUNTIME ref: 0042400D
                                                                    • Part of subcall function 00423F39: LoadLibraryW.KERNELBASE(?), ref: 00424039
                                                                    • Part of subcall function 00423F39: GetProcAddress.KERNEL32(00000000,ProvideLogger), ref: 0042404C
                                                                    • Part of subcall function 004222EF: GetCurrentThreadId.KERNEL32 ref: 0042236B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$Module_wcsrchr$AddressCloseCreateCurrentEnterFileH_prolog3_HandleInit_thread_footerInitializeKnownLeaveLibraryLoadNameOpenProcQueryThreadValueWell
                                                                  • String ID: CreateWellKnownSid() Failed. i=$D$Failed to change security for service. i=$Failed to install service$Service failed to run w/err 0x%08lx$Service failed to run w/err=$SoundBoosterService.cpp$Successfully installed service$Unknown command line argument used$install$install command$remove$remove command$wmain
                                                                  • API String ID: 2573466290-32031228
                                                                  • Opcode ID: 44b9919383369a7416b94e9ad784cc6bbb4ec2e9897bc97bd05ab890d9a97f24
                                                                  • Instruction ID: 61ff617c5cc76d2f732410b1394e7168d98c5db66bca07f995d2e48f47a5f14b
                                                                  • Opcode Fuzzy Hash: 44b9919383369a7416b94e9ad784cc6bbb4ec2e9897bc97bd05ab890d9a97f24
                                                                  • Instruction Fuzzy Hash: 6891B170741220BBD714AF62EE56F6E7774AF04709F9140AFF005AA192CBBC9E448A5E
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 446 42aeab-42aeb7 call 42e9ff 449 42aed9-42aee5 call 42aeec ExitProcess 446->449 450 42aeb9-42aec7 GetPEB 446->450 450->449 451 42aec9-42aed3 GetCurrentProcess TerminateProcess 450->451 451->449
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000000,?,0042AE81,00000000,00440198,0000000C,0042AF94,00000000,00000002,00000000), ref: 0042AECC
                                                                  • TerminateProcess.KERNEL32(00000000,?,0042AE81,00000000,00440198,0000000C,0042AF94,00000000,00000002,00000000), ref: 0042AED3
                                                                  • ExitProcess.KERNEL32 ref: 0042AEE5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CurrentExitTerminate
                                                                  • String ID:
                                                                  • API String ID: 1703294689-0
                                                                  • Opcode ID: 7a1e7c5e6bb5ab05ebba6322da8d29da2ce33b023814411d6ca0829e40c86587
                                                                  • Instruction ID: abb7ee988cd9b108fcf2ad31744b997a82a62f499be6e33f42b773c4a77f3d81
                                                                  • Opcode Fuzzy Hash: 7a1e7c5e6bb5ab05ebba6322da8d29da2ce33b023814411d6ca0829e40c86587
                                                                  • Instruction Fuzzy Hash: 72E04631100618AFCF016F62EE08A5A7B69EB54361B81002AFC058A631CB39DD53EA88
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 00423876
                                                                    • Part of subcall function 00421B27: GetCurrentProcess.KERNEL32(00000008,?,00000000,00000000,00000000), ref: 00421B45
                                                                    • Part of subcall function 00421B27: OpenProcessToken.ADVAPI32(00000000), ref: 00421B4C
                                                                    • Part of subcall function 00421B27: GetLastError.KERNEL32 ref: 00421B56
                                                                    • Part of subcall function 00421B27: FindCloseChangeNotification.KERNELBASE(00000000), ref: 00421BDB
                                                                    • Part of subcall function 00421B27: LocalFree.KERNEL32(00000000), ref: 00421BEA
                                                                  • _strcat.LIBCMT ref: 0042389F
                                                                  • _strcat.LIBCMT ref: 004238EF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: Process_strcat$ChangeCloseCurrentErrorFindFreeH_prolog3_catch_LastLocalNotificationOpenToken
                                                                  • String ID: integrity=$ isElevatedProc=$ runAsAdmin=$High$LogProcessInfo$Low$Medium$SoundBoosterService.cpp$System$Unknown$Untrusted$isUserAdmin=
                                                                  • API String ID: 2350065001-994685661
                                                                  • Opcode ID: c75d4a09ae19abd8d0bc559abc19d4318019f6d4ad3c0cd16f2e5049896365e3
                                                                  • Instruction ID: 18cdb34a2a5b5ff369d4dee4ad3af5e677121ea3b37c0e06565918780870de7d
                                                                  • Opcode Fuzzy Hash: c75d4a09ae19abd8d0bc559abc19d4318019f6d4ad3c0cd16f2e5049896365e3
                                                                  • Instruction Fuzzy Hash: 2921F671B4123066DA25B6A2BD17BBE62A54F18B09FE0042FB501BB1D2DEAC5E40875E
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 275 421b27-421b54 GetCurrentProcess OpenProcessToken 276 421b60-421b7b GetTokenInformation 275->276 277 421b56-421b5e GetLastError 275->277 279 421b8c-421b9b LocalAlloc 276->279 280 421b7d-421b82 GetLastError 276->280 278 421bd2-421bd6 277->278 281 421be5-421be7 278->281 282 421bd8-421be1 FindCloseChangeNotification 278->282 284 421ba6-421bbb GetTokenInformation 279->284 285 421b9d-421b9f GetLastError 279->285 280->279 283 421b84-421b8a GetLastError 280->283 288 421bf4-421bf6 281->288 289 421be9-421bf0 LocalFree 281->289 282->281 283->278 284->285 287 421bbd-421bc9 GetSidSubAuthority 284->287 286 421ba1-421ba4 285->286 286->278 290 421bd0 287->290 291 421bcb-421bce 287->291 292 421c01-421c12 call 426d38 288->292 293 421bf8-421c00 288->293 289->288 290->278 291->286
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000008,?,00000000,00000000,00000000), ref: 00421B45
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00421B4C
                                                                  • GetLastError.KERNEL32 ref: 00421B56
                                                                  • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 00421B6D
                                                                  • GetLastError.KERNEL32 ref: 00421B7D
                                                                  • GetLastError.KERNEL32 ref: 00421B84
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00421BDB
                                                                  • LocalFree.KERNEL32(00000000), ref: 00421BEA
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00421C0D
                                                                    • Part of subcall function 00426D38: RaiseException.KERNEL32(?,?,?,0042418E,?,?,?,?,?,?,?,?,0042418E,?,0043FED4), ref: 00426D97
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$ProcessToken$ChangeCloseCurrentExceptionException@8FindFreeInformationLocalNotificationOpenRaiseThrow
                                                                  • String ID:
                                                                  • API String ID: 1071881940-0
                                                                  • Opcode ID: 0b14c8c9e53937f97670a6798ca9d420c7a83e859a10286a1eb2ece677582183
                                                                  • Instruction ID: 306a4a9071869b11b1443c5f531daf2026eb7d9a24bdc6e61ae417551cac92b8
                                                                  • Opcode Fuzzy Hash: 0b14c8c9e53937f97670a6798ca9d420c7a83e859a10286a1eb2ece677582183
                                                                  • Instruction Fuzzy Hash: 21318635A00318AFDB159FA5EC89B9EFF74EB14711F51406AF905E2260EB38AD08DB58
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 296 423f39-423f57 297 424089-424098 call 4241cf 296->297 298 423f5d-423fd2 call 423e90 * 3 call 426940 call 42257a GetModuleHandleExW 296->298 311 424032-424044 LoadLibraryW 298->311 312 423fd4-423fee GetModuleFileNameW 298->312 314 424046-424054 GetProcAddress 311->314 315 424088 311->315 312->311 313 423ff0-424002 call 426c97 312->313 323 424004-424016 call 426c97 313->323 324 424018-42401a 313->324 317 424066 314->317 318 424056-424058 314->318 315->297 320 424068-42406d 317->320 325 42405f-424064 318->325 321 424079-424085 FreeLibrary 320->321 322 42406f-424077 320->322 321->315 322->315 323->324 327 42401e-42402d call 423e90 323->327 324->327 325->320 327->311
                                                                  APIs
                                                                    • Part of subcall function 0042257A: InitializeCriticalSection.KERNEL32(004434B8,?,00422741), ref: 004225CE
                                                                    • Part of subcall function 0042257A: __Init_thread_footer.LIBCMT ref: 004225DF
                                                                  • GetModuleHandleExW.KERNEL32(00000006,00000000,?), ref: 00423FCA
                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104), ref: 00423FE6
                                                                  • _wcsrchr.LIBVCRUNTIME ref: 00423FF9
                                                                  • _wcsrchr.LIBVCRUNTIME ref: 0042400D
                                                                  • LoadLibraryW.KERNELBASE(?), ref: 00424039
                                                                  • GetProcAddress.KERNEL32(00000000,ProvideLogger), ref: 0042404C
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 0042407F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryModule_wcsrchr$AddressCriticalFileFreeHandleInit_thread_footerInitializeLoadNameProcSection
                                                                  • String ID: .dll$Logger$ProvideLogger$Sound Booster
                                                                  • API String ID: 3089204199-3424903129
                                                                  • Opcode ID: ec7ffa12e012ddf500ec212ca174fd67f3077b1a704d5e2fa38587ad9670877b
                                                                  • Instruction ID: 88b0e6fac165eb5bd7d241b43630460387f8e968220dacc88c389504028008b8
                                                                  • Opcode Fuzzy Hash: ec7ffa12e012ddf500ec212ca174fd67f3077b1a704d5e2fa38587ad9670877b
                                                                  • Instruction Fuzzy Hash: 0641A771B00314AADB24DF61EC45BAFB7F8EF48714F50446FE605E6190DB789E488A2C
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 331 42184c-42187f GetNamedSecurityInfoW 332 421881-4218bf call 426940 SetEntriesInAclW 331->332 333 4218d4-4218dd 331->333 332->333 340 4218c1-4218d2 SetNamedSecurityInfoW 332->340 335 4218e4-4218e8 333->335 336 4218df-4218e2 LocalFree 333->336 338 4218ea-4218ed LocalFree 335->338 339 4218ef-4218f7 335->339 336->335 338->339 340->333
                                                                  APIs
                                                                  • GetNamedSecurityInfoW.ADVAPI32(SoundBoosterService,00000002,00000004,00000000,00000000,?,00000000,?), ref: 00421875
                                                                  • SetEntriesInAclW.ADVAPI32(00000001,000000F5,?,?), ref: 004218B5
                                                                  • SetNamedSecurityInfoW.ADVAPI32(SoundBoosterService,00000002,00000004,00000000,00000000,?,00000000), ref: 004218CC
                                                                  • LocalFree.KERNEL32(?), ref: 004218E2
                                                                  • LocalFree.KERNEL32(00000000), ref: 004218ED
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: FreeInfoLocalNamedSecurity$Entries
                                                                  • String ID: SoundBoosterService
                                                                  • API String ID: 2129671474-1996914151
                                                                  • Opcode ID: 1d6e98b6e2bdeb851337efe30cadb8f5ae827bbf229ba53160554069d6972c80
                                                                  • Instruction ID: 86557f219e34e296909cc8726de948acb4385afdf89f90e0222795d8310a8daf
                                                                  • Opcode Fuzzy Hash: 1d6e98b6e2bdeb851337efe30cadb8f5ae827bbf229ba53160554069d6972c80
                                                                  • Instruction Fuzzy Hash: E3214F71D00218BBDB259B96DC89EEFBBBCEB88714F11406AF904B2250D7344E04DB64
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 341 423e1a-423e43 RegOpenKeyExW 342 423e45-423e6f RegQueryValueExW 341->342 343 423e88-423e8f 341->343 344 423e71-423e75 342->344 345 423e7f-423e82 RegCloseKey 342->345 344->345 346 423e77-423e7b 344->346 345->343 346->345
                                                                  APIs
                                                                  • RegOpenKeyExW.KERNELBASE(80000002,SOFTWARE\Letasoft\Sound Booster,00000000,00000101,?), ref: 00423E3B
                                                                  • RegQueryValueExW.KERNELBASE(?,MLS,00000000,?,?,?), ref: 00423E67
                                                                  • RegCloseKey.KERNELBASE(?), ref: 00423E82
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID: MLS$SOFTWARE\Letasoft\Sound Booster
                                                                  • API String ID: 3677997916-2912749924
                                                                  • Opcode ID: 000e0e8db6a42dfad7c57de51d4204ecc4131eb05bfaf42d47e430c75f0309f0
                                                                  • Instruction ID: 37f5abecaf831dd827c4b8722969b5351e46d5d5ee2ce756342b62b961b54f31
                                                                  • Opcode Fuzzy Hash: 000e0e8db6a42dfad7c57de51d4204ecc4131eb05bfaf42d47e430c75f0309f0
                                                                  • Instruction Fuzzy Hash: 5E012871A00218FADB20DF96EC08EDFBBBCEB94751F1141AAE910A2150D7B45B08CA95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 347 422500-42252f 348 422531-422535 347->348 349 42255a-422579 DeleteCriticalSection 347->349 348->349 350 422537-422547 GetProcAddress 348->350 351 422551-422554 FreeLibrary 350->351 352 422549-422550 350->352 351->349 352->351
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(00000000,ReleaseLogger), ref: 0042253F
                                                                  • FreeLibrary.KERNELBASE(?,?,?,0043761B,000000FF,?,004224BD), ref: 00422554
                                                                  • DeleteCriticalSection.KERNEL32(?,4EF4507E,?,?,0043761B,000000FF,?,004224BD), ref: 0042255E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCriticalDeleteFreeLibraryProcSection
                                                                  • String ID: ReleaseLogger
                                                                  • API String ID: 1152769218-621462491
                                                                  • Opcode ID: 6fe3dcb0181cf9b38cbe4b50cdcb268fcef19e77c37bfbc0245b3d6c9b6dba09
                                                                  • Instruction ID: c18e0dfa536adfb9a4d6043f219074d55b102c4ffdc5857272463f342149f658
                                                                  • Opcode Fuzzy Hash: 6fe3dcb0181cf9b38cbe4b50cdcb268fcef19e77c37bfbc0245b3d6c9b6dba09
                                                                  • Instruction Fuzzy Hash: 43017C32104B05EFD7248F59ED04B52BBF8FB08754F105A2EE546826A0EBB9A904CB48
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 354 42e649-42e65d 355 42e66a-42e685 LoadLibraryExW 354->355 356 42e65f-42e668 354->356 358 42e687-42e690 GetLastError 355->358 359 42e6ae-42e6b4 355->359 357 42e6c1-42e6c3 356->357 360 42e692-42e69d LoadLibraryExW 358->360 361 42e69f 358->361 362 42e6b6-42e6b7 FreeLibrary 359->362 363 42e6bd 359->363 364 42e6a1-42e6a3 360->364 361->364 362->363 365 42e6bf-42e6c0 363->365 364->359 366 42e6a5-42e6ac 364->366 365->357 366->365
                                                                  APIs
                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,?,00000000,00000000,?,0042E5F0,?,00000000,00000000,00000000,?,0042E861,00000006,FlsSetValue), ref: 0042E67B
                                                                  • GetLastError.KERNEL32(?,0042E5F0,?,00000000,00000000,00000000,?,0042E861,00000006,FlsSetValue,0043A3E8,0043A3F0,00000000,00000364,?,0042CDCA), ref: 0042E687
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0042E5F0,?,00000000,00000000,00000000,?,0042E861,00000006,FlsSetValue,0043A3E8,0043A3F0,00000000), ref: 0042E695
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad$ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 3177248105-0
                                                                  • Opcode ID: f12ba65e23131059e35a8e85ffe2ebc94b644ddf69341fcf544ab3a0ffb6e74e
                                                                  • Instruction ID: e19e4c9ec219430d26598476160ba1f9938b5b1ba031cd5c2727c572563461c8
                                                                  • Opcode Fuzzy Hash: f12ba65e23131059e35a8e85ffe2ebc94b644ddf69341fcf544ab3a0ffb6e74e
                                                                  • Instruction Fuzzy Hash: BA018432711332ABCB214A7ABC44E57B768AF66B617A10635FD05D7390DB28DC1186EC
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 367 433fc5-433fea 368 433ff3-433ff5 367->368 369 433fec-433fee 367->369 371 433ff7-434011 call 42d0c3 call 42d0d6 call 427ce1 368->371 372 434016-43403b 368->372 370 4341c1-4341d0 call 4241cf 369->370 371->370 375 434042-434048 372->375 376 43403d-434040 372->376 378 434067 375->378 379 43404a-434062 call 42d0c3 call 42d0d6 call 427ce1 375->379 376->375 377 43406a-43406f 376->377 383 434071-43407d call 434f7b 377->383 384 434080-434089 call 433b6a 377->384 378->377 416 4341b8-4341bb 379->416 383->384 394 4340c4-4340d6 384->394 395 43408b-43408d 384->395 401 4340d8-4340de 394->401 402 43411e-43413f WriteFile 394->402 398 4340b1-4340ba call 43394a 395->398 399 43408f-434094 395->399 415 4340bf-4340c2 398->415 403 43409a-4340a7 call 433afd 399->403 404 434188-43419a 399->404 409 4340e0-4340e3 401->409 410 43410e-434117 call 433be0 401->410 407 434141-434147 GetLastError 402->407 408 43414a 402->408 425 4340aa-4340ac 403->425 413 4341a5-4341b5 call 42d0d6 call 42d0c3 404->413 414 43419c-43419f 404->414 407->408 417 43414d-434158 408->417 418 4340e5-4340e8 409->418 419 4340fe-43410c call 433dad 409->419 422 43411c 410->422 413->416 414->413 423 4341a1-4341a3 414->423 415->425 429 4341c0 416->429 426 43415a-43415f 417->426 427 4341bd 417->427 418->404 428 4340ee-4340fc call 433cbf 418->428 419->415 422->415 423->429 425->417 432 434161-434166 426->432 433 434185 426->433 427->429 428->415 429->370 436 434168-43417a call 42d0d6 call 42d0c3 432->436 437 43417c-434183 call 42d0a0 432->437 433->404 436->416 437->416
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9d01d8d0f0e3fa23fc23d3b85db153aba18c473ebb3ed17f0eddf33c4b4b2dec
                                                                  • Instruction ID: a3aaffe6499ba7990d129c2a8e308375b14646c9aeac175aa66d2b98722178eb
                                                                  • Opcode Fuzzy Hash: 9d01d8d0f0e3fa23fc23d3b85db153aba18c473ebb3ed17f0eddf33c4b4b2dec
                                                                  • Instruction Fuzzy Hash: C251F571E002199BDF149FA5C809FEFBBB4EF9D318F54111BE400A7292D778A941CB69
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 454 433be0-433c37 call 437350 457 433c9e-433ca0 454->457 458 433ca2 457->458 459 433c39 457->459 460 433cac-433cbe call 4241cf 458->460 461 433c3f-433c41 459->461 463 433c43-433c48 461->463 464 433c61-433c83 WriteFile 461->464 466 433c51-433c5f 463->466 467 433c4a-433c50 463->467 468 433c85-433c90 464->468 469 433ca4-433caa GetLastError 464->469 466->461 466->464 467->466 468->460 470 433c92-433c98 468->470 469->460 470->457
                                                                  APIs
                                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000,FF8BC35D,00000000,?,?,0043411C,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 00433C7B
                                                                  • GetLastError.KERNEL32(?,0043411C,?,00000000,FF8BC35D,00000000,00000000,FF8BC369,00000000,0042882A,?,00000000,?,FFEC8B55,?,75FF2075), ref: 00433CA4
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastWrite
                                                                  • String ID:
                                                                  • API String ID: 442123175-0
                                                                  • Opcode ID: 8c46398976eeec9502d544c44fab1397cd5c0616ebc2f868a2979af2be9bd2e2
                                                                  • Instruction ID: a642bd9fd3e31540a64bcb86c1ee7a33e35a20966fec9a3dbc51d7a43c3002a0
                                                                  • Opcode Fuzzy Hash: 8c46398976eeec9502d544c44fab1397cd5c0616ebc2f868a2979af2be9bd2e2
                                                                  • Instruction Fuzzy Hash: 2E2182366002199FCB24CF69DD80AE9B3F5EB48316F1054AAE94AE7251D634AE85CB18
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 471 42e45b-42e460 472 42e462-42e47a 471->472 473 42e488-42e491 472->473 474 42e47c-42e480 472->474 476 42e4a3 473->476 477 42e493-42e496 473->477 474->473 475 42e482-42e486 474->475 478 42e503-42e507 475->478 481 42e4a5-42e4b2 GetStdHandle 476->481 479 42e498-42e49d 477->479 480 42e49f-42e4a1 477->480 478->472 482 42e50d-42e510 478->482 479->481 480->481 483 42e4c1 481->483 484 42e4b4-42e4b6 481->484 486 42e4c3-42e4c5 483->486 484->483 485 42e4b8-42e4bf GetFileType 484->485 485->486 487 42e4c7-42e4d2 486->487 488 42e4e5-42e4f7 486->488 490 42e4d4-42e4d8 487->490 491 42e4da-42e4dd 487->491 488->478 489 42e4f9-42e4fc 488->489 489->478 490->478 491->478 492 42e4df-42e4e3 491->492 492->478
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 0042E4A7
                                                                  • GetFileType.KERNELBASE(00000000), ref: 0042E4B9
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: FileHandleType
                                                                  • String ID:
                                                                  • API String ID: 3000768030-0
                                                                  • Opcode ID: 7af6fe035fcbc6b33c1b3868697f75432b5b2cda1d5c96981758a79023188166
                                                                  • Instruction ID: bf0c3d8f6c50870f489a966eb101ff03e263b96e73a2d2efce2602dc8849cafc
                                                                  • Opcode Fuzzy Hash: 7af6fe035fcbc6b33c1b3868697f75432b5b2cda1d5c96981758a79023188166
                                                                  • Instruction Fuzzy Hash: 1811D53170876156DB305E3FEC9C223BA949B56334BB8072BE1B6863F1D638D8829249
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 493 42e5ad-42e5d7 494 42e642 493->494 495 42e5d9-42e5db 493->495 498 42e644-42e648 494->498 496 42e5e1-42e5e7 495->496 497 42e5dd-42e5df 495->497 499 42e603 496->499 500 42e5e9-42e5eb call 42e649 496->500 497->498 501 42e605-42e607 499->501 503 42e5f0-42e5f3 500->503 504 42e632-42e640 501->504 505 42e609-42e617 GetProcAddress 501->505 506 42e624-42e62a 503->506 507 42e5f5-42e5fb 503->507 504->494 508 42e619-42e622 call 424476 505->508 509 42e62c 505->509 506->501 507->500 510 42e5fd 507->510 508->497 509->504 510->499
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0042E60D
                                                                  • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 0042E61A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc__crt_fast_encode_pointer
                                                                  • String ID:
                                                                  • API String ID: 2279764990-0
                                                                  • Opcode ID: 895ecbd4daceb85a1fa78a8c0000885d756bebce42a087e5bb0008a8f68b76d3
                                                                  • Instruction ID: 9a42527cca74157c93b2b662ecf2c521f3f04a4b4b1034fb5120c49588a27ad5
                                                                  • Opcode Fuzzy Hash: 895ecbd4daceb85a1fa78a8c0000885d756bebce42a087e5bb0008a8f68b76d3
                                                                  • Instruction Fuzzy Hash: 9C112337B001309B9B219F2AFC4095B7395AB913287DA4222FE14EB344DB34EC01C699
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,?,?,?,0042420C,?,?,00421072,?,?,?,?,?), ref: 0042BF1C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: d7f8907da04e026d3806eaf8d9b88a51ed097e2d1aedd003814c781ed793e3e2
                                                                  • Instruction ID: 1a1a25f6de766a92b04007bf8ee2df4b717f4a7a52290d8f3656b60bb874ea65
                                                                  • Opcode Fuzzy Hash: d7f8907da04e026d3806eaf8d9b88a51ed097e2d1aedd003814c781ed793e3e2
                                                                  • Instruction Fuzzy Hash: 19E0A03130027166DA312762BD00BABB748DF513A1F92002BAD15D22D0DF58DC0289EE
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000001), ref: 004235C5
                                                                  • GetLastError.KERNEL32(OpenSCManager() FAILED. GetLastError()=), ref: 0042360D
                                                                  • ControlService.ADVAPI32(00000000,00000001,?), ref: 004236CE
                                                                  • Sleep.KERNEL32(000003E8), ref: 00423708
                                                                  • QueryServiceStatus.ADVAPI32(00000000,?), ref: 0042370F
                                                                  • DeleteService.ADVAPI32(00000000), ref: 0042373B
                                                                  • GetLastError.KERNEL32(DeleteService() FAILED. GetLastError()=), ref: 0042377C
                                                                  • GetLastError.KERNEL32 ref: 0042379E
                                                                  • GetLastError.KERNEL32 ref: 0042362B
                                                                    • Part of subcall function 004222EF: GetCurrentThreadId.KERNEL32 ref: 0042236B
                                                                  • OpenServiceW.ADVAPI32(00000000,SoundBoosterService,00010024), ref: 0042364B
                                                                  • GetLastError.KERNEL32(OpenService() FAILED. GetLastError()=), ref: 0042368D
                                                                  • GetLastError.KERNEL32 ref: 004236AF
                                                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 00423826
                                                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 0042382D
                                                                    • Part of subcall function 0042257A: InitializeCriticalSection.KERNEL32(004434B8,?,00422741), ref: 004225CE
                                                                    • Part of subcall function 0042257A: __Init_thread_footer.LIBCMT ref: 004225DF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastService$CloseHandleOpen$ControlCriticalCurrentDeleteInit_thread_footerInitializeManagerQuerySectionSleepStatusThread
                                                                  • String ID: %s failed to stop.$%s is stopped.$ was removed$%s is removed.$DeleteService failed w/err 0x%08lx$DeleteService() FAILED. GetLastError()=$OpenSCManager failed w/err 0x%08lx$OpenSCManager() FAILED. GetLastError()=$OpenService failed w/err 0x%08lx$OpenService() FAILED. GetLastError()=$Service $ServiceInstaller.cpp$SoundBoosterService$Stopping %s.$UninstallService
                                                                  • API String ID: 2287550315-30142437
                                                                  • Opcode ID: 8185f9ed72ea42d421df61c08c0acd73230d8c36c415479e0054711155859fa0
                                                                  • Instruction ID: dcceb6dfb852b6a2553c43d9706cca019d2818a6bf98ab6eb7d6208202e0fb15
                                                                  • Opcode Fuzzy Hash: 8185f9ed72ea42d421df61c08c0acd73230d8c36c415479e0054711155859fa0
                                                                  • Instruction Fuzzy Hash: 1D611471741330BBD614BB22AD4AF6E77B4AF44B15F51506FF001AB2D2CEAC9E01869D
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 004210CB
                                                                  • CreateNamedPipeW.KERNEL32(?,00000003,00000006,000000FF,00000000), ref: 0042112C
                                                                    • Part of subcall function 004211B9: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 004211F2
                                                                    • Part of subcall function 004211B9: InitializeCriticalSection.KERNEL32(?), ref: 00421223
                                                                    • Part of subcall function 004211B9: DeleteCriticalSection.KERNEL32(?,?), ref: 00421257
                                                                    • Part of subcall function 004211B9: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00421265
                                                                    • Part of subcall function 004211B9: CloseHandle.KERNEL32(00000000), ref: 00421272
                                                                    • Part of subcall function 004211B9: CloseHandle.KERNEL32(00000000), ref: 00421292
                                                                  • CreateThread.KERNEL32(00000000,00000000,004212AE,?,00000004,?), ref: 00421154
                                                                  • SetThreadPriority.KERNEL32(?,?,?,00000004,?), ref: 00421185
                                                                  • ResumeThread.KERNEL32(?,?,00000004,?), ref: 0042118E
                                                                  • CloseHandle.KERNEL32(00000000,?,00000004,?), ref: 00421199
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandleThread$CreateCriticalObjectSectionSingleWait$DeleteH_prolog3InitializeNamedPipePriorityResume
                                                                  • String ID:
                                                                  • API String ID: 3964462498-0
                                                                  • Opcode ID: 2f7ebccf6fc257abfc5702ff09b290604a4cfe863e8c283c88bca74419043919
                                                                  • Instruction ID: b8f795e358fe8b0147ac95440568100911cb9d3d2913cae2bf92c616c9ff2ca6
                                                                  • Opcode Fuzzy Hash: 2f7ebccf6fc257abfc5702ff09b290604a4cfe863e8c283c88bca74419043919
                                                                  • Instruction Fuzzy Hash: 46318F70B40216EFDB14CF64D845BBABBB4FF18310F60821AF515A72A0DB38A954CB98
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: [/C$[/C
                                                                  • API String ID: 0-3882296886
                                                                  • Opcode ID: a6a54f347a226206b0a14f449610549a00a97757e709e9f7049fcee8d88ff015
                                                                  • Instruction ID: 97e9f70a21ee6225ba37365f84004e751771d1c71ca8504840839bf9141aef55
                                                                  • Opcode Fuzzy Hash: a6a54f347a226206b0a14f449610549a00a97757e709e9f7049fcee8d88ff015
                                                                  • Instruction Fuzzy Hash: AD022D71E002199BDF14CFA9C9806AEF7F1EF49324F25916AD819E7350D735AE41CB84
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00424BC5
                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,00000017), ref: 00424C8D
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,00000017), ref: 00424CAC
                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,00000017), ref: 00424CB6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                  • String ID:
                                                                  • API String ID: 254469556-0
                                                                  • Opcode ID: b4ccfeb140c95c627b72455c7f0dae7785e36e36c0d63c13459496d11c7f5b7e
                                                                  • Instruction ID: 32757de0304f591ad0c403cd85a18b9827ab16c77d63e0515c9c598058bec0ae
                                                                  • Opcode Fuzzy Hash: b4ccfeb140c95c627b72455c7f0dae7785e36e36c0d63c13459496d11c7f5b7e
                                                                  • Instruction Fuzzy Hash: 32311AB5D0122C9BCB60DFA5D989ACDBBB8EF08304F0041EAE40CA7210EB745B85CF54
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 004227AC
                                                                    • Part of subcall function 0042257A: InitializeCriticalSection.KERNEL32(004434B8,?,00422741), ref: 004225CE
                                                                    • Part of subcall function 0042257A: __Init_thread_footer.LIBCMT ref: 004225DF
                                                                    • Part of subcall function 004222EF: GetCurrentThreadId.KERNEL32 ref: 0042236B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalCurrentH_prolog3_Init_thread_footerInitializeSectionThread
                                                                  • String ID: FAILED$ SUCCEEDED$ApoControlManager::DisableAllButSbapo$ApoControlManager::DoInstall$ApoControlManager::DoUninstall$ApoControlManager::DoValidateInstallation$ApoControlManager::PerformServiceRestart$ApoControlManager::SetEnhancementState( false )$AudioSrv$CSampleService::OnPipeMessage$SampleService.cpp$UNSUPPORTED pMsg->_type arrived
                                                                  • API String ID: 2740103817-3421508619
                                                                  • Opcode ID: e88c36707f1da7a2570ce185c9fabc537456a43e11910a5c175e4829170124db
                                                                  • Instruction ID: f7c5e41883f6093f68a850021d7ce6911ce76992af9e8fc4ac9be6983e22aa5e
                                                                  • Opcode Fuzzy Hash: e88c36707f1da7a2570ce185c9fabc537456a43e11910a5c175e4829170124db
                                                                  • Instruction Fuzzy Hash: 1AB19270781234BAD618EB62EE53FEE7360AF14B09F9040AFF101961D5CAFC9A45CA5D
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(0000000A,?), ref: 00421921
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00421928
                                                                  • GetTokenInformation.ADVAPI32(?,00000012(TokenIntegrityLevel),?,00000004,?), ref: 00421954
                                                                  • GetTokenInformation.ADVAPI32(?,00000013(TokenIntegrityLevel),?,00000004,?), ref: 0042196F
                                                                  • DuplicateToken.ADVAPI32(?,00000001,?), ref: 00421983
                                                                  • CreateWellKnownSid.ADVAPI32(0000001A,00000000,?,?), ref: 0042199F
                                                                  • CheckTokenMembership.ADVAPI32(?,?,?), ref: 004219B4
                                                                  • GetLastError.KERNEL32 ref: 004219BE
                                                                  • CloseHandle.KERNEL32(?), ref: 004219D4
                                                                  • CloseHandle.KERNEL32(?), ref: 004219E1
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00421A0A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: Token$CloseHandleInformationProcess$CheckCreateCurrentDuplicateErrorException@8KnownLastMembershipOpenThrowWell
                                                                  • String ID: D
                                                                  • API String ID: 3332473350-2746444292
                                                                  • Opcode ID: 466668856a2ac48c9d5518444b72af37e8f62f09233bff4f75f70ec2fea82857
                                                                  • Instruction ID: f3fb8697e1e92dbc00e73c8f931ed62b5a0acc675a5bac9b3018cd7bef8f7359
                                                                  • Opcode Fuzzy Hash: 466668856a2ac48c9d5518444b72af37e8f62f09233bff4f75f70ec2fea82857
                                                                  • Instruction Fuzzy Hash: 8C31FAB1E0021CABDF10DFD5DC84AAEFBBCEF14750F51412AE501AA264DB749949CF64
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0042236B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentThread
                                                                  • String ID: C$%s [%d] $ERROR$FATAL$INFO$NONE$WARNING$[%s@%s:%d] $[this=0x%p]
                                                                  • API String ID: 2882836952-3278680247
                                                                  • Opcode ID: 2f50bbcb9708fa0fea95a7c6138721d6958296081f55fcd519fb7d27cfe0241b
                                                                  • Instruction ID: b916878c4398ee977b99b6cb7a008ca45413a72e1b9efc9814f881a7a1ad88fa
                                                                  • Opcode Fuzzy Hash: 2f50bbcb9708fa0fea95a7c6138721d6958296081f55fcd519fb7d27cfe0241b
                                                                  • Instruction Fuzzy Hash: B2318471B00328BBDF10DFA5DC45BDEB7B8AB09708F50449AF508A7281DBB59E448B69
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch.LIBCMT ref: 004212B5
                                                                  • CoInitialize.OLE32(00000000), ref: 004212BD
                                                                  • ConnectNamedPipe.KERNEL32(?,00000000), ref: 004212FE
                                                                  • GetLastError.KERNEL32 ref: 0042130D
                                                                  • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 0042134A
                                                                  • GetLastError.KERNEL32 ref: 00421356
                                                                  • WriteFile.KERNEL32(00000010,00000000,00000010,?,00000000), ref: 004213B8
                                                                  • FlushFileBuffers.KERNEL32(?), ref: 004213E5
                                                                  • DisconnectNamedPipe.KERNEL32(?), ref: 004213EC
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: File$ErrorLastNamedPipe$BuffersConnectDisconnectFlushH_prolog3_catchInitializeReadWrite
                                                                  • String ID:
                                                                  • API String ID: 1267701856-0
                                                                  • Opcode ID: f6a05907e2556b43ab2d43fc36c9da7a7a5a9530089d2baecca82349b2a1cc20
                                                                  • Instruction ID: c89bf881388e54e49a979872e39da99a75e226e6b431cbfaca22a6340147772b
                                                                  • Opcode Fuzzy Hash: f6a05907e2556b43ab2d43fc36c9da7a7a5a9530089d2baecca82349b2a1cc20
                                                                  • Instruction Fuzzy Hash: 9741A471E00228DFDB14DFA5E884BAEBBB5EF19304F50406AF805E7261CB759D45CB98
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 00421DC6
                                                                  • _wcslen.LIBCMT ref: 00421DF7
                                                                  • LoadLibraryW.KERNEL32(?,?,?,?,?,?,.dll,?,?,?,?,?,00000034), ref: 00421E7E
                                                                  • GetProcAddress.KERNEL32(00000000,CreateApoControl), ref: 00421E91
                                                                  • FreeLibrary.KERNEL32(00000001,?,?,?,?,?,.dll,?,?,?,?,?,00000034), ref: 00421EA6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: Library$AddressFreeH_prolog3_LoadProc_wcslen
                                                                  • String ID: .dll$CreateApoControl
                                                                  • API String ID: 2216541711-177489213
                                                                  • Opcode ID: 0e69c6de73616ec9b74f01012fc23fb951b43dfd56966b278891796f4ded9e5a
                                                                  • Instruction ID: 17c26fc2be8f2508079759314538e174cee3f04558ed9974baeb31b607a7586b
                                                                  • Opcode Fuzzy Hash: 0e69c6de73616ec9b74f01012fc23fb951b43dfd56966b278891796f4ded9e5a
                                                                  • Instruction Fuzzy Hash: E7319270B00318DECB10DFA5DC95ADEBBF8AF18308F90142EE542E3261DB389944CB69
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,004340BF,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0043398C
                                                                  • __fassign.LIBCMT ref: 00433A07
                                                                  • __fassign.LIBCMT ref: 00433A22
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 00433A48
                                                                  • WriteFile.KERNEL32(?,FF8BC35D,00000000,004340BF,00000000,?,?,?,?,?,?,?,?,?,004340BF,?), ref: 00433A67
                                                                  • WriteFile.KERNEL32(?,?,00000001,004340BF,00000000,?,?,?,?,?,?,?,?,?,004340BF,?), ref: 00433AA0
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                  • String ID:
                                                                  • API String ID: 1324828854-0
                                                                  • Opcode ID: b9fe0edc13dfbcd7675cb06be2027e392c7ed1bdd01b1c952ce4ee93a481a5c0
                                                                  • Instruction ID: f5dd2f5e5865f9159951d6c1192969091a234884880df6d089b90398d3e01f7a
                                                                  • Opcode Fuzzy Hash: b9fe0edc13dfbcd7675cb06be2027e392c7ed1bdd01b1c952ce4ee93a481a5c0
                                                                  • Instruction Fuzzy Hash: 4A51D170A002499FCF10DFA8D895AEEBBF4EF09301F14416BE991E7291E7349A41CB68
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RegisterEventSourceW.ADVAPI32(00000000,?), ref: 004230A9
                                                                  • ReportEventW.ADVAPI32(00000000,00000001,00000000,00000000,00000000,00000002,00000000,?,00000000), ref: 004230D7
                                                                  • DeregisterEventSource.ADVAPI32(00000000), ref: 004230DE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: Event$Source$DeregisterRegisterReport
                                                                  • String ID: CServiceBase::WriteEventLogEntry$Service error: $ServiceBase.cpp
                                                                  • API String ID: 3235303502-3086274369
                                                                  • Opcode ID: 64561bbd3c8c270019dd31c5a6cc2cbef6ffd8af09f955310ee0d542a3cd3c4a
                                                                  • Instruction ID: 7754155dc76dc286bde2a7ec50a76c9f7c59797bb2d3d14b9eb2e659048a9bc9
                                                                  • Opcode Fuzzy Hash: 64561bbd3c8c270019dd31c5a6cc2cbef6ffd8af09f955310ee0d542a3cd3c4a
                                                                  • Instruction Fuzzy Hash: 7C218A70B01224BBD718AF21DD46EAAB778EF48704F4045AEB50597281DAF89D41CB98
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 004211F2
                                                                  • InitializeCriticalSection.KERNEL32(?), ref: 00421223
                                                                    • Part of subcall function 004214CE: EnterCriticalSection.KERNEL32(?,?,?,00421250,?), ref: 004214D6
                                                                    • Part of subcall function 004214CE: CloseHandle.KERNEL32(?,?,?,00421250,?), ref: 004214E3
                                                                    • Part of subcall function 004214CE: LeaveCriticalSection.KERNEL32(?,?,?,00421250,?), ref: 004214ED
                                                                  • DeleteCriticalSection.KERNEL32(?,?), ref: 00421257
                                                                  • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00421265
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00421272
                                                                  • TerminateThread.KERNEL32(00000000,00000001), ref: 0042127F
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00421292
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$CloseHandle$ObjectSingleWait$DeleteEnterInitializeLeaveTerminateThread
                                                                  • String ID:
                                                                  • API String ID: 499989784-0
                                                                  • Opcode ID: fb69e41c9e8634cbd39b26acdf0a489d37e9a07240eac5792df3700fe889f731
                                                                  • Instruction ID: 6b7ad0619010e90e92185e7ff9b3420749a635802a4f6dce68723ba512c18cdd
                                                                  • Opcode Fuzzy Hash: fb69e41c9e8634cbd39b26acdf0a489d37e9a07240eac5792df3700fe889f731
                                                                  • Instruction Fuzzy Hash: ED217430A00714DFDB359B20EC09B9AB7B5AF18311F5185AEF19AA11A1DBB8A584CB58
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00429D0F,00429D0F,?,?,?,0043183A,00000001,00000001,63E85006), ref: 00431643
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0043183A,00000001,00000001,63E85006,?,?,?), ref: 004316C9
                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,63E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 004317C3
                                                                  • __freea.LIBCMT ref: 004317D0
                                                                    • Part of subcall function 0042BEEA: RtlAllocateHeap.NTDLL(00000000,?,?,?,0042420C,?,?,00421072,?,?,?,?,?), ref: 0042BF1C
                                                                  • __freea.LIBCMT ref: 004317D9
                                                                  • __freea.LIBCMT ref: 004317FE
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1414292761-0
                                                                  • Opcode ID: aa8b1a81316c297ede1b44945df34707c74bab78bbfca113d02ecf28fe4feaba
                                                                  • Instruction ID: ff78e13e3b017aa973e0d29ae6c9845566ebcbdee6a272cf76a6b67da290c31c
                                                                  • Opcode Fuzzy Hash: aa8b1a81316c297ede1b44945df34707c74bab78bbfca113d02ecf28fe4feaba
                                                                  • Instruction Fuzzy Hash: 27510572600216AFDB259F65CC41EBB77AAEB48754F18522FFC04D62A0EB38DC40C668
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,004276AF,00425C18,00440018,00000010,004253E0,?,?,?,?,?,00000000,?), ref: 004276C6
                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004276D4
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004276ED
                                                                  • SetLastError.KERNEL32(00000000,004276AF,00425C18,00440018,00000010,004253E0,?,?,?,?,?,00000000,?), ref: 0042773F
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastValue___vcrt_
                                                                  • String ID:
                                                                  • API String ID: 3852720340-0
                                                                  • Opcode ID: 8504999eec56c6c32d6c7bce14f39f87264a9589268a443a2c201af543cd0deb
                                                                  • Instruction ID: 617437f005dbc73f85f9874a1ca7100ec5e4a372d68ea0086ca3fe16a1ae6468
                                                                  • Opcode Fuzzy Hash: 8504999eec56c6c32d6c7bce14f39f87264a9589268a443a2c201af543cd0deb
                                                                  • Instruction Fuzzy Hash: 0801D83631E7315E962417B57C85A5B6B95EB527B87E0023FFA10851E0EF995C02D28C
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000008,?,74DF2EE0,00000000), ref: 00421ABF
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00421AC6
                                                                  • GetLastError.KERNEL32 ref: 00421AD0
                                                                  • GetTokenInformation.ADVAPI32(?,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00421AE9
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00421AFF
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00421B21
                                                                    • Part of subcall function 00426D38: RaiseException.KERNEL32(?,?,?,0042418E,?,?,?,?,?,?,?,?,0042418E,?,0043FED4), ref: 00426D97
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: ProcessToken$CloseCurrentErrorExceptionException@8HandleInformationLastOpenRaiseThrow
                                                                  • String ID:
                                                                  • API String ID: 661555004-0
                                                                  • Opcode ID: 12be04353e92c51b639fe7689c46e97adbfc7c8c7356e231f4e030e8b106bbfc
                                                                  • Instruction ID: acce4bc698f2aa52061ed954f4d1f3eeece6dfe17a7b847596981afb8bcc7d5e
                                                                  • Opcode Fuzzy Hash: 12be04353e92c51b639fe7689c46e97adbfc7c8c7356e231f4e030e8b106bbfc
                                                                  • Instruction Fuzzy Hash: 69015231A0021CFBDB10DB95DD09BEFBB78EB54711F51446AF905E2160DB749E08DBA4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0042AEE1,00000000,?,0042AE81,00000000,00440198,0000000C,0042AF94,00000000,00000002), ref: 0042AF0C
                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0042AF1F
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,0042AEE1,00000000,?,0042AE81,00000000,00440198,0000000C,0042AF94,00000000,00000002), ref: 0042AF42
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                  • API String ID: 4061214504-1276376045
                                                                  • Opcode ID: d716e20e8d776330256e00ad3ea9714eefbd1ad14a8f61f6165e15d2817f44f3
                                                                  • Instruction ID: f64bc9f5cef64fd5acdbfc698af674aeb5f18e170fcff7b395dbcc1402f2ae41
                                                                  • Opcode Fuzzy Hash: d716e20e8d776330256e00ad3ea9714eefbd1ad14a8f61f6165e15d2817f44f3
                                                                  • Instruction Fuzzy Hash: 4AF0AF30A10218BBCB049FA0EC49BAEFFB4EF04705F410069F905A22A0CF788E54CA99
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 00421452
                                                                  • GetLastError.KERNEL32 ref: 0042145F
                                                                  • WaitNamedPipeW.KERNEL32(?,00001388), ref: 0042147E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: CreateErrorFileLastNamedPipeWait
                                                                  • String ID:
                                                                  • API String ID: 2892787455-0
                                                                  • Opcode ID: a2e0cf7130ee5700a8771b7ed7ed6dafcbe4883e2bb79156cf589db1d70f3639
                                                                  • Instruction ID: c1cb48c6401c5703f9c1b2615cf9daf8affa6768140eef514d738b668d83d7d5
                                                                  • Opcode Fuzzy Hash: a2e0cf7130ee5700a8771b7ed7ed6dafcbe4883e2bb79156cf589db1d70f3639
                                                                  • Instruction Fuzzy Hash: 4211A530301221ABD7246F55EC48F67BB68EF62371FA04626F11DCA1F0C7349945C6A9
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00421A4C
                                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00421A5E
                                                                  • GetLastError.KERNEL32 ref: 00421A68
                                                                  • FreeSid.ADVAPI32(?), ref: 00421A78
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00421AA4
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateCheckErrorException@8FreeInitializeLastMembershipThrowToken
                                                                  • String ID:
                                                                  • API String ID: 649603114-0
                                                                  • Opcode ID: 25bc4991966cb4da5370f9d20499df20619b416c1d6972a643d0bb1517c1bff1
                                                                  • Instruction ID: bd9abf1c43f0db84f04d785b760b4b7d737182fa6601e7a8bef91e3bb4b1f26a
                                                                  • Opcode Fuzzy Hash: 25bc4991966cb4da5370f9d20499df20619b416c1d6972a643d0bb1517c1bff1
                                                                  • Instruction Fuzzy Hash: 42110A70E4132DABDB10DFA5DC85ABFB7B8FF08340F91096EA901A2251D7349E048BA4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$H_prolog3
                                                                  • String ID: ApoControl
                                                                  • API String ID: 1035939448-3566256003
                                                                  • Opcode ID: d4b8a30b53e1b46737a72ab052141d8ce57b21b47e3544626fcdcaa9824cba18
                                                                  • Instruction ID: b55a0444aaeade15d30f4fe88f0df0fecbc08836e778a3eb263b94e4ff8ec55f
                                                                  • Opcode Fuzzy Hash: d4b8a30b53e1b46737a72ab052141d8ce57b21b47e3544626fcdcaa9824cba18
                                                                  • Instruction Fuzzy Hash: 72119D70704721EBDB399F1AB90162EB2E0BF48704F90061FF1969B281CFB89900C79E
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)(A;OICI;GA;;;WD)(A;OICI;GA;;;SY)S:(ML;;NWNR;;;LW),00000001,?,00000000), ref: 004217E5
                                                                  • LocalAlloc.KERNEL32(00000040,0000000C), ref: 004217F8
                                                                  • LocalFree.KERNEL32(?), ref: 00421807
                                                                  Strings
                                                                  • D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)(A;OICI;GA;;;WD)(A;OICI;GA;;;SY)S:(ML;;NWNR;;;LW), xrefs: 004217DE
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: DescriptorLocalSecurity$AllocConvertFreeString
                                                                  • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)(A;OICI;GA;;;WD)(A;OICI;GA;;;SY)S:(ML;;NWNR;;;LW)
                                                                  • API String ID: 721943950-2020678050
                                                                  • Opcode ID: 216598cf89011a69ad4775ab5eefc486aa2f6522bd405a8d3814522680867617
                                                                  • Instruction ID: d037e39d1395a3cf91fd0ed26ae4ebff2d7c46cd66399ede4eedeac0c5083601
                                                                  • Opcode Fuzzy Hash: 216598cf89011a69ad4775ab5eefc486aa2f6522bd405a8d3814522680867617
                                                                  • Instruction Fuzzy Hash: DD016970A00204EFD7209F5AEC45A9ABBF8EB98711F20406AF644D7260DB758E00CB95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0042D129,?,00000000,?,00000001,?,?,00000001,0042D129,?), ref: 00430ADA
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00430B63
                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0042C049,?), ref: 00430B75
                                                                  • __freea.LIBCMT ref: 00430B7E
                                                                    • Part of subcall function 0042BEEA: RtlAllocateHeap.NTDLL(00000000,?,?,?,0042420C,?,?,00421072,?,?,?,?,?), ref: 0042BF1C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                  • String ID:
                                                                  • API String ID: 2652629310-0
                                                                  • Opcode ID: 51f90295641777fc7bf81a4121d6523d01cc64f80a0e6016d67cedc4767759bb
                                                                  • Instruction ID: 1e0eef91d93f9656ea72a8687ab877c6e31b43374ddfb14dfb32dae50336a9c9
                                                                  • Opcode Fuzzy Hash: 51f90295641777fc7bf81a4121d6523d01cc64f80a0e6016d67cedc4767759bb
                                                                  • Instruction Fuzzy Hash: 6D31F231A0021AABDF249FA5DC55DAFBBA5EF04754F14026EFC04D6250EB39DD50CB94
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • NetWkstaGetInfo.NETAPI32(00000000,00000064,?), ref: 00421C49
                                                                  • NetApiBufferFree.NETAPI32(?), ref: 00421C6F
                                                                  • GetVersionExW.KERNEL32(?), ref: 00421CA3
                                                                  • GetVersionExW.KERNEL32(?), ref: 00421CBA
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: Version$BufferFreeInfoWksta
                                                                  • String ID:
                                                                  • API String ID: 4063530079-0
                                                                  • Opcode ID: 6c7ad0ebfc155b87e3e613511bd2e4b6b874ca557a0e3fe26bd9e59b45ceff6d
                                                                  • Instruction ID: c8fce7e73c2ede96e989cd25ae7aac8f881e081063bd267b091344a153442147
                                                                  • Opcode Fuzzy Hash: 6c7ad0ebfc155b87e3e613511bd2e4b6b874ca557a0e3fe26bd9e59b45ceff6d
                                                                  • Instruction Fuzzy Hash: A32190B4A412299BDB24CF25EC45AEAB7F8EF19300F0041AAE88893341DB349D958F58
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RegisterServiceCtrlHandlerW.ADVAPI32(?,00422D5C), ref: 00422D2B
                                                                  • GetLastError.KERNEL32 ref: 00422D44
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00422D56
                                                                  • __EH_prolog3_catch.LIBCMT ref: 00422DBF
                                                                    • Part of subcall function 0042303B: SetServiceStatus.ADVAPI32(?,00000008,00000000,?,00422E73,00000003,00000000,?,00000010,00422D91,?,?,004404E8), ref: 00423071
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: Service$CtrlErrorException@8H_prolog3_catchHandlerLastRegisterStatusThrow
                                                                  • String ID:
                                                                  • API String ID: 2422132020-0
                                                                  • Opcode ID: 843230865130b1758cb08a42f04c3855b76ffb00a65533eda15f6848e1f5a5e9
                                                                  • Instruction ID: c0bfe754b1e6414d915d23d2ce18d574eaa32e18d60f19373ab6e9037b60b6ba
                                                                  • Opcode Fuzzy Hash: 843230865130b1758cb08a42f04c3855b76ffb00a65533eda15f6848e1f5a5e9
                                                                  • Instruction Fuzzy Hash: AE11CB75350238BBC7157F75EA0AB5E7764AB04714F90801BF9049A261CAFDE910CB9D
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00000000,004286FE,00000000,?,?,00427FCC,?,?,00000000,?), ref: 0042CCFC
                                                                  • SetLastError.KERNEL32(00000000,?,00000000,?), ref: 0042CD64
                                                                  • SetLastError.KERNEL32(00000000,?,00000000,?), ref: 0042CD70
                                                                  • _abort.LIBCMT ref: 0042CD76
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_abort
                                                                  • String ID:
                                                                  • API String ID: 88804580-0
                                                                  • Opcode ID: 97dd0cd04af81905f4a8a391fd2f94861b66d72eeb5b014dccdd0101e36845e9
                                                                  • Instruction ID: 0311df96161d0f1259d75d24439b37101f1d5a2e14a6f4af20960dc803a9e100
                                                                  • Opcode Fuzzy Hash: 97dd0cd04af81905f4a8a391fd2f94861b66d72eeb5b014dccdd0101e36845e9
                                                                  • Instruction Fuzzy Hash: 4FF0F43535073066C62173367C86B5F2A25BFD1B65BF6003FF519D2292EF6C8802826D
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 004253B2
                                                                    • Part of subcall function 004259EA: ___AdjustPointer.LIBCMT ref: 00425A34
                                                                  • _UnwindNestedFrames.LIBCMT ref: 004253C9
                                                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 004253DB
                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 004253FF
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                  • String ID:
                                                                  • API String ID: 2633735394-0
                                                                  • Opcode ID: 54b0f0e85253aa2a5c9de8230e62bb8d24938287cf0a56048926d1befe32cf8e
                                                                  • Instruction ID: 6acf9aabb5953d71535dd97e081fcd71cf48bece3612b21e43eed73d3da85998
                                                                  • Opcode Fuzzy Hash: 54b0f0e85253aa2a5c9de8230e62bb8d24938287cf0a56048926d1befe32cf8e
                                                                  • Instruction Fuzzy Hash: 17011B32100518BBCF129F55EC01EDA3B7AEF48754F45411AFD1865121C379E861DB98
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 0042743A
                                                                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 0042743F
                                                                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00427444
                                                                    • Part of subcall function 00427809: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0042781A
                                                                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00427459
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                  • String ID:
                                                                  • API String ID: 1761009282-0
                                                                  • Opcode ID: ce1cdf7930b48ae68be519fc1ea1a2c227568179ca5103236147d1cf4e4448ca
                                                                  • Instruction ID: c751c21b06b43e7cac0f973c7fc6a7ec1ae2a02cab53fee57c13543189f84d84
                                                                  • Opcode Fuzzy Hash: ce1cdf7930b48ae68be519fc1ea1a2c227568179ca5103236147d1cf4e4448ca
                                                                  • Instruction Fuzzy Hash: D9C0022838D231905C51367336265AE0B540CB238DBD1308BAC5416613990D240AE53F
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0042E3EB), ref: 0042E8DE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: CountCriticalInitializeSectionSpin
                                                                  • String ID: InitializeCriticalSectionEx$B
                                                                  • API String ID: 2593887523-1832561193
                                                                  • Opcode ID: c0bea35fddc594a666887c600788a009d799a2ecab84f50ee8dbbf21989c1ba8
                                                                  • Instruction ID: dc6ab413cc83d89cb03780dc0a9ea2df92bc6865775054c7b00df3f6b6f600c0
                                                                  • Opcode Fuzzy Hash: c0bea35fddc594a666887c600788a009d799a2ecab84f50ee8dbbf21989c1ba8
                                                                  • Instruction Fuzzy Hash: 1CF09031641228BBCF016F51EC099AEBF61EF58714B40812AF80556261DA758921AB99
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • InitializeCriticalSection.KERNEL32(004434B8,?,00422741), ref: 004225CE
                                                                  • __Init_thread_footer.LIBCMT ref: 004225DF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000D.00000002.2045339729.0000000000421000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00420000, based on PE: true
                                                                  • Associated: 0000000D.00000002.2045317208.0000000000420000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045367882.0000000000438000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045397147.0000000000442000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045418393.0000000000444000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  • Associated: 0000000D.00000002.2045438861.0000000000446000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_13_2_420000_SoundBoosterService.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalInit_thread_footerInitializeSection
                                                                  • String ID: `C
                                                                  • API String ID: 2684443898-2712709324
                                                                  • Opcode ID: 05b87ccece6784ef23f2177df0e6ffae8588463b3b35eab1e71794f330733ffb
                                                                  • Instruction ID: 8063a8facf275a768fce8a8b379f42f97c687b3170089ab3c209be3e6b40bc7e
                                                                  • Opcode Fuzzy Hash: 05b87ccece6784ef23f2177df0e6ffae8588463b3b35eab1e71794f330733ffb
                                                                  • Instruction Fuzzy Hash: 37F03039705630BEC312DF28BD059C573A4A70AB2B7A081BBE502C72A1D77C56458B9D
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Execution Graph

                                                                  Execution Coverage:4.3%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:2.6%
                                                                  Total number of Nodes:1972
                                                                  Total number of Limit Nodes:92
                                                                  execution_graph 70308 6c47d723 70309 6c47d730 70308->70309 70313 6c47d748 70308->70313 70370 6c46a399 14 API calls __dosmaperr 70309->70370 70311 6c47d735 70371 6c469d5e 25 API calls _memcpy_s 70311->70371 70314 6c47d740 70313->70314 70315 6c47d7a7 70313->70315 70328 6c47e245 70313->70328 70333 6c478a57 70315->70333 70318 6c47d7bf 70340 6c47ea07 70318->70340 70321 6c478a57 __fread_nolock 25 API calls 70322 6c47d7f3 70321->70322 70322->70314 70323 6c478a57 __fread_nolock 25 API calls 70322->70323 70324 6c47d801 70323->70324 70324->70314 70325 6c478a57 __fread_nolock 25 API calls 70324->70325 70326 6c47d811 70325->70326 70327 6c478a57 __fread_nolock 25 API calls 70326->70327 70327->70314 70372 6c478ec0 70328->70372 70332 6c47e26c 70332->70315 70334 6c478a63 70333->70334 70335 6c478a78 70333->70335 70388 6c46a399 14 API calls __dosmaperr 70334->70388 70335->70318 70337 6c478a68 70389 6c469d5e 25 API calls _memcpy_s 70337->70389 70339 6c478a73 70339->70318 70341 6c47ea13 ___unDNameEx 70340->70341 70342 6c47ea33 70341->70342 70343 6c47ea1b 70341->70343 70345 6c47eaf0 70342->70345 70348 6c47ea69 70342->70348 70456 6c46a386 14 API calls __dosmaperr 70343->70456 70463 6c46a386 14 API calls __dosmaperr 70345->70463 70347 6c47ea20 70457 6c46a399 14 API calls __dosmaperr 70347->70457 70351 6c47ea87 70348->70351 70352 6c47ea72 70348->70352 70349 6c47eaf5 70464 6c46a399 14 API calls __dosmaperr 70349->70464 70390 6c47f7af EnterCriticalSection 70351->70390 70458 6c46a386 14 API calls __dosmaperr 70352->70458 70356 6c47ea7f 70465 6c469d5e 25 API calls _memcpy_s 70356->70465 70357 6c47ea77 70459 6c46a399 14 API calls __dosmaperr 70357->70459 70358 6c47ea8d 70360 6c47eabe 70358->70360 70361 6c47eaa9 70358->70361 70391 6c47eb1b 70360->70391 70460 6c46a399 14 API calls __dosmaperr 70361->70460 70365 6c47eab9 70462 6c47eae8 LeaveCriticalSection __wsopen_s 70365->70462 70366 6c47eaae 70461 6c46a386 14 API calls __dosmaperr 70366->70461 70369 6c47d7c6 70369->70314 70369->70321 70370->70311 70371->70314 70377 6c478ecd _strftime 70372->70377 70373 6c478f0d 70386 6c46a399 14 API calls __dosmaperr 70373->70386 70374 6c478ef8 RtlAllocateHeap 70376 6c478f0b 70374->70376 70374->70377 70379 6c47a768 70376->70379 70377->70373 70377->70374 70385 6c474832 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 70377->70385 70380 6c47a773 HeapFree 70379->70380 70381 6c47a79c _free 70379->70381 70380->70381 70382 6c47a788 70380->70382 70381->70332 70387 6c46a399 14 API calls __dosmaperr 70382->70387 70384 6c47a78e GetLastError 70384->70381 70385->70377 70386->70376 70387->70384 70388->70337 70389->70339 70390->70358 70392 6c47eb45 70391->70392 70393 6c47eb2d 70391->70393 70395 6c47eeac 70392->70395 70398 6c47eb85 70392->70398 70475 6c46a386 14 API calls __dosmaperr 70393->70475 70491 6c46a386 14 API calls __dosmaperr 70395->70491 70396 6c47eb32 70476 6c46a399 14 API calls __dosmaperr 70396->70476 70401 6c47eb90 70398->70401 70402 6c47eb3a 70398->70402 70409 6c47ebbf 70398->70409 70400 6c47eeb1 70492 6c46a399 14 API calls __dosmaperr 70400->70492 70477 6c46a386 14 API calls __dosmaperr 70401->70477 70402->70365 70404 6c47eb9d 70493 6c469d5e 25 API calls _memcpy_s 70404->70493 70406 6c47eb95 70478 6c46a399 14 API calls __dosmaperr 70406->70478 70410 6c47ebd8 70409->70410 70411 6c47ebf3 70409->70411 70412 6c47ec2f 70409->70412 70410->70411 70415 6c47ebdd 70410->70415 70479 6c46a386 14 API calls __dosmaperr 70411->70479 70482 6c47aafd 15 API calls 3 library calls 70412->70482 70414 6c47ebf8 70480 6c46a399 14 API calls __dosmaperr 70414->70480 70466 6c483fdc 70415->70466 70419 6c47ec46 70422 6c47a768 _free 14 API calls 70419->70422 70420 6c47ebff 70481 6c469d5e 25 API calls _memcpy_s 70420->70481 70421 6c47ed86 70424 6c47edfc 70421->70424 70427 6c47ed9f GetConsoleMode 70421->70427 70425 6c47ec4f 70422->70425 70426 6c47ee00 ReadFile 70424->70426 70428 6c47a768 _free 14 API calls 70425->70428 70429 6c47ee74 GetLastError 70426->70429 70430 6c47ee1a 70426->70430 70427->70424 70431 6c47edb0 70427->70431 70432 6c47ec56 70428->70432 70435 6c47ee81 70429->70435 70436 6c47edd8 70429->70436 70430->70429 70437 6c47edf1 70430->70437 70431->70426 70438 6c47edb6 ReadConsoleW 70431->70438 70433 6c47ec60 70432->70433 70434 6c47ec7b 70432->70434 70483 6c46a399 14 API calls __dosmaperr 70433->70483 70485 6c47f06e 27 API calls __wsopen_s 70434->70485 70489 6c46a399 14 API calls __dosmaperr 70435->70489 70454 6c47ec0a __fread_nolock 70436->70454 70486 6c46a363 14 API calls 2 library calls 70436->70486 70449 6c47ee56 70437->70449 70450 6c47ee3f 70437->70450 70437->70454 70438->70437 70442 6c47edd2 GetLastError 70438->70442 70442->70436 70443 6c47a768 _free 14 API calls 70443->70402 70444 6c47ec65 70484 6c46a386 14 API calls __dosmaperr 70444->70484 70445 6c47ee86 70490 6c46a386 14 API calls __dosmaperr 70445->70490 70452 6c47ee6d 70449->70452 70449->70454 70487 6c47e835 30 API calls 5 library calls 70450->70487 70488 6c47e686 28 API calls __wsopen_s 70452->70488 70454->70443 70455 6c47ee72 70455->70454 70456->70347 70457->70369 70458->70357 70459->70356 70460->70366 70461->70365 70462->70369 70463->70349 70464->70356 70465->70369 70467 6c483fe9 70466->70467 70468 6c483ff6 70466->70468 70494 6c46a399 14 API calls __dosmaperr 70467->70494 70470 6c484002 70468->70470 70495 6c46a399 14 API calls __dosmaperr 70468->70495 70470->70421 70472 6c483fee 70472->70421 70473 6c484023 70496 6c469d5e 25 API calls _memcpy_s 70473->70496 70475->70396 70476->70402 70477->70406 70478->70404 70479->70414 70480->70420 70481->70454 70482->70419 70483->70444 70484->70454 70485->70415 70486->70454 70487->70454 70488->70455 70489->70445 70490->70454 70491->70400 70492->70404 70493->70402 70494->70472 70495->70473 70496->70472 70497 6c46eae1 70499 6c46eaed ___unDNameEx 70497->70499 70498 6c46eaf4 70522 6c46a399 14 API calls __dosmaperr 70498->70522 70499->70498 70501 6c46eb16 70499->70501 70504 6c46eb1b 70501->70504 70505 6c46eb28 70501->70505 70502 6c46eaf9 70523 6c469d5e 25 API calls _memcpy_s 70502->70523 70524 6c46a399 14 API calls __dosmaperr 70504->70524 70514 6c47a957 70505->70514 70508 6c46eb04 70510 6c46eb37 70525 6c46a399 14 API calls __dosmaperr 70510->70525 70511 6c46eb44 70526 6c46eb80 LeaveCriticalSection __fread_nolock 70511->70526 70515 6c47a963 ___unDNameEx 70514->70515 70527 6c470f97 EnterCriticalSection 70515->70527 70517 6c47a971 70528 6c47a9fb 70517->70528 70522->70502 70523->70508 70524->70508 70525->70508 70526->70508 70527->70517 70537 6c47aa1e 70528->70537 70529 6c47aa76 70531 6c478ec0 __dosmaperr 14 API calls 70529->70531 70530 6c47a97e 70541 6c47a9b7 70530->70541 70532 6c47aa7f 70531->70532 70534 6c47a768 _free 14 API calls 70532->70534 70535 6c47aa88 70534->70535 70535->70530 70546 6c47df3e 6 API calls std::_Lockit::_Lockit 70535->70546 70537->70529 70537->70530 70544 6c46a04e EnterCriticalSection 70537->70544 70545 6c46a062 LeaveCriticalSection 70537->70545 70538 6c47aaa7 70547 6c46a04e EnterCriticalSection 70538->70547 70548 6c470fdf LeaveCriticalSection 70541->70548 70543 6c46eb31 70543->70510 70543->70511 70544->70537 70545->70537 70546->70538 70547->70530 70548->70543 70549 6c403808 70550 6c403814 __EH_prolog3_GS 70549->70550 70565 6c40379f 70550->70565 70555 6c40383a _memcpy_s 70557 6c403864 70555->70557 70580 6c3e3ec2 70555->70580 70563 6c403868 70557->70563 70649 6c405f01 69 API calls CatchGuardHandler 70557->70649 70560 6c403882 70560->70563 70650 6c3efb4a 373 API calls 2 library calls 70560->70650 70651 6c3e2dde 70563->70651 70564 6c403825 70657 6c4334b6 70564->70657 70566 6c4037ab __EH_prolog3_GS 70565->70566 70567 6c3f9da9 30 API calls 70566->70567 70568 6c4037ba 70567->70568 70569 6c3e2dde 30 API calls 70568->70569 70570 6c4037fb 70569->70570 70571 6c4334b6 std::_String_base::_Xlen 5 API calls 70570->70571 70572 6c403802 70571->70572 70572->70564 70573 6c3f9da9 70572->70573 70574 6c3f9e0b 70573->70574 70575 6c3f9dc2 70573->70575 70574->70555 70575->70574 70576 6c3f9ddf 70575->70576 70660 6c3e2e0a 29 API calls 70576->70660 70578 6c3f9de8 WaitForSingleObjectEx 70579 6c3f9de6 70578->70579 70579->70574 70579->70578 70581 6c3e3f03 _memcpy_s 70580->70581 70661 6c3f31fb AllocateAndInitializeSid 70581->70661 70583 6c3e3f11 _memcpy_s 70668 6c3fbdef 70583->70668 70590 6c3e424b 70746 6c3f32d3 FreeSid LocalFree LocalFree 70590->70746 70591 6c3e3f63 SHGetFolderPathW 70591->70590 70593 6c3e3f80 70591->70593 70699 6c3e9187 70593->70699 70600 6c3e3fd3 70706 6c3eaaa2 70600->70706 70603 6c3eaaa2 27 API calls 70604 6c3e3ff3 70603->70604 70605 6c3e9187 27 API calls 70604->70605 70606 6c3e4004 70605->70606 70710 6c3ec0a9 70606->70710 70610 6c3e4073 70721 6c3eaac7 70610->70721 70615 6c3eaa01 25 API calls 70616 6c3e40b3 70615->70616 70617 6c3e9187 27 API calls 70616->70617 70618 6c3e40c4 70617->70618 70619 6c3ec0a9 27 API calls 70618->70619 70620 6c3e4126 70619->70620 70621 6c3ed4c2 27 API calls 70620->70621 70622 6c3e4135 70621->70622 70623 6c3eaac7 25 API calls 70622->70623 70624 6c3e415f 70623->70624 70625 6c3eaa01 25 API calls 70624->70625 70626 6c3e416a 70625->70626 70627 6c3eaa01 25 API calls 70626->70627 70628 6c3e4175 70627->70628 70728 6c3f3474 70628->70728 70631 6c3e424f 70632 6c3eaa01 25 API calls 70631->70632 70634 6c3e425a 70632->70634 70633 6c3f3474 20 API calls 70635 6c3e421b 70633->70635 70636 6c3eaa01 25 API calls 70634->70636 70635->70631 70637 6c3e421f 70635->70637 70638 6c3e4265 70636->70638 70639 6c3eaa01 25 API calls 70637->70639 70640 6c3eaa01 25 API calls 70638->70640 70641 6c3e422a 70639->70641 70642 6c3e4270 70640->70642 70643 6c3eaa01 25 API calls 70641->70643 70644 6c3eaa01 25 API calls 70642->70644 70645 6c3e4235 70643->70645 70644->70590 70646 6c3eaa01 25 API calls 70645->70646 70647 6c3e4240 70646->70647 70648 6c3eaa01 25 API calls 70647->70648 70648->70590 70649->70560 70650->70563 70652 6c3e2e08 70651->70652 70653 6c3e2df1 70651->70653 70652->70564 70653->70652 70654 6c3e2dfc 70653->70654 70779 6c3e2e0a 29 API calls 70654->70779 70656 6c3e2e01 SetEvent 70656->70652 70658 6c432871 CatchGuardHandler 5 API calls 70657->70658 70659 6c4334c1 70658->70659 70659->70659 70660->70579 70662 6c3f32cc 70661->70662 70663 6c3f3250 SetEntriesInAclW 70661->70663 70662->70583 70663->70662 70664 6c3f3288 LocalAlloc 70663->70664 70664->70662 70665 6c3f3299 InitializeSecurityDescriptor 70664->70665 70665->70662 70666 6c3f32a6 SetSecurityDescriptorDacl 70665->70666 70666->70662 70667 6c3f32b8 70666->70667 70667->70662 70669 6c3fbe2b 70668->70669 70670 6c3fbe2f 70669->70670 70671 6c3fbe44 70669->70671 70672 6c3eaa01 25 API calls 70670->70672 70673 6c3f3474 20 API calls 70671->70673 70674 6c3fbe37 70672->70674 70675 6c3fbe79 70673->70675 70676 6c3eaa01 25 API calls 70674->70676 70677 6c3eaa01 25 API calls 70675->70677 70680 6c3fbe3f 70676->70680 70678 6c3fbe83 70677->70678 70679 6c3eaa01 25 API calls 70678->70679 70679->70680 70747 6c432871 70680->70747 70682 6c3e3f43 70683 6c3fbb2f 70682->70683 70688 6c3fbb4d std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 70683->70688 70684 6c3fbb84 70690 6c3fbb90 _memcpy_s 70684->70690 70756 6c3fcb71 25 API calls 70684->70756 70686 6c432871 CatchGuardHandler 5 API calls 70689 6c3e3f50 70686->70689 70688->70684 70755 6c3fbab6 14 API calls std::locale::_Locimp::~_Locimp 70688->70755 70691 6c3e7d36 70689->70691 70690->70686 70696 6c3e7d46 70691->70696 70697 6c3e7d8a 70691->70697 70692 6c3e3f5b 70692->70590 70692->70591 70693 6c3e7d7c 70693->70697 70757 6c46a612 14 API calls _free 70693->70757 70696->70693 70698 6c3eaa01 25 API calls 70696->70698 70697->70692 70758 6c46a612 14 API calls _free 70697->70758 70698->70696 70759 6c3eaa2f 70699->70759 70702 6c3eaa54 70703 6c3eaa8d 70702->70703 70705 6c3eaa62 _Yarn 70702->70705 70763 6c3ec8a3 27 API calls 2 library calls 70703->70763 70705->70600 70707 6c3eaaaa 70706->70707 70707->70707 70764 6c3ebb93 70707->70764 70709 6c3e3fe3 70709->70603 70711 6c3ec0e4 70710->70711 70712 6c3ec0c3 70710->70712 70773 6c3e1744 27 API calls std::_Xinvalid_argument 70711->70773 70769 6c3ed4dc 70712->70769 70714 6c3ec0e9 70716 6c3e4064 70717 6c3ed4c2 70716->70717 70718 6c3ed4ce 70717->70718 70719 6c3ebb93 27 API calls 70718->70719 70720 6c3ed4d9 70719->70720 70720->70610 70722 6c3eaa01 25 API calls 70721->70722 70723 6c3e409d 70722->70723 70724 6c3eaa01 70723->70724 70725 6c3eaa0c 70724->70725 70726 6c3e40a8 70724->70726 70775 6c3ec7dd 25 API calls 3 library calls 70725->70775 70726->70615 70729 6c3f3520 70728->70729 70731 6c3f3493 _memcpy_s 70728->70731 70730 6c432871 CatchGuardHandler 5 API calls 70729->70730 70732 6c3e41c4 70730->70732 70733 6c3f34cc CreateDirectoryW 70731->70733 70734 6c3f34b4 70731->70734 70732->70631 70732->70633 70736 6c3f34dd GetLastError 70733->70736 70737 6c3f34ea SetFileAttributesW 70733->70737 70776 6c3f334b 15 API calls CatchGuardHandler 70734->70776 70736->70729 70736->70737 70739 6c3f3501 70737->70739 70738 6c3f34c3 70738->70737 70740 6c3f3515 70738->70740 70741 6c3f3508 70739->70741 70742 6c3f3533 CreateFileW 70739->70742 70740->70729 70778 6c3f3309 LocalFree LocalFree CloseHandle 70740->70778 70777 6c3f334b 15 API calls CatchGuardHandler 70741->70777 70742->70729 70745 6c3f354b CloseHandle 70742->70745 70745->70729 70748 6c43287a 70747->70748 70749 6c43287c IsProcessorFeaturePresent 70747->70749 70748->70682 70751 6c432f7e 70749->70751 70754 6c432f41 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 70751->70754 70753 6c433061 70753->70682 70754->70753 70755->70688 70756->70690 70757->70697 70758->70697 70760 6c3eaa37 70759->70760 70760->70760 70761 6c3eaa54 27 API calls 70760->70761 70762 6c3e3f92 70761->70762 70762->70702 70763->70705 70765 6c3ebbd9 70764->70765 70767 6c3ebba8 _Yarn 70764->70767 70768 6c3ecdeb 27 API calls std::_String_base::_Xlen 70765->70768 70767->70709 70768->70767 70770 6c3ed514 70769->70770 70772 6c3ed530 _Yarn 70769->70772 70774 6c3ed576 27 API calls 2 library calls 70770->70774 70772->70716 70773->70714 70774->70772 70775->70726 70776->70738 70777->70740 70778->70729 70779->70656 70780 6c480380 70785 6c480092 70780->70785 70784 6c4803bf 70790 6c4800c0 70785->70790 70787 6c4802eb 70804 6c469d5e 25 API calls _memcpy_s 70787->70804 70789 6c48021b 70789->70784 70797 6c4787b6 70789->70797 70795 6c480210 70790->70795 70800 6c48847e 66 API calls 2 library calls 70790->70800 70792 6c480278 70792->70795 70801 6c48847e 66 API calls 2 library calls 70792->70801 70794 6c480296 70794->70795 70802 6c48847e 66 API calls 2 library calls 70794->70802 70795->70789 70803 6c46a399 14 API calls __dosmaperr 70795->70803 70805 6c477e31 70797->70805 70800->70792 70801->70794 70802->70795 70803->70787 70804->70789 70807 6c477e3d ___unDNameEx 70805->70807 70806 6c477e44 70864 6c46a399 14 API calls __dosmaperr 70806->70864 70807->70806 70809 6c477e6f 70807->70809 70816 6c47848c 70809->70816 70810 6c477e49 70865 6c469d5e 25 API calls _memcpy_s 70810->70865 70815 6c477e53 70815->70784 70817 6c4784a9 70816->70817 70818 6c4784d7 70817->70818 70819 6c4784be 70817->70819 70867 6c47f887 70818->70867 70881 6c46a386 14 API calls __dosmaperr 70819->70881 70822 6c4784c3 70882 6c46a399 14 API calls __dosmaperr 70822->70882 70824 6c4784e5 70883 6c46a386 14 API calls __dosmaperr 70824->70883 70825 6c4784fc 70880 6c478145 CreateFileW 70825->70880 70829 6c477e93 70866 6c477ec6 LeaveCriticalSection __wsopen_s 70829->70866 70830 6c4784ea 70884 6c46a399 14 API calls __dosmaperr 70830->70884 70832 6c4785b2 GetFileType 70834 6c478604 70832->70834 70835 6c4785bd GetLastError 70832->70835 70833 6c478587 GetLastError 70886 6c46a363 14 API calls 2 library calls 70833->70886 70889 6c47f7d2 15 API calls 3 library calls 70834->70889 70887 6c46a363 14 API calls 2 library calls 70835->70887 70836 6c478535 70836->70832 70836->70833 70885 6c478145 CreateFileW 70836->70885 70840 6c4785cb CloseHandle 70840->70822 70843 6c4785f4 70840->70843 70842 6c47857a 70842->70832 70842->70833 70888 6c46a399 14 API calls __dosmaperr 70843->70888 70844 6c478625 70846 6c478687 70844->70846 70890 6c478354 75 API calls 4 library calls 70844->70890 70906 6c477ef2 74 API calls 5 library calls 70846->70906 70847 6c4785f9 70847->70822 70850 6c478671 70850->70846 70852 6c478678 70850->70852 70851 6c4786a6 70853 6c4786b4 70851->70853 70854 6c4786b1 70851->70854 70891 6c47a8bb 70852->70891 70856 6c478730 CloseHandle 70853->70856 70859 6c478791 70853->70859 70854->70852 70907 6c478145 CreateFileW 70856->70907 70858 6c47875b 70858->70859 70860 6c478765 GetLastError 70858->70860 70859->70829 70908 6c46a363 14 API calls 2 library calls 70860->70908 70862 6c478771 70909 6c47f99a 15 API calls 3 library calls 70862->70909 70864->70810 70865->70815 70866->70815 70868 6c47f893 ___unDNameEx 70867->70868 70910 6c470f97 EnterCriticalSection 70868->70910 70871 6c47f89a 70872 6c47f8bf 70871->70872 70876 6c47f92e EnterCriticalSection 70871->70876 70879 6c47f8e1 70871->70879 70914 6c47f661 15 API calls 3 library calls 70872->70914 70875 6c47f8c4 70875->70879 70915 6c47f7af EnterCriticalSection 70875->70915 70877 6c47f93b LeaveCriticalSection 70876->70877 70876->70879 70877->70871 70911 6c47f991 70879->70911 70880->70836 70881->70822 70882->70829 70883->70830 70884->70822 70885->70842 70886->70822 70887->70840 70888->70847 70889->70844 70890->70850 70917 6c47fa2b 70891->70917 70893 6c47a8cb 70894 6c47a8d1 70893->70894 70896 6c47a903 70893->70896 70899 6c47fa2b __wsopen_s 25 API calls 70893->70899 70930 6c47f99a 15 API calls 3 library calls 70894->70930 70896->70894 70897 6c47fa2b __wsopen_s 25 API calls 70896->70897 70900 6c47a90f FindCloseChangeNotification 70897->70900 70898 6c47a929 70901 6c47a94b 70898->70901 70931 6c46a363 14 API calls 2 library calls 70898->70931 70902 6c47a8fa 70899->70902 70900->70894 70903 6c47a91b GetLastError 70900->70903 70901->70829 70905 6c47fa2b __wsopen_s 25 API calls 70902->70905 70903->70894 70905->70896 70906->70851 70907->70858 70908->70862 70909->70859 70910->70871 70916 6c470fdf LeaveCriticalSection 70911->70916 70913 6c4784dc 70913->70824 70913->70825 70914->70875 70915->70879 70916->70913 70918 6c47fa4d 70917->70918 70919 6c47fa38 70917->70919 70923 6c47fa72 70918->70923 70934 6c46a386 14 API calls __dosmaperr 70918->70934 70932 6c46a386 14 API calls __dosmaperr 70919->70932 70922 6c47fa3d 70933 6c46a399 14 API calls __dosmaperr 70922->70933 70923->70893 70924 6c47fa7d 70935 6c46a399 14 API calls __dosmaperr 70924->70935 70927 6c47fa85 70936 6c469d5e 25 API calls _memcpy_s 70927->70936 70928 6c47fa45 70928->70893 70930->70898 70931->70901 70932->70922 70933->70928 70934->70924 70935->70927 70936->70928 70937 6c3e75f4 70938 6c3e760e _Yarn 70937->70938 70939 6c3e76ae 70938->70939 70940 6c46aab5 __fread_nolock 39 API calls 70938->70940 70942 6c3e7614 70938->70942 70939->70942 70943 6c46aab5 70939->70943 70940->70938 70946 6c46aad2 70943->70946 70947 6c46aade ___unDNameEx 70946->70947 70948 6c46aaf1 _memcpy_s 70947->70948 70949 6c46ab28 70947->70949 70958 6c46aacd 70947->70958 70973 6c46a399 14 API calls __dosmaperr 70948->70973 70959 6c46a04e EnterCriticalSection 70949->70959 70952 6c46ab32 70960 6c46a8cf 70952->70960 70953 6c46ab0b 70974 6c469d5e 25 API calls _memcpy_s 70953->70974 70958->70942 70959->70952 70964 6c46a8e0 _memcpy_s 70960->70964 70972 6c46a8fc 70960->70972 70961 6c46a8ec 70976 6c46a399 14 API calls __dosmaperr 70961->70976 70963 6c46a8f1 70977 6c469d5e 25 API calls _memcpy_s 70963->70977 70964->70961 70967 6c46a93e __fread_nolock 70964->70967 70964->70972 70966 6c46aa65 _memcpy_s 70979 6c46a399 14 API calls __dosmaperr 70966->70979 70967->70966 70969 6c478a57 __fread_nolock 25 API calls 70967->70969 70971 6c47eb1b __fread_nolock 37 API calls 70967->70971 70967->70972 70978 6c46ab6f 25 API calls 3 library calls 70967->70978 70969->70967 70971->70967 70975 6c46ab67 LeaveCriticalSection __fread_nolock 70972->70975 70973->70953 70974->70958 70975->70958 70976->70963 70977->70972 70978->70967 70979->70963 70980 6c483e44 70981 6c483e6a 70980->70981 70982 6c483e54 70980->70982 70985 6c483e80 70981->70985 70986 6c483ec5 70981->70986 71002 6c46a399 14 API calls __dosmaperr 70982->71002 70984 6c483e59 71003 6c469d5e 25 API calls _memcpy_s 70984->71003 70998 6c483d61 70985->70998 71004 6c46a399 14 API calls __dosmaperr 70986->71004 70989 6c483eca 71005 6c469d5e 25 API calls _memcpy_s 70989->71005 70992 6c483e63 70995 6c483ee0 70995->70992 71007 6c469d8b IsProcessorFeaturePresent 70995->71007 70997 6c483efa 71000 6c483d6f 70998->71000 70999 6c483dd5 70999->70992 71006 6c46b2bf 25 API calls 2 library calls 70999->71006 71000->70999 71011 6c489251 66 API calls 2 library calls 71000->71011 71002->70984 71003->70992 71004->70989 71005->70992 71006->70995 71008 6c469d97 71007->71008 71012 6c469bb2 71008->71012 71011->71000 71013 6c469bce _memcpy_s IsInExceptionSpec 71012->71013 71014 6c469bfa IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 71013->71014 71016 6c469ccb IsInExceptionSpec 71014->71016 71015 6c432871 CatchGuardHandler 5 API calls 71017 6c469ce9 GetCurrentProcess TerminateProcess 71015->71017 71016->71015 71017->70997 71018 6c3f228e 71019 6c3f22a9 71018->71019 71020 6c3f22f3 71018->71020 71019->71020 71023 6c3f22cc SetWaitableTimer 71019->71023 71021 6c432871 CatchGuardHandler 5 API calls 71020->71021 71022 6c3f2302 71021->71022 71023->71020 71024 6c4036f2 71025 6c4036fe __EH_prolog3 71024->71025 71026 6c3f9da9 30 API calls 71025->71026 71027 6c403705 std::locale::_Init 71025->71027 71028 6c403718 71026->71028 71029 6c40373d 71028->71029 71030 6c3e2dde 30 API calls 71028->71030 71031 6c3e9187 27 API calls 71029->71031 71032 6c403729 71030->71032 71033 6c403746 71031->71033 71040 6c4057bf GetModuleFileNameW 71032->71040 71036 6c3eaa01 25 API calls 71033->71036 71037 6c403732 71036->71037 71037->71027 71039 6c3e2dde 30 API calls 71037->71039 71038 6c3f9da9 30 API calls 71038->71029 71039->71027 71041 6c4057f8 71040->71041 71042 6c40580c PathAppendW 71041->71042 71043 6c405822 71042->71043 71044 6c405826 TA_PDetsFromPath 71042->71044 71045 6c432871 CatchGuardHandler 5 API calls 71043->71045 71044->71043 71046 6c40372e 71045->71046 71046->71037 71046->71038 71047 6c47fa95 71048 6c47fc38 71047->71048 71050 6c47fabf 71047->71050 71098 6c46a399 14 API calls __dosmaperr 71048->71098 71050->71048 71053 6c47fb0a _strftime 71050->71053 71051 6c432871 CatchGuardHandler 5 API calls 71052 6c47fc55 71051->71052 71068 6c479b51 71053->71068 71057 6c47fb3e 71058 6c47fc57 71057->71058 71083 6c478f9c 71057->71083 71059 6c469d8b __Getctype 11 API calls 71058->71059 71061 6c47fc63 71059->71061 71062 6c47fb50 71062->71058 71090 6c478fc8 71062->71090 71064 6c47fb62 71064->71058 71065 6c47fb6b 71064->71065 71067 6c47fc23 71065->71067 71097 6c479bae 25 API calls 2 library calls 71065->71097 71067->71051 71069 6c479b5d ___unDNameEx 71068->71069 71070 6c479b95 71069->71070 71099 6c470f97 EnterCriticalSection 71069->71099 71076 6c478f70 71070->71076 71072 6c479b6e 71073 6c479b82 71072->71073 71100 6c479a2a 71072->71100 71118 6c479ba5 LeaveCriticalSection std::_Lockit::~_Lockit 71073->71118 71077 6c478f91 71076->71077 71078 6c478f7c 71076->71078 71077->71057 71236 6c46a399 14 API calls __dosmaperr 71078->71236 71080 6c478f81 71237 6c469d5e 25 API calls _memcpy_s 71080->71237 71082 6c478f8c 71082->71057 71084 6c478fbd 71083->71084 71085 6c478fa8 71083->71085 71084->71062 71238 6c46a399 14 API calls __dosmaperr 71085->71238 71087 6c478fad 71239 6c469d5e 25 API calls _memcpy_s 71087->71239 71089 6c478fb8 71089->71062 71091 6c478fd4 71090->71091 71092 6c478fe9 71090->71092 71240 6c46a399 14 API calls __dosmaperr 71091->71240 71092->71064 71094 6c478fd9 71241 6c469d5e 25 API calls _memcpy_s 71094->71241 71096 6c478fe4 71096->71064 71097->71067 71098->71067 71099->71072 71101 6c479a76 _strftime 71100->71101 71113 6c479a7d 71101->71113 71220 6c47aafd 15 API calls 3 library calls 71101->71220 71103 6c479af4 71183 6c4798d0 71103->71183 71104 6c479aeb 71119 6c47962f 71104->71119 71107 6c479aa3 71110 6c47a768 _free 14 API calls 71107->71110 71108 6c479af1 71109 6c47a768 _free 14 API calls 71108->71109 71111 6c479aff 71109->71111 71110->71113 71114 6c432871 CatchGuardHandler 5 API calls 71111->71114 71112 6c479a9c _strftime 71112->71107 71115 6c479acb 71112->71115 71113->71103 71113->71104 71116 6c479b0d 71114->71116 71117 6c47a768 _free 14 API calls 71115->71117 71116->71073 71117->71113 71118->71070 71120 6c47963f _strftime 71119->71120 71121 6c478fc8 _strftime 25 API calls 71120->71121 71122 6c47965e 71121->71122 71124 6c478f70 _strftime 25 API calls 71122->71124 71146 6c4798c3 71122->71146 71123 6c469d8b __Getctype 11 API calls 71126 6c4798cf _strftime 71123->71126 71125 6c479670 71124->71125 71125->71125 71135 6c4798bd 71125->71135 71125->71146 71221 6c47aafd 15 API calls 3 library calls 71125->71221 71128 6c478fc8 _strftime 25 API calls 71126->71128 71130 6c4798fd 71128->71130 71129 6c4796db 71131 6c4798b7 71129->71131 71133 6c47a768 _free 14 API calls 71129->71133 71132 6c479a1f 71130->71132 71136 6c478f70 _strftime 25 API calls 71130->71136 71134 6c47a768 _free 14 API calls 71131->71134 71137 6c469d8b __Getctype 11 API calls 71132->71137 71138 6c4796f1 71133->71138 71134->71135 71135->71108 71139 6c47990f 71136->71139 71143 6c479a29 _strftime 71137->71143 71222 6c46b2bf 25 API calls 2 library calls 71138->71222 71139->71132 71140 6c478f9c _strftime 25 API calls 71139->71140 71142 6c479921 71140->71142 71142->71132 71145 6c47992a 71142->71145 71161 6c479a7d 71143->71161 71231 6c47aafd 15 API calls 3 library calls 71143->71231 71144 6c47971f 71144->71146 71157 6c47972a _memcpy_s 71144->71157 71147 6c47a768 _free 14 API calls 71145->71147 71146->71123 71149 6c479935 GetTimeZoneInformation 71147->71149 71167 6c4799f9 _strftime 71149->71167 71169 6c479951 _memcpy_s 71149->71169 71150 6c479af4 71152 6c4798d0 _strftime 68 API calls 71150->71152 71151 6c479aeb 71153 6c47962f _strftime 68 API calls 71151->71153 71155 6c479af1 71152->71155 71153->71155 71154 6c479aa3 71158 6c47a768 _free 14 API calls 71154->71158 71156 6c47a768 _free 14 API calls 71155->71156 71159 6c479aff 71156->71159 71223 6c4795e8 69 API calls 7 library calls 71157->71223 71158->71161 71162 6c432871 CatchGuardHandler 5 API calls 71159->71162 71160 6c479a9c _strftime 71160->71154 71163 6c479acb 71160->71163 71161->71150 71161->71151 71164 6c479b0d 71162->71164 71165 6c47a768 _free 14 API calls 71163->71165 71164->71108 71165->71161 71167->71108 71168 6c479775 71224 6c4705ea 66 API calls 2 library calls 71168->71224 71228 6c471492 65 API calls __Getctype 71169->71228 71172 6c4799d4 71229 6c479b0f 69 API calls 5 library calls 71172->71229 71174 6c4799e5 71230 6c479b0f 69 API calls 5 library calls 71174->71230 71175 6c4797a9 71177 6c47983b 71175->71177 71225 6c4705ea 66 API calls 2 library calls 71175->71225 71181 6c4798a0 _strftime 71177->71181 71227 6c4795e8 69 API calls 7 library calls 71177->71227 71180 6c4797e6 71180->71177 71226 6c4705ea 66 API calls 2 library calls 71180->71226 71181->71131 71184 6c4798e0 _strftime 71183->71184 71185 6c478fc8 _strftime 25 API calls 71184->71185 71186 6c4798fd 71185->71186 71187 6c479a1f 71186->71187 71188 6c478f70 _strftime 25 API calls 71186->71188 71189 6c469d8b __Getctype 11 API calls 71187->71189 71190 6c47990f 71188->71190 71193 6c479a29 _strftime 71189->71193 71190->71187 71191 6c478f9c _strftime 25 API calls 71190->71191 71192 6c479921 71191->71192 71192->71187 71194 6c47992a 71192->71194 71208 6c479a7d 71193->71208 71235 6c47aafd 15 API calls 3 library calls 71193->71235 71195 6c47a768 _free 14 API calls 71194->71195 71197 6c479935 GetTimeZoneInformation 71195->71197 71211 6c4799f9 _strftime 71197->71211 71214 6c479951 _memcpy_s 71197->71214 71198 6c479af4 71200 6c4798d0 _strftime 68 API calls 71198->71200 71199 6c479aeb 71201 6c47962f _strftime 68 API calls 71199->71201 71203 6c479af1 71200->71203 71201->71203 71202 6c479aa3 71205 6c47a768 _free 14 API calls 71202->71205 71204 6c47a768 _free 14 API calls 71203->71204 71206 6c479aff 71204->71206 71205->71208 71209 6c432871 CatchGuardHandler 5 API calls 71206->71209 71207 6c479a9c _strftime 71207->71202 71210 6c479acb 71207->71210 71208->71198 71208->71199 71212 6c479b0d 71209->71212 71213 6c47a768 _free 14 API calls 71210->71213 71211->71108 71212->71108 71213->71208 71232 6c471492 65 API calls __Getctype 71214->71232 71216 6c4799d4 71233 6c479b0f 69 API calls 5 library calls 71216->71233 71218 6c4799e5 71234 6c479b0f 69 API calls 5 library calls 71218->71234 71220->71112 71221->71129 71222->71144 71223->71168 71224->71175 71225->71180 71226->71177 71227->71181 71228->71172 71229->71174 71230->71167 71231->71160 71232->71216 71233->71218 71234->71211 71235->71207 71236->71080 71237->71082 71238->71087 71239->71089 71240->71094 71241->71096 71242 6c46b3f2 71243 6c46b400 71242->71243 71244 6c46b41d _memcpy_s 71242->71244 71291 6c46a386 14 API calls __dosmaperr 71243->71291 71247 6c46b443 71244->71247 71248 6c46b45f CreateFileW 71244->71248 71246 6c46b405 71292 6c46a399 14 API calls __dosmaperr 71246->71292 71294 6c46a386 14 API calls __dosmaperr 71247->71294 71251 6c46b483 71248->71251 71252 6c46b491 71248->71252 71265 6c46b55a GetFileType 71251->71265 71297 6c46b4d0 77 API calls __dosmaperr 71252->71297 71253 6c46b40d 71293 6c469d5e 25 API calls _memcpy_s 71253->71293 71254 6c46b448 71295 6c46a399 14 API calls __dosmaperr 71254->71295 71258 6c46b48c _memcpy_s 71263 6c46b4c2 FindCloseChangeNotification 71258->71263 71264 6c46b45a 71258->71264 71260 6c46b418 71261 6c46b44f 71296 6c469d5e 25 API calls _memcpy_s 71261->71296 71263->71264 71266 6c46b595 71265->71266 71268 6c46b647 71265->71268 71269 6c46b5af _memcpy_s 71266->71269 71315 6c46b987 21 API calls __dosmaperr 71266->71315 71267 6c46b673 71271 6c46b69d PeekNamedPipe 71267->71271 71280 6c46b63e 71267->71280 71268->71267 71270 6c46b651 71268->71270 71275 6c46b5ce GetFileInformationByHandle 71269->71275 71269->71280 71273 6c46b664 GetLastError 71270->71273 71274 6c46b655 71270->71274 71271->71280 71318 6c46a363 14 API calls 2 library calls 71273->71318 71317 6c46a399 14 API calls __dosmaperr 71274->71317 71275->71273 71277 6c46b5e4 71275->71277 71298 6c46b8d9 71277->71298 71279 6c432871 CatchGuardHandler 5 API calls 71282 6c46b6c8 71279->71282 71280->71279 71282->71258 71286 6c46b6ca 7 API calls 71287 6c46b614 71286->71287 71288 6c46b6ca 7 API calls 71287->71288 71289 6c46b62b 71288->71289 71316 6c46b8a6 14 API calls _free 71289->71316 71291->71246 71292->71253 71293->71260 71294->71254 71295->71261 71296->71264 71297->71258 71299 6c46b8ef 71298->71299 71307 6c46b5f0 71299->71307 71319 6c47f4e4 66 API calls 3 library calls 71299->71319 71301 6c46b933 71301->71307 71320 6c47f4e4 66 API calls 3 library calls 71301->71320 71303 6c46b944 71303->71307 71321 6c47f4e4 66 API calls 3 library calls 71303->71321 71305 6c46b955 71305->71307 71322 6c47f4e4 66 API calls 3 library calls 71305->71322 71308 6c46b6ca 71307->71308 71309 6c46b6e2 71308->71309 71310 6c46b6f0 FileTimeToSystemTime 71308->71310 71309->71310 71311 6c46b6e8 71309->71311 71310->71311 71312 6c46b702 SystemTimeToTzSpecificLocalTime 71310->71312 71313 6c432871 CatchGuardHandler 5 API calls 71311->71313 71312->71311 71314 6c46b601 71313->71314 71314->71286 71315->71269 71316->71280 71317->71280 71318->71280 71319->71301 71320->71303 71321->71305 71322->71307 71323 6c4048f6 71324 6c404902 __EH_prolog3_catch_GS 71323->71324 71325 6c40379f 31 API calls 71324->71325 71326 6c40490f 71325->71326 71327 6c3f9da9 30 API calls 71326->71327 71358 6c404918 71326->71358 71328 6c40492f 71327->71328 71329 6c404abb 71328->71329 71331 6c40494d 71328->71331 71332 6c3e2dde 30 API calls 71329->71332 71334 6c404953 71331->71334 71339 6c404992 71331->71339 71332->71358 71385 6c3f9002 246 API calls 2 library calls 71334->71385 71336 6c404a28 71360 6c402651 71336->71360 71337 6c404962 71337->71339 71340 6c404966 71337->71340 71339->71336 71339->71339 71386 6c3fdf13 29 API calls 71339->71386 71342 6c3e2dde 30 API calls 71340->71342 71341 6c404a30 71343 6c404a40 _memcpy_s 71341->71343 71391 6c432aa8 71341->71391 71347 6c404974 71342->71347 71366 6c3ffb87 71343->71366 71347->71358 71348 6c4049db 71348->71336 71352 6c404a08 71348->71352 71351 6c3eaaf0 25 API calls 71353 6c404aa8 71351->71353 71387 6c3eaaf0 71352->71387 71356 6c3e2dde 30 API calls 71353->71356 71355 6c404a85 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 71355->71351 71356->71358 71402 6c4334c7 5 API calls CatchGuardHandler 71358->71402 71359 6c3e2dde 30 API calls 71359->71358 71361 6c40265d __EH_prolog3 71360->71361 71362 6c3f9da9 30 API calls 71361->71362 71363 6c40266b 71362->71363 71364 6c3e2dde 30 API calls 71363->71364 71365 6c40269a std::locale::_Init 71364->71365 71365->71341 71367 6c3ffb97 71366->71367 71368 6c3ffb9c 71366->71368 71403 6c3feab7 SHGetFolderPathW 71367->71403 71370 6c3ffbc8 71368->71370 71371 6c3ffbb7 71368->71371 71372 6c3ffba0 71368->71372 71489 6c3fec2d 71370->71489 71425 6c3ff342 71371->71425 71372->71355 71375 6c4026a9 71372->71375 71376 6c4026b5 __EH_prolog3 71375->71376 71377 6c3f9da9 30 API calls 71376->71377 71378 6c4026c8 71377->71378 71379 6c402725 71378->71379 72287 6c403175 27 API calls 2 library calls 71378->72287 71381 6c40273d 71379->71381 72273 6c3f9f6a 71379->72273 71383 6c3e2dde 30 API calls 71381->71383 71384 6c40274b std::locale::_Init 71383->71384 71384->71355 71385->71337 71386->71348 71388 6c3eaafb 71387->71388 71389 6c3eab04 71387->71389 72413 6c3ec7dd 25 API calls 3 library calls 71388->72413 71389->71359 71393 6c432aad 71391->71393 71392 6c46b2b4 ___std_exception_copy 15 API calls 71392->71393 71393->71392 71394 6c432ac7 71393->71394 71397 6c3e1640 Concurrency::cancel_current_task 71393->71397 72415 6c474832 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 71393->72415 71394->71343 71396 6c432ad3 71396->71396 71397->71396 71398 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 71397->71398 71399 6c3e165c 71398->71399 72414 6c3e1586 26 API calls ___std_exception_copy 71399->72414 71401 6c3e1669 71401->71343 71404 6c3feb0c 71403->71404 71424 6c3fec01 71403->71424 71405 6c3e9187 27 API calls 71404->71405 71406 6c3feb1e 71405->71406 71408 6c3eaaa2 27 API calls 71406->71408 71407 6c432871 CatchGuardHandler 5 API calls 71409 6c3fec2b 71407->71409 71410 6c3feb32 71408->71410 71409->71368 71411 6c3ec0a9 27 API calls 71410->71411 71412 6c3feb44 71411->71412 71413 6c3ebb93 27 API calls 71412->71413 71414 6c3feb70 _memcpy_s 71413->71414 71415 6c3f31fb 5 API calls 71414->71415 71416 6c3feb8d 71415->71416 71417 6c3f3474 20 API calls 71416->71417 71418 6c3febde 71417->71418 71514 6c3f32d3 FreeSid LocalFree LocalFree 71418->71514 71424->71407 71515 6c3ffc3f 71425->71515 71490 6c3ffc3f 253 API calls 71489->71490 71491 6c3fec47 71490->71491 71492 6c401556 70 API calls 71491->71492 71513 6c3fec4d 71491->71513 71493 6c3fec5c 71492->71493 71495 6c3fec8e 71493->71495 71496 6c3fec6b 71493->71496 71512 6c3fec62 71493->71512 71494 6c432871 CatchGuardHandler 5 API calls 71497 6c3fed47 71494->71497 71957 6c401b1d 71 API calls 4 library calls 71495->71957 71498 6c46a5b4 GetSystemTimeAsFileTime 71496->71498 71497->71372 71501 6c3fec71 71498->71501 71499 6c4009e1 108 API calls 71499->71513 71948 6c4009e1 71501->71948 71502 6c3fec99 71504 6c46a5b4 GetSystemTimeAsFileTime 71502->71504 71502->71513 71505 6c3fecad 71504->71505 71958 6c4679d6 14 API calls _free 71505->71958 71507 6c3fec82 71507->71513 71959 6c467e9b 69 API calls 71507->71959 71509 6c3fed0e 71511 6c46a5b4 GetSystemTimeAsFileTime 71509->71511 71510 6c3fecb5 71510->71507 71510->71512 71511->71513 71512->71499 71513->71494 71577 6c3fe9bf 71515->71577 71629 6c432f38 71577->71629 71960 6c4019ed 71948->71960 71951 6c400a32 71953 6c3eaaf0 25 API calls 71951->71953 71954 6c400a3c 71953->71954 71955 6c432871 CatchGuardHandler 5 API calls 71954->71955 71956 6c400a4a 71955->71956 71956->71507 71957->71502 71958->71510 71959->71509 71961 6c401a35 _memcpy_s 71960->71961 72023 6c3fd840 71961->72023 71963 6c401a6c 71964 6c432aa8 std::_Facet_Register 27 API calls 71963->71964 71965 6c401a77 _memcpy_s 71964->71965 71966 6c432aa8 std::_Facet_Register 27 API calls 71965->71966 71967 6c401a97 71966->71967 72035 6c3e83e7 71967->72035 71973 6c401adf 71974 6c432871 CatchGuardHandler 5 API calls 71973->71974 71975 6c400a13 71974->71975 71975->71951 71976 6c400740 71975->71976 71977 6c3fe9bf 12 API calls 71976->71977 71978 6c400778 71977->71978 71979 6c400795 _memcpy_s 71978->71979 71980 6c40078e DeleteFileW 71978->71980 72022 6c4009a6 71978->72022 72251 6c3e7b7f 95 API calls 2 library calls 71979->72251 71980->71979 71981 6c432871 CatchGuardHandler 5 API calls 71982 6c4009dd 71981->71982 71982->71951 71984 6c4007b9 71985 6c3e2153 71 API calls 71984->71985 71986 6c4007de 71985->71986 72252 6c3e7b32 71986->72252 71990 6c400800 72258 6c3fe0e7 71 API calls CatchGuardHandler 71990->72258 71992 6c400814 72259 6c3fe052 71 API calls CatchGuardHandler 71992->72259 71994 6c400827 71995 6c40088a 71994->71995 72260 6c3fe052 71 API calls CatchGuardHandler 71994->72260 71998 6c400927 71995->71998 72263 6c3fe052 71 API calls CatchGuardHandler 71995->72263 71997 6c40084d 72001 6c400877 71997->72001 72261 6c4022b1 95 API calls 3 library calls 71997->72261 72000 6c40093b 71998->72000 72266 6c405dbc 6 API calls CatchGuardHandler 71998->72266 72267 6c3fe09c 71 API calls CatchGuardHandler 72000->72267 72001->71995 72262 6c4022b1 95 API calls 3 library calls 72001->72262 72006 6c4008b3 72006->72006 72009 6c400900 72006->72009 72264 6c3fe0e7 71 API calls CatchGuardHandler 72006->72264 72007 6c400952 72268 6c3e8f16 71 API calls 2 library calls 72007->72268 72009->71998 72265 6c3fe0e7 71 API calls CatchGuardHandler 72009->72265 72011 6c400961 72013 6c400974 72011->72013 72269 6c3e8f16 71 API calls 2 library calls 72011->72269 72270 6c3e8f16 71 API calls 2 library calls 72013->72270 72016 6c400981 72271 6c3e7abf 74 API calls 72016->72271 72018 6c40098c 72019 6c400992 SetFileAttributesW 72018->72019 72020 6c40099b 72018->72020 72019->72020 72272 6c3e4cca 68 API calls std::ios_base::_Ios_base_dtor 72020->72272 72022->71981 72024 6c3fd84c __EH_prolog3 72023->72024 72066 6c3fcbc3 72024->72066 72028 6c3fd869 72073 6c3e3524 72028->72073 72030 6c3fd893 72077 6c3ec046 72030->72077 72032 6c3fd8a8 72081 6c40d522 72032->72081 72034 6c3fd8bc std::locale::_Init 72034->71963 72036 6c40c21a std::_String_base::_Xlen 27 API calls 72035->72036 72037 6c3e83f1 72036->72037 72038 6c41f81e 72037->72038 72039 6c41f82a __EH_prolog3_GS 72038->72039 72183 6c41f67e 72039->72183 72041 6c41f83d 72187 6c45fcea 72041->72187 72043 6c41f88b 72044 6c41f892 72043->72044 72045 6c41f90f 72043->72045 72192 6c41f49a 72044->72192 72046 6c3e9279 std::_String_base::_Xlen 27 API calls 72045->72046 72047 6c41f91c 72046->72047 72210 6c3e2ec7 27 API calls std::_String_base::_Xlen 72047->72210 72049 6c41f92c 72050 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 72049->72050 72051 6c41f93a 72050->72051 72053 6c41f8ee 72196 6c420175 72053->72196 72055 6c41f8fd 72056 6c4334b6 std::_String_base::_Xlen 5 API calls 72055->72056 72057 6c401ac8 72056->72057 72058 6c3e3833 72057->72058 72059 6c3e383f __EH_prolog3 72058->72059 72220 6c3e8250 72059->72220 72061 6c3e384c 72062 6c3e3524 26 API calls 72061->72062 72063 6c3e386d 72062->72063 72064 6c3ec046 27 API calls 72063->72064 72065 6c3e3882 std::locale::_Init 72064->72065 72065->71973 72086 6c3f048c 72066->72086 72068 6c3fcbd1 72069 6c3f0348 72068->72069 72070 6c3f0354 __EH_prolog3 72069->72070 72130 6c3efa75 72070->72130 72072 6c3f035e std::locale::_Init 72072->72028 72074 6c3e3530 __EH_prolog3 72073->72074 72133 6c3e3564 72074->72133 72076 6c3e355a std::locale::_Init 72076->72030 72078 6c3ec052 __EH_prolog3 72077->72078 72138 6c3edcee 72078->72138 72080 6c3ec06e std::locale::_Init 72080->72032 72159 6c40d94a 72081->72159 72087 6c3f0498 __EH_prolog3 72086->72087 72092 6c40c21a 72087->72092 72089 6c3f04a7 72111 6c3f0468 72089->72111 72091 6c3f04bd std::locale::_Init 72091->72068 72097 6c40c229 std::_String_base::_Xlen __EH_prolog3_GS 72092->72097 72093 6c40c286 72094 6c4334b6 std::_String_base::_Xlen 5 API calls 72093->72094 72095 6c40c28d 72094->72095 72095->72089 72096 6c40c24c std::_String_base::_Xlen 72096->72093 72099 6c40c256 72096->72099 72097->72093 72097->72096 72098 6c40c290 72097->72098 72100 6c3e9279 std::_String_base::_Xlen 27 API calls 72098->72100 72101 6c3e9279 std::_String_base::_Xlen 27 API calls 72099->72101 72102 6c40c29d 72100->72102 72103 6c40c263 72101->72103 72117 6c40c524 27 API calls std::_String_base::_Xlen 72102->72117 72116 6c40c524 27 API calls std::_String_base::_Xlen 72103->72116 72106 6c40c279 72107 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 72106->72107 72108 6c40c2bb 72107->72108 72118 6c3e313e 27 API calls 4 library calls 72108->72118 72110 6c40c2ce 72110->72089 72119 6c3f04f6 72111->72119 72113 6c3f0473 72114 6c3f0478 72113->72114 72128 6c4214ec 26 API calls Concurrency::details::ThreadInternalContext::ThreadInternalContext 72113->72128 72114->72091 72116->72106 72117->72106 72118->72110 72120 6c3f0502 __EH_prolog3 72119->72120 72121 6c3f050b std::locale::_Init 72120->72121 72122 6c3e9279 std::_String_base::_Xlen 27 API calls 72120->72122 72121->72113 72123 6c3f051e 72122->72123 72129 6c3e2ec7 27 API calls std::_String_base::_Xlen 72123->72129 72125 6c3f052e 72126 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 72125->72126 72127 6c3f053c 72126->72127 72128->72114 72129->72125 72131 6c40c21a std::_String_base::_Xlen 27 API calls 72130->72131 72132 6c3efa88 72131->72132 72132->72072 72134 6c3e3581 72133->72134 72135 6c3e3573 72133->72135 72134->72076 72137 6c3e8491 26 API calls Concurrency::details::ThreadInternalContext::ThreadInternalContext 72135->72137 72137->72134 72139 6c3edcfa __EH_prolog3_GS 72138->72139 72140 6c432aa8 std::_Facet_Register 27 API calls 72139->72140 72141 6c3edd07 _memcpy_s 72140->72141 72146 6c3eea28 72141->72146 72143 6c3edd2c 72144 6c4334b6 std::_String_base::_Xlen 5 API calls 72143->72144 72145 6c3edd62 72144->72145 72145->72080 72147 6c3eea34 __EH_prolog3 72146->72147 72150 6c3e95a2 72147->72150 72149 6c3eea61 std::locale::_Init 72149->72143 72153 6c3ea6fc 72150->72153 72154 6c3ea71a 72153->72154 72157 6c3ea716 72153->72157 72155 6c421549 Concurrency::details::ThreadInternalContext::ThreadInternalContext 15 API calls 72154->72155 72155->72157 72156 6c3e95cb 72156->72149 72157->72156 72158 6c3e13f0 Concurrency::details::ThreadInternalContext::ThreadInternalContext 25 API calls 72157->72158 72158->72156 72160 6c40d956 __EH_prolog3_GS 72159->72160 72161 6c40d964 72160->72161 72162 6c40d96c 72160->72162 72163 6c4334b6 std::_String_base::_Xlen 5 API calls 72161->72163 72173 6c40c31b 27 API calls 2 library calls 72162->72173 72164 6c40d52e 72163->72164 72169 6c421549 72164->72169 72166 6c40d98e 72167 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 72166->72167 72168 6c40d99c 72167->72168 72170 6c42154b 72169->72170 72172 6c40d541 72170->72172 72174 6c46b2b4 72170->72174 72172->72034 72173->72166 72178 6c47aafd _strftime 72174->72178 72175 6c47ab3b 72182 6c46a399 14 API calls __dosmaperr 72175->72182 72177 6c47ab26 RtlAllocateHeap 72177->72178 72179 6c47ab39 72177->72179 72178->72175 72178->72177 72181 6c474832 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 72178->72181 72179->72170 72181->72178 72182->72179 72184 6c41f68a __EH_prolog3 72183->72184 72211 6c41f5af 72184->72211 72186 6c41f697 std::locale::_Init 72186->72041 72189 6c45fcf6 ___unDNameEx std::__non_rtti_object::__construct_from_string_literal FindMITargetTypeInstance 72187->72189 72188 6c45fcfd PMDtoOffset 72188->72043 72189->72188 72190 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 72189->72190 72191 6c45fddc 72190->72191 72193 6c41f4a6 __EH_prolog3 72192->72193 72214 6c41f3f2 72193->72214 72195 6c41f4c2 std::locale::_Init 72195->72053 72197 6c420181 __EH_prolog3_GS 72196->72197 72198 6c4201c5 72197->72198 72200 6c4201ad 72197->72200 72199 6c3e9279 std::_String_base::_Xlen 27 API calls 72198->72199 72201 6c4201d2 72199->72201 72218 6c420eee 26 API calls 72200->72218 72219 6c3e2ec7 27 API calls std::_String_base::_Xlen 72201->72219 72204 6c4201e2 72206 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 72204->72206 72205 6c4201b9 72207 6c4334b6 std::_String_base::_Xlen 5 API calls 72205->72207 72209 6c4201f0 72206->72209 72208 6c4201c2 72207->72208 72208->72055 72209->72055 72210->72049 72212 6c40c21a std::_String_base::_Xlen 27 API calls 72211->72212 72213 6c41f5c0 72212->72213 72213->72186 72215 6c41f3fe __EH_prolog3 72214->72215 72216 6c432aa8 std::_Facet_Register 27 API calls 72215->72216 72217 6c41f407 std::locale::_Init 72216->72217 72217->72195 72218->72205 72219->72204 72221 6c3e825c __EH_prolog3 72220->72221 72222 6c41f5af 27 API calls 72221->72222 72223 6c3e8268 72222->72223 72224 6c40c21a std::_String_base::_Xlen 27 API calls 72223->72224 72225 6c3e8296 72224->72225 72232 6c3e34d1 72225->72232 72227 6c3e82b6 72228 6c3ec046 27 API calls 72227->72228 72229 6c3e82cb 72228->72229 72236 6c420f1c 72229->72236 72231 6c3e82da std::locale::_Init 72231->72061 72234 6c3e34dd __EH_prolog3 72232->72234 72233 6c3e3564 26 API calls 72235 6c3e351a std::locale::_Init 72233->72235 72234->72233 72234->72234 72235->72227 72237 6c420f28 __EH_prolog3_GS 72236->72237 72238 6c3e34d1 26 API calls 72237->72238 72239 6c420f39 72238->72239 72240 6c420f81 72239->72240 72241 6c420f55 72239->72241 72242 6c3e9279 std::_String_base::_Xlen 27 API calls 72240->72242 72244 6c4334b6 std::_String_base::_Xlen 5 API calls 72241->72244 72243 6c420f8e 72242->72243 72250 6c3e2ec7 27 API calls std::_String_base::_Xlen 72243->72250 72246 6c420f7e 72244->72246 72246->72231 72247 6c420f9e 72248 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 72247->72248 72249 6c420fac 72248->72249 72250->72247 72251->71984 72253 6c3ea437 96 API calls 72252->72253 72254 6c3e7b4d 72253->72254 72255 6c3e2153 71 API calls 72254->72255 72256 6c3e7b7a 72255->72256 72257 6c3fca15 71 API calls 2 library calls 72256->72257 72257->71990 72258->71992 72259->71994 72260->71997 72261->71997 72262->71995 72263->72006 72264->72006 72265->71998 72266->72000 72267->72007 72268->72011 72269->72013 72270->72016 72271->72018 72272->72022 72274 6c3f9f76 __EH_prolog3 72273->72274 72275 6c3f9da9 30 API calls 72274->72275 72276 6c3f9f85 72275->72276 72277 6c3f9fd9 72276->72277 72279 6c3f9fbf 72276->72279 72281 6c432aa8 std::_Facet_Register 27 API calls 72276->72281 72278 6c3f9ff0 std::locale::_Init 72277->72278 72280 6c3e2dde 30 API calls 72277->72280 72278->71381 72294 6c3f9ffa 41 API calls 2 library calls 72279->72294 72280->72278 72283 6c3f9fa0 _memcpy_s 72281->72283 72288 6c3fa89e 72283->72288 72284 6c3f9fcf 72285 6c3e2dde 30 API calls 72284->72285 72285->72277 72287->71379 72289 6c3fa8aa __EH_prolog3 72288->72289 72295 6c3f9ae3 72289->72295 72291 6c3fa8db 72305 6c3fadd1 27 API calls 3 library calls 72291->72305 72293 6c3fa915 std::locale::_Init 72293->72279 72294->72284 72306 6c4334d8 72295->72306 72297 6c3f9aef EnterCriticalSection 72298 6c3f9b22 LeaveCriticalSection 72297->72298 72300 6c3f9b0a 72297->72300 72307 6c3faff3 72298->72307 72299 6c3f9b33 EnterCriticalSection 72302 6c3f9b52 72299->72302 72300->72298 72301 6c3f9b73 LeaveCriticalSection 72300->72301 72303 6c3f9b81 std::locale::_Init 72301->72303 72302->72301 72303->72291 72305->72293 72306->72297 72308 6c3fafff __EH_prolog3 72307->72308 72309 6c432aa8 std::_Facet_Register 27 API calls 72308->72309 72310 6c3fb006 _memcpy_s 72309->72310 72313 6c3fb0ef 72310->72313 72312 6c3fb027 std::locale::_Init 72312->72299 72314 6c3fb0fb __EH_prolog3 72313->72314 72315 6c3f9ae3 100 API calls 72314->72315 72316 6c3fb15c 72315->72316 72319 6c3f9ca2 72316->72319 72318 6c3fb167 std::locale::_Init 72318->72312 72338 6c43350c 72319->72338 72321 6c3f9cae EnterCriticalSection 72322 6c3f9cd7 CreateWaitableTimerW 72321->72322 72326 6c3f9d2f 72321->72326 72323 6c3f9d0f SetWaitableTimer 72322->72323 72324 6c3f9ce7 GetLastError 72322->72324 72323->72326 72329 6c3f9cff 72324->72329 72325 6c3f9d89 LeaveCriticalSection 72328 6c4334b6 std::_String_base::_Xlen 5 API calls 72325->72328 72326->72325 72327 6c432aa8 std::_Facet_Register 27 API calls 72326->72327 72330 6c3f9d3b 72327->72330 72331 6c3f9d98 72328->72331 72329->72323 72333 6c3f9d9b 72329->72333 72332 6c432aa8 std::_Facet_Register 27 API calls 72330->72332 72331->72318 72334 6c3f9d5b 72332->72334 72339 6c3f1904 CreateEventW 72334->72339 72336 6c3f9d80 72363 6c3f2a63 CloseHandle std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 72336->72363 72338->72321 72340 6c3f193a GetLastError 72339->72340 72341 6c3f1975 CreateEventW 72339->72341 72347 6c3f194a 72340->72347 72342 6c3f198b GetLastError 72341->72342 72351 6c3f199b 72341->72351 72342->72351 72344 6c3f19eb 72345 6c3f19fb GetLastError 72344->72345 72346 6c3f1a51 72344->72346 72350 6c3f1a0d 72345->72350 72348 6c3f1a55 WaitForSingleObject FindCloseChangeNotification 72346->72348 72349 6c3f1a61 72346->72349 72347->72341 72356 6c3f19c1 __EH_prolog3 72347->72356 72348->72349 72352 6c432871 CatchGuardHandler 5 API calls 72349->72352 72353 6c3f1a14 72350->72353 72354 6c3f1a11 CloseHandle 72350->72354 72351->72356 72364 6c46bd36 72351->72364 72355 6c3f1a70 72352->72355 72357 6c3f1a1f 72353->72357 72358 6c3f1a1a CloseHandle 72353->72358 72354->72353 72355->72336 72359 6c3f1a91 SetEvent 72356->72359 72357->72346 72357->72356 72358->72357 72360 6c3f1aab SetEvent SleepEx 72359->72360 72362 6c3f1ace std::locale::_Init 72360->72362 72362->72336 72363->72325 72365 6c46bd57 72364->72365 72366 6c46bd43 72364->72366 72379 6c46bce6 72365->72379 72388 6c46a399 14 API calls __dosmaperr 72366->72388 72369 6c46bd48 72389 6c469d5e 25 API calls _memcpy_s 72369->72389 72371 6c46bd6c CreateThread 72373 6c46bd97 72371->72373 72374 6c46bd8b GetLastError 72371->72374 72399 6c46bbda 72371->72399 72391 6c46bc58 72373->72391 72390 6c46a363 14 API calls 2 library calls 72374->72390 72375 6c46bd53 72375->72344 72380 6c478ec0 __dosmaperr 14 API calls 72379->72380 72381 6c46bcf7 72380->72381 72382 6c47a768 _free 14 API calls 72381->72382 72383 6c46bd04 72382->72383 72384 6c46bd0b GetModuleHandleExW 72383->72384 72385 6c46bd28 72383->72385 72384->72385 72386 6c46bc58 16 API calls 72385->72386 72387 6c46bd30 72386->72387 72387->72371 72387->72373 72388->72369 72389->72375 72390->72373 72392 6c46bc64 72391->72392 72393 6c46bc88 72391->72393 72394 6c46bc73 72392->72394 72395 6c46bc6a CloseHandle 72392->72395 72393->72344 72396 6c46bc82 72394->72396 72397 6c46bc79 FreeLibrary 72394->72397 72395->72394 72398 6c47a768 _free 14 API calls 72396->72398 72397->72396 72398->72393 72400 6c46bbe6 ___unDNameEx 72399->72400 72401 6c46bbed GetLastError ExitThread 72400->72401 72402 6c46bbfa 72400->72402 72403 6c47b16c __Getctype 65 API calls 72402->72403 72404 6c46bbff 72403->72404 72405 6c47fcb2 6 API calls 72404->72405 72406 6c46bc0a 72405->72406 72407 6c46bc16 72406->72407 72408 6c47e08e LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 72406->72408 72409 6c46bdb9 17 API calls 72407->72409 72408->72407 72410 6c46bc38 72409->72410 72411 6c474981 14 API calls 72410->72411 72412 6c46bc49 72411->72412 72413->71389 72414->71401 72415->71393 72416 6c4038f6 72417 6c403905 __EH_prolog3_catch_GS 72416->72417 72418 6c40379f 31 API calls 72417->72418 72419 6c40390d 72418->72419 72420 6c3f9da9 30 API calls 72419->72420 72430 6c403913 72419->72430 72423 6c40392e _memcpy_s 72420->72423 72431 6c3e601a 72423->72431 72426 6c403994 72429 6c3e2dde 30 API calls 72426->72429 72427 6c40397d 72428 6c3e2dde 30 API calls 72427->72428 72428->72430 72429->72430 72560 6c4334c7 5 API calls CatchGuardHandler 72430->72560 72432 6c3e6029 __EH_prolog3_GS 72431->72432 72561 6c3f0be8 72432->72561 72437 6c4334b6 std::_String_base::_Xlen 5 API calls 72438 6c3e62c7 72437->72438 72438->72426 72438->72427 72470 6c3e6297 72470->72437 72562 6c3f0c2d 72561->72562 72579 6c3f0c26 72561->72579 72646 6c3f08e5 72562->72646 72564 6c432871 CatchGuardHandler 5 API calls 72565 6c3e603c 72564->72565 72565->72470 72586 6c3f121d 72565->72586 72566 6c3f0c32 _memcpy_s 72566->72579 72665 6c3f1443 72566->72665 72568 6c3f0c65 72569 6c3e2153 71 API calls 72568->72569 72570 6c3f0c8b 72569->72570 72675 6c3fe221 72570->72675 72573 6c3f0dd4 72575 6c3e2126 27 API calls 72573->72575 72578 6c3f0df5 72575->72578 72576 6c3f0d5c 72577 6c3f0e07 68 API calls 72576->72577 72577->72579 72580 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 72578->72580 72579->72564 72583 6c3f0e06 72580->72583 72581 6c3f0ca3 72581->72576 72582 6c3fe483 95 API calls 72581->72582 72685 6c3e87c5 72581->72685 72691 6c3fe5a0 95 API calls 2 library calls 72581->72691 72692 6c3fe1a7 95 API calls CatchGuardHandler 72581->72692 72582->72581 72587 6c3f122c __EH_prolog3_catch_GS 72586->72587 72615 6c3f123b 72587->72615 72699 6c3f0a6c 72587->72699 72591 6c3f1247 _memcpy_s 72592 6c3f14ee 95 API calls 72591->72592 72591->72615 72593 6c3f1279 72592->72593 72594 6c3e2153 71 API calls 72593->72594 72595 6c3f129e 72594->72595 72596 6c3f13f7 98 API calls 72595->72596 72597 6c3f12ac 72596->72597 72598 6c3fe221 95 API calls 72597->72598 72599 6c3f12bc 72598->72599 72600 6c3f134c 72599->72600 72605 6c3f12ca 72599->72605 72722 6c3f1384 74 API calls 72600->72722 72602 6c3e87c5 95 API calls 72602->72605 72603 6c3f1351 72609 6c3e2126 27 API calls 72603->72609 72604 6c3f12e5 72719 6c3f1384 74 API calls 72604->72719 72605->72602 72605->72604 72606 6c3f12dd 72605->72606 72720 6c3fe5a0 95 API calls 2 library calls 72605->72720 72718 6c3fe38a 95 API calls Concurrency::cancel_current_task 72606->72718 72613 6c3f1372 72609->72613 72610 6c3f12f3 72612 6c3f0e07 68 API calls 72610->72612 72612->72615 72614 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 72613->72614 72616 6c3f1383 72614->72616 72721 6c4334c7 5 API calls CatchGuardHandler 72615->72721 72647 6c3f090b 72646->72647 72648 6c3f0900 72646->72648 72650 6c3f091b SHGetFolderPathW 72647->72650 72693 6c3f0842 26 API calls 2 library calls 72648->72693 72651 6c3f097b SHGetFolderPathW 72650->72651 72652 6c3f0931 PathAppendW PathAppendW 72650->72652 72654 6c3f098e PathAppendW 72651->72654 72655 6c3f09e8 SHGetFolderPathW 72651->72655 72656 6c3f096c 72652->72656 72653 6c432871 CatchGuardHandler 5 API calls 72657 6c3f0a68 72653->72657 72658 6c3f09a5 72654->72658 72659 6c3f09fb PathAppendW CreateDirectoryW 72655->72659 72664 6c3f0906 72655->72664 72656->72651 72656->72664 72657->72566 72658->72655 72662 6c3f09ab PathAppendW 72658->72662 72660 6c3f0a15 GetLastError 72659->72660 72661 6c3f0a22 SetFileAttributesW PathAppendW 72659->72661 72660->72661 72660->72664 72661->72664 72663 6c3f09da 72662->72663 72663->72655 72663->72664 72664->72653 72666 6c3f144f __EH_prolog3 72665->72666 72667 6c3eb988 95 API calls 72666->72667 72668 6c3f148f 72667->72668 72669 6c3ea4b8 71 API calls 72668->72669 72670 6c3f14b1 72669->72670 72671 6c3ea437 96 API calls 72670->72671 72672 6c3f14c4 72671->72672 72673 6c3e2153 71 API calls 72672->72673 72674 6c3f14e4 std::locale::_Init 72672->72674 72673->72674 72674->72568 72676 6c3fe22d __EH_prolog3_GS 72675->72676 72694 6c3ead34 72676->72694 72678 6c3fe259 72679 6c3e8705 95 API calls 72678->72679 72680 6c3fe276 72679->72680 72681 6c3eaaf0 25 API calls 72680->72681 72682 6c3fe2a7 72681->72682 72683 6c4334b6 std::_String_base::_Xlen 5 API calls 72682->72683 72684 6c3f0c9b 72683->72684 72684->72573 72684->72581 72686 6c3e87d1 __EH_prolog3_catch 72685->72686 72687 6c3ea019 95 API calls 72686->72687 72689 6c3e87eb 72687->72689 72688 6c3ea9c9 71 API calls 72690 6c3e8880 std::locale::_Init 72688->72690 72689->72688 72690->72581 72691->72581 72692->72581 72693->72664 72695 6c3ead69 72694->72695 72697 6c3ead43 _memcpy_s 72694->72697 72698 6c3ecb18 27 API calls 3 library calls 72695->72698 72697->72678 72698->72697 72700 6c3f0a87 72699->72700 72701 6c3f0a93 72699->72701 72723 6c3f0842 26 API calls 2 library calls 72700->72723 72703 6c3f0aa3 SHGetFolderPathW 72701->72703 72704 6c3f0aff SHGetFolderPathW 72703->72704 72705 6c3f0ab9 PathAppendW PathAppendW 72703->72705 72708 6c3f0b68 SHGetFolderPathW 72704->72708 72709 6c3f0b12 PathAppendW 72704->72709 72706 6c3f0af0 72705->72706 72706->72704 72710 6c3f0a8e 72706->72710 72707 6c432871 CatchGuardHandler 5 API calls 72712 6c3f0be4 72707->72712 72708->72710 72711 6c3f0b7b PathAppendW CreateDirectoryW 72708->72711 72713 6c3f0b29 72709->72713 72710->72707 72714 6c3f0b95 GetLastError 72711->72714 72715 6c3f0ba2 SetFileAttributesW PathAppendW 72711->72715 72712->72591 72713->72708 72716 6c3f0b2f PathAppendW 72713->72716 72714->72710 72714->72715 72715->72710 72717 6c3f0b5a 72716->72717 72717->72708 72717->72710 72718->72604 72719->72610 72720->72605 72722->72603 72723->72710 72748 6c460fb0 72749 6c460fd3 __CallSettingFrame@12 72748->72749 72751 6c3f13b4 68 API calls 72749->72751 72750 6c460fd7 __CallSettingFrame@12 72751->72750 72752 6c45309c 72753 6c4530a5 72752->72753 72759 6c4530e3 72752->72759 72760 6c452581 72753->72760 72758 6c4530d3 GetProcAddress 72758->72759 72762 6c4525af _memcpy_s 72760->72762 72761 6c4525bf 72763 6c432871 CatchGuardHandler 5 API calls 72761->72763 72762->72761 72764 6c452632 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 72762->72764 72765 6c452696 72763->72765 72766 6c452666 VerSetConditionMask 72764->72766 72767 6c45266d VerifyVersionInfoW 72764->72767 72768 6c440e3e GetModuleHandleW 72765->72768 72766->72767 72767->72761 72769 6c440e58 GetProcAddress 72768->72769 72783 6c440eab 72768->72783 72770 6c440e77 std::_Locinfo::_Locinfo_ctor 72769->72770 72771 6c440e7d 72770->72771 72772 6c440e8e 72770->72772 72773 6c440e85 LoadLibraryW 72771->72773 72774 6c440e81 72771->72774 72775 6c440eb2 GetSystemDirectoryW 72772->72775 72776 6c440e92 GetProcAddress 72772->72776 72773->72783 72777 6c440ea7 LoadLibraryExW 72774->72777 72779 6c440ec8 72775->72779 72775->72783 72776->72775 72778 6c440ea2 72776->72778 72777->72783 72778->72777 72780 6c440ef4 GetSystemDirectoryW 72779->72780 72779->72783 72781 6c440f03 72780->72781 72780->72783 72782 6c440f53 LoadLibraryW 72781->72782 72781->72783 72782->72783 72783->72758 72783->72759 72784 6c41df3b 72839 6c40cfd9 72784->72839 72786 6c41df9f 72849 6c40e7da 72786->72849 72788 6c41dfb8 72857 6c40e6fd 72788->72857 72791 6c40e6fd 27 API calls 72796 6c41dfd3 72791->72796 72798 6c41e038 72796->72798 72862 6c4127f4 72796->72862 72875 6c413460 72796->72875 72895 6c3e855b 72796->72895 72898 6c412b28 27 API calls 2 library calls 72796->72898 72899 6c40eaeb 27 API calls 72796->72899 72900 6c42cb81 27 API calls 2 library calls 72798->72900 72800 6c41e052 72901 6c412c7d 27 API calls 2 library calls 72800->72901 72802 6c41e068 72902 6c40eaeb 27 API calls 72802->72902 72804 6c41e071 72903 6c430196 27 API calls 2 library calls 72804->72903 72806 6c41e09b 72904 6c412c7d 27 API calls 2 library calls 72806->72904 72808 6c41e0b4 72905 6c40eaeb 27 API calls 72808->72905 72810 6c41e0bc 72906 6c42cb81 27 API calls 2 library calls 72810->72906 72812 6c41e0cd 72813 6c3e855b 14 API calls 72812->72813 72814 6c41e0e9 72813->72814 72815 6c41e131 72814->72815 72816 6c41e0ed 72814->72816 72818 6c3e9279 std::_String_base::_Xlen 27 API calls 72815->72818 72817 6c3e855b 14 API calls 72816->72817 72819 6c41e0f5 72817->72819 72820 6c41e13e 72818->72820 72821 6c3e855b 14 API calls 72819->72821 72908 6c3e2e5f 72820->72908 72823 6c41e0fd 72821->72823 72826 6c3e855b 14 API calls 72823->72826 72824 6c41e150 72825 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 72824->72825 72827 6c41e15e __EH_prolog3_GS 72825->72827 72828 6c41e105 72826->72828 72912 6c40a0e0 27 API calls 72827->72912 72907 6c40eaa8 14 API calls 72828->72907 72833 6c41e17b 72913 6c409c73 5 API calls CatchGuardHandler 72833->72913 72836 6c41e19a 72837 6c4334b6 std::_String_base::_Xlen 5 API calls 72836->72837 72838 6c41e218 72837->72838 72840 6c40cfe5 __EH_prolog3 72839->72840 72848 6c40d006 std::locale::_Init 72840->72848 72914 6c4329ba EnterCriticalSection 72840->72914 72842 6c40d019 72843 6c40c21a std::_String_base::_Xlen 27 API calls 72842->72843 72842->72848 72844 6c40d030 72843->72844 72919 6c432ef2 72844->72919 72848->72786 72850 6c40e7e6 __EH_prolog3 72849->72850 72932 6c40e5b3 72850->72932 72855 6c40e6fd 27 API calls 72856 6c40e824 std::locale::_Init 72855->72856 72856->72788 72858 6c40e4ba 5 API calls 72857->72858 72859 6c40e70e 72858->72859 72860 6c3f04d2 27 API calls 72859->72860 72861 6c40e71e 72860->72861 72861->72791 72863 6c412800 __EH_prolog3 72862->72863 72864 6c40e4d6 27 API calls 72863->72864 72865 6c412823 72864->72865 72866 6c412841 72865->72866 72867 6c412832 72865->72867 72868 6c412857 72866->72868 72870 6c412846 72866->72870 72867->72868 72869 6c41283a 72867->72869 72959 6c413303 25 API calls 72868->72959 72957 6c413047 27 API calls 72869->72957 72958 6c413047 27 API calls 72870->72958 72874 6c41283f std::locale::_Init 72874->72796 72876 6c41346c __EH_prolog3_GS 72875->72876 72877 6c413489 72876->72877 72878 6c4134dc 72876->72878 72879 6c4127f4 27 API calls 72877->72879 72880 6c3e9279 std::_String_base::_Xlen 27 API calls 72878->72880 72884 6c413495 72879->72884 72881 6c4134e9 72880->72881 72969 6c3e2ec7 27 API calls std::_String_base::_Xlen 72881->72969 72883 6c4134f9 72885 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 72883->72885 72888 6c4134c1 72884->72888 72960 6c413508 72884->72960 72887 6c413507 72885->72887 72968 6c40ed7b 27 API calls 72888->72968 72890 6c4134cc 72891 6c3e855b 14 API calls 72890->72891 72892 6c4134d4 72891->72892 72893 6c4334b6 std::_String_base::_Xlen 5 API calls 72892->72893 72894 6c4134d9 72893->72894 72894->72796 72975 6c3ea749 72895->72975 72898->72796 72899->72796 72900->72800 72901->72802 72902->72804 72903->72806 72904->72808 72905->72810 72906->72812 72909 6c3e2e6b __EH_prolog3 72908->72909 72910 6c3e92c3 std::invalid_argument::invalid_argument 27 API calls 72909->72910 72911 6c3e2e92 std::locale::_Init 72910->72911 72911->72824 72912->72833 72913->72836 72916 6c4329ce 72914->72916 72915 6c4329d3 LeaveCriticalSection 72915->72842 72916->72915 72923 6c432a42 LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 72916->72923 72924 6c432ec5 72919->72924 72922 6c432970 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 72922->72848 72923->72916 72925 6c432ed4 72924->72925 72926 6c432edb 72924->72926 72930 6c47573d 28 API calls 72925->72930 72931 6c4757a9 28 API calls 72926->72931 72929 6c40d044 72929->72922 72930->72929 72931->72929 72944 6c40e4ba 72932->72944 72934 6c40e5c7 72948 6c3f04d2 72934->72948 72939 6c40e4d6 72940 6c40e4ba 5 API calls 72939->72940 72941 6c40e4ea 72940->72941 72942 6c3f04d2 27 API calls 72941->72942 72943 6c40e502 72942->72943 72943->72855 72945 6c40e4cb 72944->72945 72946 6c40e4c6 72944->72946 72945->72934 72955 6c41c755 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 72946->72955 72949 6c3f0468 Concurrency::details::ThreadInternalContext::ThreadInternalContext 27 API calls 72948->72949 72950 6c3f04ec 72949->72950 72951 6c411288 72950->72951 72952 6c411292 72951->72952 72953 6c40e601 72951->72953 72956 6c41cf8e 25 API calls 3 library calls 72952->72956 72953->72939 72955->72945 72956->72953 72957->72874 72958->72874 72959->72874 72961 6c413514 __EH_prolog3 72960->72961 72970 6c3e850c 72961->72970 72964 6c41353a 72974 6c411471 27 API calls CatchGuardHandler 72964->72974 72966 6c413557 std::locale::_Init 72966->72884 72967 6c40d522 27 API calls 72967->72964 72968->72890 72969->72883 72971 6c3e851f 72970->72971 72972 6c3e8525 72970->72972 72973 6c421549 Concurrency::details::ThreadInternalContext::ThreadInternalContext 15 API calls 72971->72973 72972->72967 72973->72972 72974->72966 72976 6c3e8590 72975->72976 72977 6c3ea751 72975->72977 72976->72796 72979 6c421505 14 API calls std::locale::_Locimp::~_Locimp 72977->72979 72979->72976 72980 6c4053da 72981 6c4053e6 __EH_prolog3_catch 72980->72981 72982 6c3f9da9 30 API calls 72981->72982 72983 6c4053f5 72982->72983 72984 6c432aa8 std::_Facet_Register 27 API calls 72983->72984 72985 6c405407 72984->72985 72994 6c403657 72985->72994 73049 6c3e9327 72994->73049 72996 6c40368c 72997 6c3fcee4 72996->72997 72998 6c3fcef3 _memcpy_s __EH_prolog3_GS 72997->72998 72999 6c3f14ee 95 API calls 72998->72999 73000 6c3fcf18 72999->73000 73001 6c3e2153 71 API calls 73000->73001 73002 6c3fcf3e 73001->73002 73003 6c3f13f7 98 API calls 73002->73003 73004 6c3fcf4c 73003->73004 73055 6c3fcf6f 73004->73055 73050 6c3e9333 __EH_prolog3 73049->73050 73051 6c40e6fd 27 API calls 73050->73051 73052 6c3e9391 73051->73052 73053 6c40e6fd 27 API calls 73052->73053 73054 6c3e939d std::locale::_Init 73053->73054 73054->72996 73056 6c3fcf80 __EH_prolog3_catch_GS_align 73055->73056 73057 6c3fe221 95 API calls 73056->73057 73058 6c3fcf95 73057->73058 73059 6c3fd69e 73058->73059 73060 6c3fcf9d 73058->73060 73062 6c3fd6ab 73059->73062 73152 6c3f1384 74 API calls 73059->73152 73061 6c3e87c5 95 API calls 73060->73061 73068 6c3fcfc6 73061->73068 73065 6c3e2126 27 API calls 73062->73065 73064 6c3fd02b 73071 6c3fd03e _memcpy_s 73064->73071 73146 6c3f1384 74 API calls 73064->73146 73073 6c3fd042 73065->73073 73067 6c3fe483 95 API calls 73067->73068 73068->73064 73068->73067 73074 6c3e87c5 95 API calls 73068->73074 73145 6c3fe5a0 95 API calls 2 library calls 73068->73145 73070 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 73072 6c3fd6dd 73070->73072 73071->73073 73117 6c3e3de9 73071->73117 73073->73070 73074->73068 73076 6c3fd0ee _memcpy_s 73123 6c3fd9aa 73076->73123 73079 6c3e3833 27 API calls 73080 6c3fd12c 73079->73080 73126 6c3fd928 73080->73126 73082 6c3fd278 73130 6c3fd8dd 73082->73130 73083 6c432aa8 27 API calls std::_Facet_Register 73094 6c3fd170 _memcpy_s 73083->73094 73086 6c3e83e7 27 API calls 73086->73094 73093 6c3e3833 27 API calls 73093->73094 73094->73082 73094->73083 73094->73086 73094->73093 73147 6c41f7a5 27 API calls 3 library calls 73094->73147 73118 6c3e3df5 __EH_prolog3 73117->73118 73153 6c427bd6 73118->73153 73120 6c3e3dff 73161 6c4214a1 73120->73161 73122 6c3e3e14 std::locale::_Init 73122->73076 73291 6c3fd9d0 73123->73291 73127 6c3fd934 __EH_prolog3 73126->73127 73128 6c3e855b 14 API calls 73127->73128 73129 6c3fd95c std::locale::_Init 73128->73129 73129->73094 73326 6c3fdb20 73130->73326 73145->73068 73146->73071 73147->73094 73152->73062 73154 6c427be2 __EH_prolog3 73153->73154 73155 6c40c21a std::_String_base::_Xlen 27 API calls 73154->73155 73156 6c427bee 73155->73156 73157 6c432aa8 std::_Facet_Register 27 API calls 73156->73157 73158 6c427c18 73157->73158 73159 6c3fcbc3 27 API calls 73158->73159 73160 6c427c2b _memcpy_s std::locale::_Init 73158->73160 73159->73160 73160->73120 73162 6c4214ad __EH_prolog3 73161->73162 73163 6c3e850c 15 API calls 73162->73163 73164 6c4214ba 73163->73164 73167 6c421466 73164->73167 73166 6c4214cc std::locale::_Init 73166->73122 73168 6c421472 __EH_prolog3 73167->73168 73175 6c421243 73168->73175 73174 6c42149b std::locale::_Init 73174->73166 73176 6c40c21a std::_String_base::_Xlen 27 API calls 73175->73176 73177 6c421252 73176->73177 73205 6c4211da 73177->73205 73179 6c421260 73180 6c42138b 73179->73180 73181 6c421397 __EH_prolog3_GS 73180->73181 73182 6c4213b6 BCryptGenRandom 73181->73182 73185 6c4329ba 5 API calls 73181->73185 73183 6c4213cb 73182->73183 73184 6c42140e 73182->73184 73186 6c4334b6 std::_String_base::_Xlen 5 API calls 73183->73186 73188 6c421414 SetLastError 73184->73188 73187 6c4213de 73185->73187 73189 6c4213d0 73186->73189 73187->73182 73191 6c4211da 30 API calls 73187->73191 73190 6c3e9279 std::_String_base::_Xlen 27 API calls 73188->73190 73202 6c42134f 73189->73202 73192 6c421429 73190->73192 73193 6c4213f6 73191->73193 73194 6c421284 28 API calls 73192->73194 73195 6c432ef2 28 API calls 73193->73195 73196 6c42143c 73194->73196 73197 6c421400 73195->73197 73198 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 73196->73198 73290 6c432970 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 73197->73290 73200 6c42144a 73198->73200 73201 6c42140a 73201->73182 73203 6c421354 BCryptCloseAlgorithmProvider 73202->73203 73204 6c42135d 73202->73204 73203->73204 73204->73174 73223 6c43350c 73205->73223 73207 6c4211e6 BCryptOpenAlgorithmProvider 73208 6c421201 73207->73208 73209 6c421209 73207->73209 73210 6c4334b6 std::_String_base::_Xlen 5 API calls 73208->73210 73211 6c42120f SetLastError 73209->73211 73212 6c421208 73210->73212 73213 6c3e9279 std::_String_base::_Xlen 27 API calls 73211->73213 73212->73179 73214 6c421224 73213->73214 73224 6c421284 73214->73224 73217 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 73218 6c421242 73217->73218 73219 6c40c21a std::_String_base::_Xlen 27 API calls 73218->73219 73220 6c421252 73219->73220 73221 6c4211da 28 API calls 73220->73221 73222 6c421260 73221->73222 73222->73179 73223->73207 73251 6c43350c 73224->73251 73226 6c421293 GetLastError 73252 6c40b184 73226->73252 73232 6c4212e1 73233 6c3ebf8b 27 API calls 73232->73233 73234 6c4212f4 73233->73234 73274 6c3ebfc7 73234->73274 73237 6c3e2e5f std::_String_base::_Xlen 27 API calls 73238 6c421314 73237->73238 73239 6c3eaaf0 25 API calls 73238->73239 73240 6c42131c 73239->73240 73241 6c3eaaf0 25 API calls 73240->73241 73242 6c421324 73241->73242 73243 6c3eaaf0 25 API calls 73242->73243 73244 6c42132c 73243->73244 73245 6c3eaaf0 25 API calls 73244->73245 73246 6c421334 73245->73246 73247 6c3eaaf0 25 API calls 73246->73247 73248 6c42133f 73247->73248 73249 6c4334b6 std::_String_base::_Xlen 5 API calls 73248->73249 73250 6c421234 73249->73250 73250->73217 73251->73226 73253 6c40b190 __EH_prolog3_GS 73252->73253 73254 6c40b1b5 73253->73254 73258 6c40b1d6 73253->73258 73255 6c3ead9e std::_String_base::_Xlen 27 API calls 73254->73255 73257 6c40b1d1 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 73255->73257 73259 6c4334b6 std::_String_base::_Xlen 5 API calls 73257->73259 73262 6c3eaaf0 25 API calls 73258->73262 73263 6c40b238 73258->73263 73277 6c3e1744 27 API calls std::_Xinvalid_argument 73258->73277 73278 6c3eaef5 25 API calls 73258->73278 73261 6c40b284 73259->73261 73265 6c3ebf43 73261->73265 73262->73258 73263->73257 73279 6c3e168d 25 API calls 2 library calls 73263->73279 73266 6c3e1744 73265->73266 73266->73265 73266->73266 73267 6c3ebf68 73266->73267 73280 6c4067c6 27 API calls 2 library calls 73266->73280 73281 6c3ed7fd 27 API calls 3 library calls 73267->73281 73270 6c3ebf86 73271 6c3ebf8b 73270->73271 73272 6c3e91e1 27 API calls 73271->73272 73273 6c3ebf98 73272->73273 73273->73232 73282 6c3ed6a4 73274->73282 73276 6c3ebfdb 73276->73237 73277->73258 73278->73258 73279->73257 73281->73270 73283 6c3ed6e2 73282->73283 73284 6c3ed7f7 73283->73284 73285 6c3ed782 std::_String_base::_Xlen 73283->73285 73289 6c3ed6e7 _Yarn 73283->73289 73286 6c3e1744 std::_String_base::_Xlen 27 API calls 73284->73286 73288 6c3ecdc9 std::invalid_argument::invalid_argument 27 API calls 73285->73288 73287 6c3ed7fc 73286->73287 73288->73289 73289->73276 73290->73201 73292 6c40c21a std::_String_base::_Xlen 27 API calls 73291->73292 73293 6c3fd9e2 73292->73293 73296 6c3fd9f1 73293->73296 73295 6c3fd114 73295->73079 73297 6c3fd9fd __EH_prolog3 73296->73297 73298 6c3e9327 27 API calls 73297->73298 73299 6c3fda35 73298->73299 73314 6c3fdb72 73299->73314 73302 6c40e6fd 27 API calls 73303 6c3fda7d 73302->73303 73304 6c40e6fd 27 API calls 73303->73304 73305 6c3fda8c 73304->73305 73306 6c40e6fd 27 API calls 73305->73306 73307 6c3fda9b 73306->73307 73308 6c40e6fd 27 API calls 73307->73308 73309 6c3fdaaa 73308->73309 73310 6c40e6fd 27 API calls 73309->73310 73311 6c3fdab9 73310->73311 73312 6c40e6fd 27 API calls 73311->73312 73313 6c3fdac8 std::locale::_Init 73312->73313 73313->73295 73317 6c42d6a2 73314->73317 73316 6c3fda41 73316->73302 73318 6c42d6ae __EH_prolog3 73317->73318 73319 6c40c21a std::_String_base::_Xlen 27 API calls 73318->73319 73320 6c42d6c0 73319->73320 73321 6c432aa8 std::_Facet_Register 27 API calls 73320->73321 73322 6c42d6f9 73321->73322 73323 6c42d70e std::locale::_Init 73322->73323 73325 6c42d752 15 API calls 73322->73325 73323->73316 73325->73323 73327 6c3e855b 14 API calls 73326->73327 73328 6c3fdb2e 73327->73328 73329 6c3e855b 14 API calls 73328->73329 73330 6c3fdb39 73329->73330 73331 6c3e855b 14 API calls 73330->73331 73332 6c3fdb44 73331->73332 73333 6c3e855b 14 API calls 73332->73333 73334 6c3fdb4f 73333->73334 73335 6c3e855b 14 API calls 73334->73335 73336 6c3fdb5a 73335->73336 73337 6c3e855b 14 API calls 73336->73337 73338 6c3fdb62 73337->73338 73579 6c3e1005 73580 6c432ef2 28 API calls 73579->73580 73581 6c3e100a 73580->73581 73584 6c3e2b49 73581->73584 73585 6c3e2b87 73584->73585 73586 6c3e2b74 WSAStartup 73584->73586 73587 6c432871 CatchGuardHandler 5 API calls 73585->73587 73586->73585 73588 6c3e100f 73587->73588 73589 6c43347e 73590 6c433487 73589->73590 73591 6c43348c 73589->73591 73606 6c433e53 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 73590->73606 73595 6c433348 73591->73595 73596 6c433354 ___unDNameEx 73595->73596 73597 6c43337d dllmain_raw 73596->73597 73602 6c433363 73596->73602 73603 6c433378 __DllMainCRTStartup@12 73596->73603 73598 6c433397 dllmain_crt_dispatch 73597->73598 73597->73602 73598->73602 73598->73603 73599 6c4333e9 73600 6c4333f2 dllmain_crt_dispatch 73599->73600 73599->73602 73601 6c433405 dllmain_raw 73600->73601 73600->73602 73601->73602 73603->73599 73607 6c433298 73603->73607 73605 6c4333de dllmain_raw 73605->73599 73606->73591 73608 6c4332a4 ___unDNameEx __DllMainCRTStartup@12 73607->73608 73609 6c433340 73608->73609 73610 6c4332d5 73608->73610 73622 6c4332ad 73608->73622 73639 6c433b06 IsProcessorFeaturePresent 73609->73639 73630 6c432cfc 73610->73630 73613 6c433347 ___unDNameEx 73617 6c43337d dllmain_raw 73613->73617 73626 6c433378 __DllMainCRTStartup@12 73613->73626 73627 6c433363 73613->73627 73614 6c4332da 73643 6c432a9c 15 API calls ___std_type_info_destroy_list 73614->73643 73616 6c4332df __RTC_Initialize __DllMainCRTStartup@12 73644 6c432e9d 74 API calls ___scrt_uninitialize_crt 73616->73644 73618 6c433397 dllmain_crt_dispatch 73617->73618 73617->73627 73618->73626 73618->73627 73620 6c4332fe 73645 6c43333a 12 API calls __DllMainCRTStartup@12 73620->73645 73622->73605 73623 6c4333e9 73624 6c4333f2 dllmain_crt_dispatch 73623->73624 73623->73627 73625 6c433405 dllmain_raw 73624->73625 73624->73627 73625->73627 73626->73623 73628 6c433298 __DllMainCRTStartup@12 80 API calls 73626->73628 73627->73605 73629 6c4333de dllmain_raw 73628->73629 73629->73623 73631 6c432d01 ___scrt_release_startup_lock 73630->73631 73632 6c432d05 73631->73632 73635 6c432d11 __DllMainCRTStartup@12 73631->73635 73659 6c475753 73632->73659 73636 6c432d1e 73635->73636 73646 6c474c13 73635->73646 73636->73614 73640 6c433b1c _memcpy_s IsInExceptionSpec 73639->73640 73641 6c433bc7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 73640->73641 73642 6c433c12 IsInExceptionSpec 73641->73642 73642->73613 73643->73616 73644->73620 73645->73622 73647 6c474c33 73646->73647 73648 6c474c21 73646->73648 73662 6c474ad9 73647->73662 73670 6c474cb9 GetModuleHandleW 73648->73670 73652 6c474c26 73652->73647 73671 6c474cfc GetModuleHandleExW GetProcAddress FreeLibrary 73652->73671 73653 6c474c6e 73672 6c474c77 13 API calls IsInExceptionSpec 73653->73672 73654 6c474c6c 73654->73614 73657 6c474c32 73657->73647 73679 6c475484 73659->73679 73663 6c474ae5 ___unDNameEx 73662->73663 73673 6c470f97 EnterCriticalSection 73663->73673 73665 6c474aef 73674 6c474b26 73665->73674 73667 6c474afc 73678 6c474b1a LeaveCriticalSection std::_Lockit::~_Lockit 73667->73678 73669 6c474b08 73669->73653 73669->73654 73670->73652 73671->73657 73673->73665 73675 6c474b32 ___unDNameEx 73674->73675 73676 6c474b93 IsInExceptionSpec 73675->73676 73677 6c475753 __DllMainCRTStartup@12 14 API calls 73675->73677 73676->73667 73677->73676 73678->73669 73680 6c475490 ___unDNameEx 73679->73680 73687 6c470f97 EnterCriticalSection 73680->73687 73682 6c47549e 73688 6c475663 73682->73688 73686 6c432d0f 73686->73614 73687->73682 73689 6c4754ab 73688->73689 73690 6c475682 73688->73690 73692 6c4754d3 LeaveCriticalSection std::_Lockit::~_Lockit 73689->73692 73690->73689 73691 6c47a768 _free 14 API calls 73690->73691 73691->73689 73692->73686 73693 6c403efd 73694 6c403f0c __EH_prolog3_GS 73693->73694 73695 6c40379f 31 API calls 73694->73695 73696 6c403f14 73695->73696 73697 6c403f1a 73696->73697 73698 6c3f9da9 30 API calls 73696->73698 73699 6c4334b6 std::_String_base::_Xlen 5 API calls 73697->73699 73706 6c403f2f 73698->73706 73700 6c404037 73699->73700 73702 6c403f8e 73710 6c403f57 73702->73710 73711 6c3e44a9 73702->73711 73703 6c3eaaf0 25 API calls 73704 6c404022 73703->73704 73707 6c3e2dde 30 API calls 73704->73707 73705 6c403fcd _memcpy_s 73716 6c3e453e 73705->73716 73706->73702 73706->73710 73772 6c3fdf13 29 API calls 73706->73772 73707->73697 73710->73703 73712 6c3e4539 73711->73712 73713 6c3e44b7 73711->73713 73712->73705 73714 6c3e7ed1 _memcpy_s 73713->73714 73715 6c3eaa01 25 API calls 73713->73715 73714->73705 73715->73713 73717 6c3f121d 111 API calls 73716->73717 73718 6c3e457c 73717->73718 73719 6c3e4580 73718->73719 73720 6c3e45d3 73718->73720 73773 6c3e6f9b 111 API calls CatchGuardHandler 73718->73773 73721 6c432871 CatchGuardHandler 5 API calls 73719->73721 73774 6c3e57d4 262 API calls 3 library calls 73720->73774 73724 6c3e4b1b 73721->73724 73724->73710 73725 6c3e4607 73775 6c3f5147 94 API calls Concurrency::cancel_current_task 73725->73775 73727 6c3e4623 73728 6c3e9279 std::_String_base::_Xlen 27 API calls 73727->73728 73729 6c3e4637 73728->73729 73776 6c3f5444 71 API calls 73729->73776 73731 6c3e465a 73732 6c3e91e1 27 API calls 73731->73732 73733 6c3e466a 73732->73733 73777 6c3ec328 69 API calls UnDecorator::getSymbolName 73733->73777 73735 6c3e467e 73736 6c3e91e1 27 API calls 73735->73736 73737 6c3e4690 73736->73737 73738 6c3e601a 372 API calls 73737->73738 73739 6c3e46a8 73738->73739 73740 6c3e4729 73739->73740 73778 6c3e57d4 262 API calls 3 library calls 73739->73778 73780 6c3f5264 158 API calls CatchGuardHandler 73740->73780 73743 6c3e46ea 73744 6c3e91e1 27 API calls 73743->73744 73745 6c3e46fa 73744->73745 73779 6c3f5444 71 API calls 73745->73779 73746 6c3e4758 _memcpy_s 73759 6c3e475c 73746->73759 73781 6c3f4a25 20 API calls 73746->73781 73747 6c45e1aa Concurrency::cancel_current_task KiUserExceptionDispatcher 73749 6c3e4b3a 73747->73749 73750 6c3e4716 73751 6c3eaaf0 25 API calls 73750->73751 73753 6c3e471e 73751->73753 73754 6c3eaaf0 25 API calls 73753->73754 73754->73740 73755 6c3e47f5 73756 6c3e4a98 73755->73756 73757 6c3e4a2f 73755->73757 73755->73759 73756->73719 73756->73759 73782 6c3f4968 14 API calls std::locale::_Locimp::~_Locimp 73757->73782 73759->73747 73760 6c3e4a5b 73761 6c3eaaf0 25 API calls 73760->73761 73762 6c3e4a63 73761->73762 73763 6c3eaaf0 25 API calls 73762->73763 73764 6c3e4a6e 73763->73764 73783 6c3f5254 96 API calls 73764->73783 73766 6c3e4a76 73767 6c3eaaf0 25 API calls 73766->73767 73768 6c3e4a7e 73767->73768 73769 6c3eaaf0 25 API calls 73768->73769 73770 6c3e4a89 73769->73770 73771 6c3eaaf0 25 API calls 73770->73771 73771->73719 73772->73702 73773->73720 73774->73725 73775->73727 73776->73731 73777->73735 73778->73743 73779->73750 73780->73746 73781->73755 73782->73760 73783->73766 73784 6c43313e 73785 6c433149 73784->73785 73786 6c43317c 73784->73786 73788 6c43316e 73785->73788 73789 6c43314e 73785->73789 73787 6c433298 __DllMainCRTStartup@12 85 API calls 73786->73787 73795 6c433158 73787->73795 73796 6c433191 73788->73796 73790 6c433153 73789->73790 73791 6c433164 73789->73791 73790->73795 73810 6c432cbb 21 API calls 73790->73810 73811 6c432c9c 23 API calls 73791->73811 73797 6c43319d ___unDNameEx 73796->73797 73812 6c432d2c 73797->73812 73799 6c4331a4 __DllMainCRTStartup@12 73800 6c433290 73799->73800 73801 6c4331cb 73799->73801 73807 6c433207 ___scrt_is_nonwritable_in_current_image IsInExceptionSpec 73799->73807 73803 6c433b06 __DllMainCRTStartup@12 4 API calls 73800->73803 73820 6c432c8e 73801->73820 73804 6c433297 73803->73804 73805 6c4331da __RTC_Initialize 73805->73807 73823 6c432a90 InitializeSListHead 73805->73823 73807->73795 73808 6c4331e8 73808->73807 73824 6c432c63 73808->73824 73810->73795 73811->73795 73813 6c432d35 73812->73813 73828 6c433c29 IsProcessorFeaturePresent 73813->73828 73815 6c432d41 73829 6c45fddd 10 API calls 2 library calls 73815->73829 73817 6c432d46 73818 6c432d4a 73817->73818 73830 6c45fe12 7 API calls 2 library calls 73817->73830 73818->73799 73831 6c432d65 73820->73831 73822 6c432c95 73822->73805 73823->73808 73825 6c432c68 ___scrt_release_startup_lock 73824->73825 73827 6c432c71 73825->73827 73837 6c433c29 IsProcessorFeaturePresent 73825->73837 73827->73807 73828->73815 73829->73817 73830->73818 73832 6c432d71 73831->73832 73833 6c432d75 73831->73833 73832->73822 73834 6c433b06 __DllMainCRTStartup@12 4 API calls 73833->73834 73836 6c432d82 ___scrt_release_startup_lock 73833->73836 73835 6c432deb 73834->73835 73836->73822 73837->73827
                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3E6024
                                                                    • Part of subcall function 6C3F121D: __EH_prolog3_catch_GS.LIBCMT ref: 6C3F1227
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C3E62ED
                                                                    • Part of subcall function 6C3EFC24: __EH_prolog3_catch_GS.LIBCMT ref: 6C3EFC2E
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C3E6498
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_catch_$H_prolog3_
                                                                  • String ID: #$$$&old_ablock=$&pv_id=$code$err$fail$method=limelm.activation.isgenuine&ablock=$rsp$stat
                                                                  • API String ID: 3815088364-3383030943
                                                                  • Opcode ID: eb3a3dd2c0f278a98afad0f5ba63260c40ffbda9ca3cf719b50140daf8c2fee7
                                                                  • Instruction ID: dcef6b9ae48f795ffb2c5cbff7c72b9a31db389f181f73c2451c481884f9ebe8
                                                                  • Opcode Fuzzy Hash: eb3a3dd2c0f278a98afad0f5ba63260c40ffbda9ca3cf719b50140daf8c2fee7
                                                                  • Instruction Fuzzy Hash: E962D171D0526D9EDF15DF64C850FEDBBB8AF09308F00419BD189A7A41EB319A89CF92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C4211E1
                                                                  • BCryptOpenAlgorithmProvider.BCRYPT(?,RNG,Microsoft Primitive Provider,00000000,00000044,6C421260,00000001,?,?,6C42147A,00000008,6C4214CC,?,?,00000000,00000000), ref: 6C4211F8
                                                                  • SetLastError.KERNEL32(00000000,?,RNG,Microsoft Primitive Provider,00000000,00000044,6C421260,00000001,?,?,6C42147A,00000008,6C4214CC,?,?,00000000), ref: 6C421211
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AlgorithmCryptErrorH_prolog3_LastOpenProvider
                                                                  • String ID: BCryptOpenAlgorithmProvider$Microsoft Primitive Provider$RNG
                                                                  • API String ID: 1882466918-2191745741
                                                                  • Opcode ID: 49a0ce3ee48bcc3ea4715cf1d6867cd926f31fd883433b0dfc331058ea70b4bb
                                                                  • Instruction ID: 9e1e3b530d0acb28b82cd47c58731265b2840fcf1c8c6d44b31123a87447113f
                                                                  • Opcode Fuzzy Hash: 49a0ce3ee48bcc3ea4715cf1d6867cd926f31fd883433b0dfc331058ea70b4bb
                                                                  • Instruction Fuzzy Hash: 3201A272901224A7DB14EBE0CC06FDD77789F1872AF20051EF546A6E80DFB9D90987E1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C421392
                                                                  • BCryptGenRandom.BCRYPT(?,00000000,00000000,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000,00000010,6C3E3E14,00000000), ref: 6C4213C2
                                                                  • SetLastError.KERNEL32(00000000,?,00000000,00000000,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000,00000010,6C3E3E14), ref: 6C421416
                                                                    • Part of subcall function 6C421284: __EH_prolog3_GS.LIBCMT ref: 6C42128E
                                                                    • Part of subcall function 6C421284: GetLastError.KERNEL32(00000010,00000080,6C421234,0000000F,BCryptOpenAlgorithmProvider,?,RNG,Microsoft Primitive Provider,00000000,00000044,6C421260,00000001,?,?,6C42147A,00000008), ref: 6C4212A6
                                                                    • Part of subcall function 6C45E1AA: KiUserExceptionDispatcher.NTDLL(E06D7363,00000001,00000003,6C3E165C,00000000,6C3E2DF5,?,6C3E165C,00000008,6C4DC3E0,00000008), ref: 6C45E20A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorH_prolog3_Last$CryptDispatcherExceptionRandomUser
                                                                  • String ID: BCryptGenRandom
                                                                  • API String ID: 4153316143-3013187443
                                                                  • Opcode ID: f053efbd189bcd72ebdea85cde1c3ac55c974cc24f73f6cc582f40699b3402d9
                                                                  • Instruction ID: d4559829453234a21a88c2edb937ebbfdc8d1a965c33a988332d1f5dca7cb4c5
                                                                  • Opcode Fuzzy Hash: f053efbd189bcd72ebdea85cde1c3ac55c974cc24f73f6cc582f40699b3402d9
                                                                  • Instruction Fuzzy Hash: 0211C4719001249BDB10EBA1C845FDD7B35AB4A329F11460DE906A7FC1CF39DD098AA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,6C3F1C7A,00000000,00000000), ref: 6C3F192B
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,6C3F1C7A,00000000,00000000,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010), ref: 6C3F193A
                                                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,?,?,6C3F1C7A,00000000,00000000,?,?,?,00000000), ref: 6C3F197A
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,6C3F1C7A,00000000,00000000,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010), ref: 6C3F198B
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,6C3F1C7A,00000000,00000000,?,?,?,00000000), ref: 6C3F19FB
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,6C3F1C7A,00000000,00000000), ref: 6C3F1A12
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,6C3F1C7A,00000000,00000000), ref: 6C3F1A1D
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,6C3F1C7A,00000000,00000000), ref: 6C3F1A58
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,6C3F1C7A,00000000,00000000), ref: 6C3F1A5F
                                                                  • __EH_prolog3.LIBCMT ref: 6C3F1A8C
                                                                  • SetEvent.KERNEL32(?,00000000), ref: 6C3F1A9E
                                                                  • SetEvent.KERNEL32(?), ref: 6C3F1AB7
                                                                  • SleepEx.KERNEL32(000000FF,00000001), ref: 6C3F1AC1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Event$CloseErrorLast$CreateHandle$ChangeFindH_prolog3NotificationObjectSingleSleepWait
                                                                  • String ID: $8Il$thread$thread.entry_event$thread.exit_event
                                                                  • API String ID: 2093325805-2471605969
                                                                  • Opcode ID: 4369ad45614d0b7020d6198fdbc15665bcf3e648fc6fe64d7b2660ed2477b048
                                                                  • Instruction ID: 62396479739075767efd061bf9b070296131488470bf95dacbcced806652eb3c
                                                                  • Opcode Fuzzy Hash: 4369ad45614d0b7020d6198fdbc15665bcf3e648fc6fe64d7b2660ed2477b048
                                                                  • Instruction Fuzzy Hash: 4051B1762053209FCB00DF24C888F9A7BB4EF9A358F10495DF9589B651CB31D945CFA6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • SHGetFolderPathW.SHELL32(00000000,00008023,00000000,00000000,00000000,?,?,?,?), ref: 6C3F0927
                                                                  • PathAppendW.SHLWAPI(00000000,icsxml,?,?,?,?), ref: 6C3F0937
                                                                  • PathAppendW.SHLWAPI(00000000,?,?,?,?,?), ref: 6C3F094F
                                                                    • Part of subcall function 6C3F0842: PathAppendW.SHLWAPI(00000000,?,?,?,?,?), ref: 6C3F0886
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Path$Append$Folder
                                                                  • String ID: icsxml
                                                                  • API String ID: 2044587772-4153736367
                                                                  • Opcode ID: 35c552679115fecfac938311722d8f86e45ccffe8ee78e294f791337b23c5c61
                                                                  • Instruction ID: 4f7a90e4a57258b05c4f65b62c1ef547814326477af19b927486247500b485e8
                                                                  • Opcode Fuzzy Hash: 35c552679115fecfac938311722d8f86e45ccffe8ee78e294f791337b23c5c61
                                                                  • Instruction Fuzzy Hash: CC410C35205251AADB24DF6ACC49D6BBB7CFF56B44705840DFD188E615FB20C805CB7A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • SHGetFolderPathW.SHELL32(00000000,00008023,00000000,00000000,00000000,?,?,?,00000000,6C3F1247,000000EC,6C3E604B,000000FC,6C3EFB7D,?,?), ref: 6C3F0AAF
                                                                  • PathAppendW.SHLWAPI(00000000,ms-drivers,?,?,?,00000000,6C3F1247,000000EC,6C3E604B,000000FC,6C3EFB7D,?,?,?,00000022,0000000C), ref: 6C3F0ABF
                                                                  • PathAppendW.SHLWAPI(00000000,89FFFFFF,?,?,?,00000000,6C3F1247,000000EC,6C3E604B,000000FC,6C3EFB7D,?,?,?,00000022,0000000C), ref: 6C3F0AD5
                                                                    • Part of subcall function 6C3F0842: PathAppendW.SHLWAPI(00000000,?,?,?,?,?), ref: 6C3F0886
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Path$Append$Folder
                                                                  • String ID: ms-drivers
                                                                  • API String ID: 2044587772-364016472
                                                                  • Opcode ID: 899683d6e4c7b550d1b3b2f026220cfecd3d1494758569623fb28402408a73e9
                                                                  • Instruction ID: 0509fc17de843ddba7b9bf057692f59fcad0ac856423ad27ba5150daff1686b8
                                                                  • Opcode Fuzzy Hash: 899683d6e4c7b550d1b3b2f026220cfecd3d1494758569623fb28402408a73e9
                                                                  • Instruction Fuzzy Hash: 99412C25204261BADB24DF2ACC89E6B7BBCFF57B58B01404DF914CA655EB20C805C77B
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 422 6c440e3e-6c440e52 GetModuleHandleW 423 6c440f68-6c440f6b 422->423 424 6c440e58-6c440e7b GetProcAddress call 6c476086 422->424 427 6c440e7d-6c440e7f 424->427 428 6c440e8e-6c440e90 424->428 429 6c440e85-6c440e8c LoadLibraryW 427->429 430 6c440e81-6c440e83 427->430 431 6c440eb2-6c440ec2 GetSystemDirectoryW 428->431 432 6c440e92-6c440ea0 GetProcAddress 428->432 434 6c440eab-6c440ead 429->434 433 6c440ea7-6c440ea9 LoadLibraryExW 430->433 436 6c440f64-6c440f67 431->436 437 6c440ec8-6c440eca 431->437 432->431 435 6c440ea2 432->435 433->434 434->436 435->433 436->423 438 6c440ecd-6c440ed6 437->438 438->438 439 6c440ed8-6c440ef2 438->439 441 6c440ef4-6c440f01 GetSystemDirectoryW 439->441 442 6c440f5c-6c440f63 439->442 441->442 443 6c440f03-6c440f05 441->443 442->436 445 6c440f08-6c440f11 443->445 445->445 446 6c440f13-6c440f20 445->446 447 6c440f23-6c440f2c 446->447 447->447 448 6c440f2e-6c440f36 447->448 449 6c440f38-6c440f45 448->449 449->449 450 6c440f47-6c440f49 449->450 451 6c440f53-6c440f54 LoadLibraryW 450->451 452 6c440f4b-6c440f51 450->452 453 6c440f5a 451->453 452->453 453->442
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(kernel32,00000000,1A85EC53,security.dll,6C4530C7,security.dll,00000004,00000000,00000002,00000002,6C440FF1), ref: 6C440E48
                                                                  • GetProcAddress.KERNEL32(00000000,LoadLibraryExW), ref: 6C440E60
                                                                  • LoadLibraryW.KERNEL32(?), ref: 6C440E86
                                                                  • GetProcAddress.KERNEL32(00000000,AddDllDirectory), ref: 6C440E98
                                                                  • LoadLibraryExW.KERNELBASE(?,00000000,00000800), ref: 6C440EA9
                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 6C440EB4
                                                                  • GetSystemDirectoryW.KERNEL32(00000000,?), ref: 6C440EF9
                                                                  • LoadLibraryW.KERNEL32(00000000), ref: 6C440F54
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad$AddressDirectoryProcSystem$HandleModule
                                                                  • String ID: AddDllDirectory$LoadLibraryExW$kernel32$security.dll
                                                                  • API String ID: 2935377145-2479812082
                                                                  • Opcode ID: 2e9e3a30130a19771b184e7e735e97084edd56942e73604c8e63c4f664578724
                                                                  • Instruction ID: e232e51ba64e9812843397a7c2de0a5fbb45394fcdf7cd03912187e239a058c0
                                                                  • Opcode Fuzzy Hash: 2e9e3a30130a19771b184e7e735e97084edd56942e73604c8e63c4f664578724
                                                                  • Instruction Fuzzy Hash: EA31483520539257FB24EF288C89F7B7778EF65706B34852DED0282B41EFB1A422C695
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 455 6c47848c-6c4784bc call 6c4781da 458 6c4784d7-6c4784e3 call 6c47f887 455->458 459 6c4784be-6c4784c9 call 6c46a386 455->459 465 6c4784e5-6c4784fa call 6c46a386 call 6c46a399 458->465 466 6c4784fc-6c478545 call 6c478145 458->466 464 6c4784cb-6c4784d2 call 6c46a399 459->464 473 6c4787b1-6c4787b5 464->473 465->464 475 6c478547-6c478550 466->475 476 6c4785b2-6c4785bb GetFileType 466->476 477 6c478587-6c4785ad GetLastError call 6c46a363 475->477 478 6c478552-6c478556 475->478 479 6c478604-6c478607 476->479 480 6c4785bd-6c4785ee GetLastError call 6c46a363 CloseHandle 476->480 477->464 478->477 482 6c478558-6c478585 call 6c478145 478->482 485 6c478610-6c478616 479->485 486 6c478609-6c47860e 479->486 480->464 494 6c4785f4-6c4785ff call 6c46a399 480->494 482->476 482->477 487 6c47861a-6c478668 call 6c47f7d2 485->487 488 6c478618 485->488 486->487 497 6c478687-6c4786af call 6c477ef2 487->497 498 6c47866a-6c478676 call 6c478354 487->498 488->487 494->464 505 6c4786b4-6c4786f5 497->505 506 6c4786b1-6c4786b2 497->506 498->497 504 6c478678 498->504 507 6c47867a-6c478682 call 6c47a8bb 504->507 508 6c4786f7-6c4786fb 505->508 509 6c478716-6c478724 505->509 506->507 507->473 508->509 510 6c4786fd-6c478711 508->510 511 6c4787af 509->511 512 6c47872a-6c47872e 509->512 510->509 511->473 512->511 514 6c478730-6c478763 CloseHandle call 6c478145 512->514 518 6c478797-6c4787ab 514->518 519 6c478765-6c478791 GetLastError call 6c46a363 call 6c47f99a 514->519 518->511 519->518
                                                                  APIs
                                                                    • Part of subcall function 6C478145: CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000), ref: 6C478162
                                                                  • GetLastError.KERNEL32 ref: 6C4785A0
                                                                  • __dosmaperr.LIBCMT ref: 6C4785A7
                                                                  • GetFileType.KERNELBASE(00000000), ref: 6C4785B3
                                                                  • GetLastError.KERNEL32 ref: 6C4785BD
                                                                  • __dosmaperr.LIBCMT ref: 6C4785C6
                                                                  • CloseHandle.KERNEL32(00000000), ref: 6C4785E6
                                                                  • CloseHandle.KERNEL32(?), ref: 6C478733
                                                                  • GetLastError.KERNEL32 ref: 6C478765
                                                                  • __dosmaperr.LIBCMT ref: 6C47876C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                  • String ID: H
                                                                  • API String ID: 4237864984-2852464175
                                                                  • Opcode ID: 7134c85fd5ccb08fa526dc67d8e4c09fbf25ff3eb0d2011add5fcf5bf3b035c4
                                                                  • Instruction ID: d493abd06e81fa20c98400ebd2d95fd8b7738102147abdcb844e9ece07ebf1d4
                                                                  • Opcode Fuzzy Hash: 7134c85fd5ccb08fa526dc67d8e4c09fbf25ff3eb0d2011add5fcf5bf3b035c4
                                                                  • Instruction Fuzzy Hash: 4EA11332A041549FCF29DF6CC851FDD3BB1EB0A328F19025EE811AB791DB358856CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • SHGetFolderPathW.SHELL32(00000000,00008023,00000000,00000000,00000000,9634BA50,00000000,00000000,00000000,?,?,?,?,0000009C,6C48D9EF,000000FF), ref: 6C3FEA04
                                                                  • PathAppendW.SHLWAPI(00000000,DIBsection,?,?,?,?,0000009C,6C48D9EF,000000FF,?,6C3FFC77,9634BA50,00000000,00000000,00000000), ref: 6C3FEA1A
                                                                  • PathAppendW.SHLWAPI(00000000,0000000F,?,?,?,?,0000009C,6C48D9EF,000000FF,?,6C3FFC77,9634BA50,00000000,00000000,00000000), ref: 6C3FEA23
                                                                  • SHGetFolderPathW.SHELL32(00000000,0000801A,00000000,00000000,00000000,?,?,?,?,0000009C,6C48D9EF,000000FF,?,6C3FFC77,9634BA50,00000000), ref: 6C3FEA46
                                                                  • PathAppendW.SHLWAPI(00000000,0000000F,?,?,?,?,0000009C,6C48D9EF,000000FF,?,6C3FFC77,9634BA50,00000000,00000000,00000000), ref: 6C3FEA57
                                                                  • SHGetFolderPathW.SHELL32(00000000,0000801C,00000000,00000000,00000000,?,?,?,?,0000009C,6C48D9EF,000000FF,?,6C3FFC77,9634BA50,00000000), ref: 6C3FEA74
                                                                  • PathAppendW.SHLWAPI(00000000,0000000F,?,?,?,?,0000009C,6C48D9EF,000000FF,?,6C3FFC77,9634BA50,00000000,00000000,00000000), ref: 6C3FEA90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Path$Append$Folder
                                                                  • String ID: DIBsection
                                                                  • API String ID: 2044587772-3712817905
                                                                  • Opcode ID: 628077e8d08002e9aeb0f55fd1bb22475192522fb93f7080660ffb7689860357
                                                                  • Instruction ID: 8fd374e07ff1d4e52d6030aa1ddf6aba28d40c2207ef4ba587959aed0792b1df
                                                                  • Opcode Fuzzy Hash: 628077e8d08002e9aeb0f55fd1bb22475192522fb93f7080660ffb7689860357
                                                                  • Instruction Fuzzy Hash: CE21C172205615BFEB15DE79CC08EAB77ACFF0A614B00852AF914C3A80EB24D80587E4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3F9CA9
                                                                  • EnterCriticalSection.KERNEL32(?,00000028,6C3FB167,6C3FB027,?,6C3FACB2,?,6C3FB027,?), ref: 6C3F9CBA
                                                                  • CreateWaitableTimerW.KERNEL32(00000000,00000000,00000000), ref: 6C3F9CDA
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 6C3F9CE7
                                                                  • SetWaitableTimer.KERNELBASE(00000001,?,000493E0,00000000,00000000,00000000), ref: 6C3F9D29
                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 6C3F9D8D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prolog3_LastLeave
                                                                  • String ID: $8Il$timer
                                                                  • API String ID: 4180268499-2061383782
                                                                  • Opcode ID: e234ea09d342b4473b2319b8e638053f9e2814540462eaaa6d5656f93bf033b4
                                                                  • Instruction ID: 29c976c15127a1265d39a83b5cd1fc5060ea9bc0bdd95e05b0574ccf0c36f81e
                                                                  • Opcode Fuzzy Hash: e234ea09d342b4473b2319b8e638053f9e2814540462eaaa6d5656f93bf033b4
                                                                  • Instruction Fuzzy Hash: A531F1B0900214AFDB50DFA9C848ECEBBB8FF89715F20856EE914E7651CB308945CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 702 6c47eb1b-6c47eb2b 703 6c47eb45-6c47eb47 702->703 704 6c47eb2d-6c47eb40 call 6c46a386 call 6c46a399 702->704 706 6c47eb4d-6c47eb53 703->706 707 6c47eeac-6c47eeb9 call 6c46a386 call 6c46a399 703->707 722 6c47eec4 704->722 706->707 708 6c47eb59-6c47eb7f 706->708 723 6c47eebf call 6c469d5e 707->723 708->707 711 6c47eb85-6c47eb8e 708->711 714 6c47eb90-6c47eba3 call 6c46a386 call 6c46a399 711->714 715 6c47eba8-6c47ebaa 711->715 714->723 720 6c47ebb0-6c47ebb3 715->720 721 6c47eea8-6c47eeaa 715->721 720->721 726 6c47ebb9-6c47ebbd 720->726 725 6c47eec7-6c47eeca 721->725 722->725 723->722 726->714 729 6c47ebbf-6c47ebd6 726->729 731 6c47ec27-6c47ec2d 729->731 732 6c47ebd8-6c47ebdb 729->732 733 6c47ebf3-6c47ec0a call 6c46a386 call 6c46a399 call 6c469d5e 731->733 734 6c47ec2f-6c47ec39 731->734 735 6c47ebdd-6c47ebe6 732->735 736 6c47ebeb-6c47ebf1 732->736 766 6c47eddf 733->766 737 6c47ec40-6c47ec5e call 6c47aafd call 6c47a768 * 2 734->737 738 6c47ec3b-6c47ec3d 734->738 739 6c47ecab-6c47ecbb 735->739 736->733 740 6c47ec0f-6c47ec22 736->740 770 6c47ec60-6c47ec76 call 6c46a399 call 6c46a386 737->770 771 6c47ec7b-6c47eca4 call 6c47f06e 737->771 738->737 743 6c47ecc1-6c47eccd 739->743 744 6c47ed80-6c47ed89 call 6c483fdc 739->744 740->739 743->744 748 6c47ecd3-6c47ecd5 743->748 755 6c47edfc 744->755 756 6c47ed8b-6c47ed9d 744->756 748->744 752 6c47ecdb-6c47ecff 748->752 752->744 757 6c47ed01-6c47ed17 752->757 759 6c47ee00-6c47ee18 ReadFile 755->759 756->755 761 6c47ed9f-6c47edae GetConsoleMode 756->761 757->744 762 6c47ed19-6c47ed1b 757->762 764 6c47ee74-6c47ee7f GetLastError 759->764 765 6c47ee1a-6c47ee20 759->765 761->755 767 6c47edb0-6c47edb4 761->767 762->744 768 6c47ed1d-6c47ed43 762->768 772 6c47ee81-6c47ee93 call 6c46a399 call 6c46a386 764->772 773 6c47ee98-6c47ee9b 764->773 765->764 774 6c47ee22 765->774 776 6c47ede2-6c47edec call 6c47a768 766->776 767->759 775 6c47edb6-6c47edd0 ReadConsoleW 767->775 768->744 777 6c47ed45-6c47ed5b 768->777 770->766 771->739 772->766 785 6c47eea1-6c47eea3 773->785 786 6c47edd8-6c47edde call 6c46a363 773->786 782 6c47ee25-6c47ee37 774->782 783 6c47edd2 GetLastError 775->783 784 6c47edf1-6c47edfa 775->784 776->725 777->744 778 6c47ed5d-6c47ed5f 777->778 778->744 789 6c47ed61-6c47ed7b 778->789 782->776 793 6c47ee39-6c47ee3d 782->793 783->786 784->782 785->776 786->766 789->744 797 6c47ee56-6c47ee61 793->797 798 6c47ee3f-6c47ee4f call 6c47e835 793->798 803 6c47ee63 call 6c47e98c 797->803 804 6c47ee6d-6c47ee72 call 6c47e686 797->804 809 6c47ee52-6c47ee54 798->809 810 6c47ee68-6c47ee6b 803->810 804->810 809->776 810->809
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 36af52e6a77bf8b2d025a6e099d41a6dd00a62cbcea12fd7187d7a2d804797d1
                                                                  • Instruction ID: 90919ee71c0901cb06f926dee905424074ce3930b97e40cbcc75a61842e95f76
                                                                  • Opcode Fuzzy Hash: 36af52e6a77bf8b2d025a6e099d41a6dd00a62cbcea12fd7187d7a2d804797d1
                                                                  • Instruction Fuzzy Hash: 8EC19C70A042059FDB21DFA9C9C0FEDBBB0AF4A309F144659E510ABB92C7319946CBF5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 811 6c47962f-6c479661 call 6c478f64 call 6c478f6a call 6c478fc8 818 6c479667-6c479673 call 6c478f70 811->818 819 6c4798c5-6c479900 call 6c469d8b call 6c478f64 call 6c478f6a call 6c478fc8 811->819 818->819 825 6c479679-6c479683 818->825 848 6c479906-6c479912 call 6c478f70 819->848 849 6c479a1f-6c479a7b call 6c469d8b call 6c483efb 819->849 826 6c479685 825->826 827 6c4796ba-6c4796bc 825->827 830 6c479687-6c47968d 826->830 829 6c4796bf-6c4796c8 827->829 829->829 832 6c4796ca-6c4796e0 call 6c47aafd 829->832 833 6c47968f-6c479692 830->833 834 6c4796ad-6c4796af 830->834 846 6c4798b7-6c4798bd call 6c47a768 832->846 847 6c4796e6-6c479701 call 6c47a768 832->847 839 6c479694-6c47969c 833->839 840 6c4796a9-6c4796ab 833->840 836 6c4796b2-6c4796b4 834->836 836->827 841 6c4798be-6c4798c2 836->841 839->834 844 6c47969e-6c4796a7 839->844 840->836 844->830 844->840 846->841 858 6c479704-6c47970e 847->858 848->849 859 6c479918-6c479924 call 6c478f9c 848->859 869 6c479a85-6c479a88 849->869 870 6c479a7d-6c479a83 849->870 858->858 861 6c479710-6c479724 call 6c46b2bf 858->861 859->849 868 6c47992a-6c47994b call 6c47a768 GetTimeZoneInformation 859->868 871 6c4798c3 861->871 872 6c47972a-6c47977c call 6c45e7c0 * 4 call 6c4795e8 861->872 887 6c479951-6c479971 868->887 888 6c4799fc-6c479a1e call 6c478f5e call 6c478f52 call 6c478f58 868->888 876 6c479a8e-6c479aa1 call 6c47aafd 869->876 877 6c479a8a-6c479a8c 869->877 874 6c479ad2-6c479ae4 870->874 871->819 931 6c47977d-6c479780 872->931 880 6c479ae6-6c479ae9 874->880 881 6c479af4 call 6c4798d0 874->881 892 6c479aa3 876->892 893 6c479aad-6c479ac6 call 6c483efb 876->893 877->874 880->881 883 6c479aeb-6c479af2 call 6c47962f 880->883 894 6c479af9-6c479b0e call 6c47a768 call 6c432871 881->894 883->894 895 6c479973-6c479978 887->895 896 6c47997b-6c479983 887->896 900 6c479aa4-6c479aab call 6c47a768 892->900 917 6c479acb-6c479acc call 6c47a768 893->917 918 6c479ac8-6c479ac9 893->918 895->896 903 6c479995-6c479997 896->903 904 6c479985-6c47998c 896->904 922 6c479ad1 900->922 911 6c479999-6c4799f9 call 6c45e7c0 * 4 call 6c471492 call 6c479b0f * 2 903->911 904->903 905 6c47998e-6c479993 904->905 905->911 911->888 917->922 918->900 922->874 933 6c479785-6c479788 931->933 934 6c479782 931->934 933->931 936 6c47978a-6c479798 933->936 934->933 938 6c47979d-6c4797b2 call 6c4705ea 936->938 939 6c47979a 936->939 944 6c4797b5-6c4797bb 938->944 939->938 946 6c4797c6-6c4797c9 944->946 947 6c4797bd-6c4797c4 944->947 946->944 947->946 949 6c4797cb-6c4797d1 947->949 951 6c4797d7-6c479802 call 6c4705ea 949->951 952 6c47986b-6c479872 949->952 961 6c479824-6c47982a 951->961 962 6c479804-6c479808 951->962 954 6c479874-6c479876 952->954 955 6c479879-6c47988a 952->955 954->955 957 6c4798a6-6c4798b5 call 6c478f5e call 6c478f52 955->957 958 6c47988c-6c4798a3 call 6c4795e8 955->958 957->846 958->957 961->952 967 6c47982c-6c47984f call 6c4705ea 961->967 965 6c479809-6c47980f 962->965 968 6c479821 965->968 969 6c479811-6c47981f 965->969 967->952 974 6c479851-6c479855 967->974 968->961 969->965 969->968 975 6c479856-6c479859 974->975 976 6c47985b-6c479866 975->976 977 6c479868 975->977 976->975 976->977 977->952
                                                                  APIs
                                                                  • _free.LIBCMT ref: 6C4796EC
                                                                  • _free.LIBCMT ref: 6C4798B8
                                                                  • _free.LIBCMT ref: 6C479930
                                                                  • GetTimeZoneInformation.KERNELBASE(?,?,00000000,?,?,00000000,?,?,?,?,?,?,6C479AF1,?,?,00000000), ref: 6C479942
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$InformationTimeZone
                                                                  • String ID: W. Europe Standard Time$W. Europe Summer Time
                                                                  • API String ID: 597776487-690618308
                                                                  • Opcode ID: b9b90809afae638055dc3a1d97f63a5cfc33ebe1ecea7c4407a54891b4283176
                                                                  • Instruction ID: 607ff2787e448d707e19fc13344000aaa905fccdb2be16eb4673483fbeabbf5a
                                                                  • Opcode Fuzzy Hash: b9b90809afae638055dc3a1d97f63a5cfc33ebe1ecea7c4407a54891b4283176
                                                                  • Instruction Fuzzy Hash: 19A12571E00215ABDF20EF79CC81EEE7BB9EF55718F15416AE904A7B40E73299048BE0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3Initstd::locale::_
                                                                  • String ID: 2X@l$2X@l$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                  • API String ID: 302037079-3989175425
                                                                  • Opcode ID: 91827df0b5c0db8206bca64ddbeaaf4b0aa7cb2d4faf4697138a8145e70fa2ba
                                                                  • Instruction ID: 87ffb6e8c16a911b9ed01af9cbbb167cfea86b1f87084eea992361e2a9dec8df
                                                                  • Opcode Fuzzy Hash: 91827df0b5c0db8206bca64ddbeaaf4b0aa7cb2d4faf4697138a8145e70fa2ba
                                                                  • Instruction Fuzzy Hash: A221D0B2900716AFD700DF69C985F99B7A4BB0C308F50412EEA489BE81DB75A654CFD0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1004 6c433298-6c4332ab call 6c433ac0 1007 6c4332b1-6c4332d3 call 6c432c31 1004->1007 1008 6c4332ad-6c4332af 1004->1008 1012 6c433340-6c433359 call 6c433b06 call 6c433ac0 1007->1012 1013 6c4332d5 call 6c432cfc 1007->1013 1009 6c43331a-6c433329 1008->1009 1025 6c43335b-6c433361 1012->1025 1026 6c43336a-6c433371 1012->1026 1017 6c4332da-6c433318 call 6c432a9c call 6c433ef3 call 6c43332d call 6c432e9d call 6c43333a 1013->1017 1017->1009 1025->1026 1030 6c433363-6c433365 1025->1030 1028 6c433373-6c433376 1026->1028 1029 6c43337d-6c433391 dllmain_raw 1026->1029 1028->1029 1033 6c433378-6c43337b 1028->1033 1034 6c433397-6c4333a8 dllmain_crt_dispatch 1029->1034 1035 6c43343a-6c433441 1029->1035 1031 6c433443-6c433452 1030->1031 1037 6c4333ae-6c4333c0 call 6c3f55b4 1033->1037 1034->1035 1034->1037 1035->1031 1043 6c4333c2-6c4333c4 1037->1043 1044 6c4333e9-6c4333eb 1037->1044 1043->1044 1045 6c4333c6-6c4333e4 call 6c3f55b4 call 6c433298 dllmain_raw 1043->1045 1046 6c4333f2-6c433403 dllmain_crt_dispatch 1044->1046 1047 6c4333ed-6c4333f0 1044->1047 1045->1044 1046->1035 1048 6c433405-6c433437 dllmain_raw 1046->1048 1047->1035 1047->1046 1048->1035
                                                                  APIs
                                                                  • __RTC_Initialize.LIBCMT ref: 6C4332DF
                                                                  • ___scrt_uninitialize_crt.LIBCMT ref: 6C4332F9
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize___scrt_uninitialize_crt
                                                                  • String ID:
                                                                  • API String ID: 2442719207-0
                                                                  • Opcode ID: ebe070c0d7cc0bfa3e9b188fc7e0495ec58cc4b7f0d0abacb96fc16c2f2e9be6
                                                                  • Instruction ID: 902d99a0908a938ce367a21f209e5ed9f466388db71fb44805c4750c750d6500
                                                                  • Opcode Fuzzy Hash: ebe070c0d7cc0bfa3e9b188fc7e0495ec58cc4b7f0d0abacb96fc16c2f2e9be6
                                                                  • Instruction Fuzzy Hash: A841B272E05274EBDB21DF57C800F9E3A75EBC8B69F119119E8195BB50CB7049078BD0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1074 6c3fcf6f-6c3fcf97 call 6c4339a2 call 6c3fe221 1079 6c3fd69e-6c3fd6a2 1074->1079 1080 6c3fcf9d-6c3fcfcb call 6c3e87c5 1074->1080 1082 6c3fd6ab-6c3fd6d1 call 6c3e1a39 call 6c3e2126 1079->1082 1083 6c3fd6a4-6c3fd6a6 call 6c3f1384 1079->1083 1088 6c3fcfcd-6c3fcfd3 1080->1088 1089 6c3fd031-6c3fd035 1080->1089 1104 6c3fd6d7-6c3fd6dd call 6c45e1aa 1082->1104 1083->1082 1093 6c3fd00e-6c3fd01b call 6c3fe483 1088->1093 1094 6c3fcfd5-6c3fcfd8 1088->1094 1090 6c3fd03e-6c3fd040 1089->1090 1091 6c3fd037-6c3fd039 call 6c3f1384 1089->1091 1099 6c3fd05c-6c3fd064 1090->1099 1100 6c3fd042-6c3fd057 1090->1100 1091->1090 1116 6c3fd01d-6c3fd029 call 6c3e87c5 1093->1116 1095 6c3fcffc-6c3fd00c call 6c3fe483 1094->1095 1096 6c3fcfda-6c3fcfdd 1094->1096 1095->1116 1102 6c3fcfdf-6c3fcfe8 call 6c3fe5a0 1096->1102 1103 6c3fcfea-6c3fcffa call 6c3fe483 1096->1103 1105 6c3fd088-6c3fd08f 1099->1105 1106 6c3fd066-6c3fd083 call 6c432882 1099->1106 1100->1104 1102->1116 1103->1116 1114 6c3fd0ba-6c3fd17f call 6c45e7c0 call 6c3e3de9 call 6c45e7c0 call 6c3fd9aa call 6c3e3833 call 6c3e82fb call 6c432882 call 6c3fd928 1105->1114 1115 6c3fd091-6c3fd0b5 call 6c432882 * 2 1105->1115 1106->1104 1145 6c3fd185-6c3fd18d 1114->1145 1115->1104 1116->1088 1127 6c3fd02b 1116->1127 1127->1089 1146 6c3fd278-6c3fd30f call 6c3fd8dd call 6c3e3e46 call 6c432882 call 6c3ec343 call 6c3e2153 call 6c3e87c5 1145->1146 1147 6c3fd193-6c3fd273 call 6c432aa8 call 6c45e7c0 call 6c432aa8 call 6c3e83e7 call 6c41f7a5 call 6c3e3833 call 6c3e82fb 1145->1147 1172 6c3fd315-6c3fd317 1146->1172 1147->1145 1174 6c3fd31d-6c3fd324 1172->1174 1175 6c3fd571-6c3fd5d5 call 6c3e4424 call 6c45e7c0 call 6c3e71c4 call 6c40dc87 1172->1175 1177 6c3fd32a 1174->1177 1178 6c3fd554 1174->1178 1242 6c3fd5d7-6c3fd5ec 1175->1242 1243 6c3fd5f1-6c3fd60e call 6c3e980b call 6c432882 1175->1243 1177->1178 1182 6c3fd4df-6c3fd4e8 1177->1182 1183 6c3fd3fd-6c3fd40f call 6c3fe4ef 1177->1183 1184 6c3fd37b-6c3fd39a call 6c3fe483 1177->1184 1185 6c3fd49a-6c3fd4ae call 6c3fe2af 1177->1185 1186 6c3fd474-6c3fd482 call 6c3fe131 1177->1186 1187 6c3fd4b3-6c3fd4c7 call 6c3fe2af 1177->1187 1188 6c3fd331-6c3fd345 call 6c3fe2af 1177->1188 1189 6c3fd42f-6c3fd441 call 6c3fe4ef 1177->1189 1190 6c3fd4cc-6c3fd4d2 call 6c3fe2fb 1177->1190 1191 6c3fd34a-6c3fd35d call 6c3fe2af 1177->1191 1192 6c3fd487-6c3fd495 call 6c3fe131 1177->1192 1193 6c3fd362-6c3fd376 call 6c3fe2af 1177->1193 1194 6c3fd461-6c3fd46f call 6c3fe131 1177->1194 1180 6c3fd55a-6c3fd55c call 6c3fe5a0 1178->1180 1212 6c3fd561-6c3fd56c call 6c3e87c5 1180->1212 1182->1180 1209 6c3fd4ea-6c3fd501 call 6c3fe38a 1182->1209 1183->1212 1232 6c3fd415-6c3fd42a 1183->1232 1229 6c3fd39c-6c3fd3b1 1184->1229 1230 6c3fd3b6-6c3fd3f8 call 6c3e3833 call 6c3e82fb call 6c432882 1184->1230 1185->1212 1186->1212 1187->1212 1188->1212 1189->1212 1226 6c3fd447-6c3fd45c 1189->1226 1223 6c3fd4d7-6c3fd4da 1190->1223 1191->1212 1192->1212 1193->1212 1194->1212 1209->1212 1236 6c3fd503-6c3fd552 call 6c432f38 call 6c45e230 call 6c432882 1209->1236 1212->1172 1223->1212 1226->1104 1229->1104 1230->1212 1232->1104 1236->1223 1242->1104 1257 6c3fd62a-6c3fd63a call 6c3eaaf0 call 6c43390f 1243->1257 1258 6c3fd610-6c3fd629 call 6c432f38 1243->1258 1258->1257
                                                                  APIs
                                                                  • __EH_prolog3_catch_GS_align.LIBCMT ref: 6C3FCF7B
                                                                    • Part of subcall function 6C3FE221: __EH_prolog3_GS.LIBCMT ref: 6C3FE228
                                                                    • Part of subcall function 6C3E87C5: __EH_prolog3_catch.LIBCMT ref: 6C3E87CC
                                                                    • Part of subcall function 6C41F7A5: __EH_prolog3.LIBCMT ref: 6C41F7AC
                                                                    • Part of subcall function 6C3E3833: __EH_prolog3.LIBCMT ref: 6C3E383A
                                                                    • Part of subcall function 6C3EC343: __EH_prolog3.LIBCMT ref: 6C3EC34A
                                                                    • Part of subcall function 6C3E2153: __EH_prolog3.LIBCMT ref: 6C3E21C4
                                                                    • Part of subcall function 6C3E2153: std::locale::_Init.LIBCPMT ref: 6C3E220E
                                                                    • Part of subcall function 6C3FE2AF: __EH_prolog3_GS.LIBCMT ref: 6C3FE2B6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_$H_prolog3_catchH_prolog3_catch_InitS_alignstd::locale::_
                                                                  • String ID: File header is incorrect.$TAPDFV1$https$https://wyday.com/limelm/api/rest/
                                                                  • API String ID: 1456947965-3871344165
                                                                  • Opcode ID: fba279ac342926da076e589de47a7744945ffb530033c2ca0cd85f9735836a8a
                                                                  • Instruction ID: 36e33c88afa083c2ed383e48887c2d07f68852600c341743383ce4e9136ae81c
                                                                  • Opcode Fuzzy Hash: fba279ac342926da076e589de47a7744945ffb530033c2ca0cd85f9735836a8a
                                                                  • Instruction Fuzzy Hash: BF1288719052299FCB25DF64C848FDDBBB4BF09308F5045DAD059A7A50EB309B8ACF92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1265 6c4798d0-6c479900 call 6c478f64 call 6c478f6a call 6c478fc8 1272 6c479906-6c479912 call 6c478f70 1265->1272 1273 6c479a1f-6c479a7b call 6c469d8b call 6c483efb 1265->1273 1272->1273 1278 6c479918-6c479924 call 6c478f9c 1272->1278 1285 6c479a85-6c479a88 1273->1285 1286 6c479a7d-6c479a83 1273->1286 1278->1273 1284 6c47992a-6c47994b call 6c47a768 GetTimeZoneInformation 1278->1284 1298 6c479951-6c479971 1284->1298 1299 6c4799fc-6c479a1e call 6c478f5e call 6c478f52 call 6c478f58 1284->1299 1289 6c479a8e-6c479aa1 call 6c47aafd 1285->1289 1290 6c479a8a-6c479a8c 1285->1290 1288 6c479ad2-6c479ae4 1286->1288 1293 6c479ae6-6c479ae9 1288->1293 1294 6c479af4 call 6c4798d0 1288->1294 1302 6c479aa3 1289->1302 1303 6c479aad-6c479ac6 call 6c483efb 1289->1303 1290->1288 1293->1294 1295 6c479aeb-6c479af2 call 6c47962f 1293->1295 1304 6c479af9-6c479b0e call 6c47a768 call 6c432871 1294->1304 1295->1304 1305 6c479973-6c479978 1298->1305 1306 6c47997b-6c479983 1298->1306 1309 6c479aa4-6c479aab call 6c47a768 1302->1309 1324 6c479acb-6c479acc call 6c47a768 1303->1324 1325 6c479ac8-6c479ac9 1303->1325 1305->1306 1312 6c479995-6c479997 1306->1312 1313 6c479985-6c47998c 1306->1313 1328 6c479ad1 1309->1328 1319 6c479999-6c4799f9 call 6c45e7c0 * 4 call 6c471492 call 6c479b0f * 2 1312->1319 1313->1312 1314 6c47998e-6c479993 1313->1314 1314->1319 1319->1299 1324->1328 1325->1309 1328->1288
                                                                  APIs
                                                                  • GetTimeZoneInformation.KERNELBASE(?,?,00000000,?,?,00000000,?,?,?,?,?,?,6C479AF1,?,?,00000000), ref: 6C479942
                                                                  • _free.LIBCMT ref: 6C479930
                                                                    • Part of subcall function 6C47A768: HeapFree.KERNEL32(00000000,00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000), ref: 6C47A77E
                                                                    • Part of subcall function 6C47A768: GetLastError.KERNEL32(00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000,00000000), ref: 6C47A790
                                                                  • _free.LIBCMT ref: 6C479AFA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapInformationLastTimeZone
                                                                  • String ID: W. Europe Standard Time$W. Europe Summer Time
                                                                  • API String ID: 2155170405-690618308
                                                                  • Opcode ID: a8609893809c0b7e3a6f7078498c21e3ea976a4d381c9c79b43250771cb6d98c
                                                                  • Instruction ID: 0fca9e99a84701e804c2e0f7613980c00c00798b656ac64d195b3e2641068f08
                                                                  • Opcode Fuzzy Hash: a8609893809c0b7e3a6f7078498c21e3ea976a4d381c9c79b43250771cb6d98c
                                                                  • Instruction Fuzzy Hash: 42510671901215ABDF20FF79CC45ECA7B78EF45718B11426AE918B7B50E7319A04CBE0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetFileType.KERNELBASE(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,6C46B48C), ref: 6C46B57C
                                                                  • GetFileInformationByHandle.KERNELBASE(?,?), ref: 6C46B5D6
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,6C46B48C,?,000000FF,00000000,00000000), ref: 6C46B664
                                                                  • __dosmaperr.LIBCMT ref: 6C46B66B
                                                                  • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 6C46B6A8
                                                                    • Part of subcall function 6C46B987: __dosmaperr.LIBCMT ref: 6C46B9BC
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                                  • String ID:
                                                                  • API String ID: 1206951868-0
                                                                  • Opcode ID: 316e0a68063d7978d1581839d162b063d990b726572a4abdf884264d8689f1bf
                                                                  • Instruction ID: ffd756331c34d82172a6c0a17d02857282971b5492af3f4c36e23009e3001185
                                                                  • Opcode Fuzzy Hash: 316e0a68063d7978d1581839d162b063d990b726572a4abdf884264d8689f1bf
                                                                  • Instruction Fuzzy Hash: AE414C75A00204AFDB24DFA6D844DABBBF9EF89704B10452DF856D3E24E7309844DB52
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: dllmain_raw$dllmain_crt_dispatch
                                                                  • String ID:
                                                                  • API String ID: 3136044242-0
                                                                  • Opcode ID: 7eed7a5e4f8d2b589bb1519667683d6f7f213b0c5f4fd30b7dea37040027376c
                                                                  • Instruction ID: 04930aae8c387b3c06b3e90e76239f4123fec59fdbb89c1c41b1e639162c6e42
                                                                  • Opcode Fuzzy Hash: 7eed7a5e4f8d2b589bb1519667683d6f7f213b0c5f4fd30b7dea37040027376c
                                                                  • Instruction Fuzzy Hash: B6218272D01675ABDB22CF57C840FAE3A69EBD8AA9B119119F81D5BB10D7308D138BD0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateDirectoryW.KERNELBASE(?,?,?,?,?,?,00000001,?,?,?,?,?,?,?,?,6C3FBE79), ref: 6C3F34D3
                                                                  • GetLastError.KERNEL32(?,?,?,?,00000001,?,?,?,?,?,?,?,?,6C3FBE79), ref: 6C3F34DD
                                                                  • SetFileAttributesW.KERNELBASE(?,00000006,?,?,?,?,00000001,?,?,?,?,?,?,?,?,6C3FBE79), ref: 6C3F34EF
                                                                  • CreateFileW.KERNELBASE(?,C0000000,00000000,?,00000002,00000000,00000000,?,?,?,?,00000001), ref: 6C3F3540
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000001,?,?,?,?,?,?,?,?,6C3FBE79), ref: 6C3F354C
                                                                    • Part of subcall function 6C3F334B: CreateFileW.KERNEL32(?,00060000,00000001,00000000,00000003,00000080,00000000,?,?,?,00000000,?,6C3F3515,?,?,00000000), ref: 6C3F3384
                                                                    • Part of subcall function 6C3F334B: GetSecurityInfo.ADVAPI32(00000000,00000001,00000004,00000000,00000000,?,00000000,?,?,00000000,?,6C3F3515,?,?,00000000), ref: 6C3F33A8
                                                                    • Part of subcall function 6C3F334B: GetAclInformation.ADVAPI32(?,?), ref: 6C3F33D1
                                                                    • Part of subcall function 6C3F334B: GetAce.ADVAPI32(?,00000000,0000000C), ref: 6C3F33EF
                                                                    • Part of subcall function 6C3F334B: EqualSid.ADVAPI32(00000004,?), ref: 6C3F3403
                                                                    • Part of subcall function 6C3F334B: SetEntriesInAclW.ADVAPI32(00000001,00000000,?,?), ref: 6C3F3432
                                                                    • Part of subcall function 6C3F334B: SetSecurityInfo.ADVAPI32(1FFFFFFF,00000001,00000004,00000000,00000000,?,00000000), ref: 6C3F3448
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile$InfoSecurity$AttributesCloseDirectoryEntriesEqualErrorHandleInformationLast
                                                                  • String ID:
                                                                  • API String ID: 1847988071-0
                                                                  • Opcode ID: 972c702f9c7a9cd95c00554212648f76c233771eedf2487ceef1d2c4859ed026
                                                                  • Instruction ID: 446e4d28f6187d892918e85c7a6c4f73177ecc38664c59eba7951b4865a28de8
                                                                  • Opcode Fuzzy Hash: 972c702f9c7a9cd95c00554212648f76c233771eedf2487ceef1d2c4859ed026
                                                                  • Instruction Fuzzy Hash: E721A330204208BBDF51AF21CC49EEE3B79EF4174CF000925F96597990DB72D91A9AA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3F9AEA
                                                                  • EnterCriticalSection.KERNEL32(?,00000008,6C3FA8DB,?,6C3FAFF3,?), ref: 6C3F9AF5
                                                                  • LeaveCriticalSection.KERNEL32(?,?,00000008,6C3FA8DB,?), ref: 6C3F9B23
                                                                  • EnterCriticalSection.KERNEL32(?,?,00000008,6C3FA8DB,?), ref: 6C3F9B45
                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,00000008,6C3FA8DB,?), ref: 6C3F9B74
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$H_prolog3
                                                                  • String ID:
                                                                  • API String ID: 1407036958-0
                                                                  • Opcode ID: 6918b9614fe0a8a3b7cba053bb4f841ece062ad0e502a4842b3719e37cab1d66
                                                                  • Instruction ID: 9c587fb424df126d2b6f5242716377912c01c2ed68942b81870050595483c5aa
                                                                  • Opcode Fuzzy Hash: 6918b9614fe0a8a3b7cba053bb4f841ece062ad0e502a4842b3719e37cab1d66
                                                                  • Instruction Fuzzy Hash: E321BB316007149BCB05CF21C848A5ABB71FF85718F218948E86A5BB01CB31ED16CFD0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C3F31FB: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000007,?,00000000,6C3FBF12), ref: 6C3F3246
                                                                    • Part of subcall function 6C3F31FB: SetEntriesInAclW.ADVAPI32(00000001,?,00000000,?,?,00000007,?,00000000,6C3FBF12,?,00000000), ref: 6C3F327E
                                                                    • Part of subcall function 6C3F31FB: LocalAlloc.KERNEL32(00000040,00000014,?,00000007,?,00000000,6C3FBF12,?,00000000), ref: 6C3F328C
                                                                    • Part of subcall function 6C3F31FB: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000007,?,00000000,6C3FBF12,?,00000000), ref: 6C3F329C
                                                                    • Part of subcall function 6C3F31FB: SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,00000007,?,00000000,6C3FBF12,?,00000000), ref: 6C3F32AE
                                                                  • SHGetFolderPathW.SHELL32(00000000,00008023,00000000,00000000,?,?,?,?,?,?,00000000,0000009C), ref: 6C3E3F72
                                                                    • Part of subcall function 6C3F3474: SetFileAttributesW.KERNELBASE(?,00000006,?,?,?,?,00000001,?,?,?,?,?,?,?,?,6C3FBE79), ref: 6C3F34EF
                                                                    • Part of subcall function 6C3F3474: CreateDirectoryW.KERNELBASE(?,?,?,?,?,?,00000001,?,?,?,?,?,?,?,?,6C3FBE79), ref: 6C3F34D3
                                                                    • Part of subcall function 6C3F3474: GetLastError.KERNEL32(?,?,?,?,00000001,?,?,?,?,?,?,?,?,6C3FBE79), ref: 6C3F34DD
                                                                    • Part of subcall function 6C3F3474: CreateFileW.KERNELBASE(?,C0000000,00000000,?,00000002,00000000,00000000,?,?,?,?,00000001), ref: 6C3F3540
                                                                    • Part of subcall function 6C3F3474: CloseHandle.KERNEL32(00000000,?,?,?,?,00000001,?,?,?,?,?,?,?,?,6C3FBE79), ref: 6C3F354C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDescriptorFileInitializeSecurity$AllocAllocateAttributesCloseDaclDirectoryEntriesErrorFolderHandleLastLocalPath
                                                                  • String ID: \icsxml$\ms-drivers$d8@l
                                                                  • API String ID: 2039354331-3184066845
                                                                  • Opcode ID: 053b20e50b7cab046090d6db64a183b9be8c9ac983020326d2d0ebbfb620ebd5
                                                                  • Instruction ID: c030278064a447cf8ab114c866169137e8b1c35a0d0135c944bf5546e7014ccf
                                                                  • Opcode Fuzzy Hash: 053b20e50b7cab046090d6db64a183b9be8c9ac983020326d2d0ebbfb620ebd5
                                                                  • Instruction Fuzzy Hash: 15B1F7719102389FCB65DB64CC98ADDB7B8FF18308F4041DAD449A6660EB35AF89CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,6C406E9A,"T@l,6C47A7E9,6C406E9A,6C4DC128,0000000C,6C47A89B,00000001), ref: 6C47A911
                                                                  • GetLastError.KERNEL32 ref: 6C47A91B
                                                                  • __dosmaperr.LIBCMT ref: 6C47A946
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                                                  • String ID: "T@l
                                                                  • API String ID: 490808831-4105657523
                                                                  • Opcode ID: 78bc45b88d285d2d13fa602058acbb2e6cdac6c9c51e47df500bf29c6c619642
                                                                  • Instruction ID: 1e9009a82d1cef112fc36cbe207a150b7ba48d96bdc2ffcc2afe655f14429bde
                                                                  • Opcode Fuzzy Hash: 78bc45b88d285d2d13fa602058acbb2e6cdac6c9c51e47df500bf29c6c619642
                                                                  • Instruction Fuzzy Hash: B901483270922056DA34E27C5545FEE2768DF8AB7DF2B161DE81887BC1DB21C88742F0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(?,00000104), ref: 6C4057E4
                                                                  • PathAppendW.SHLWAPI(?,TurboActivate.dat), ref: 6C405818
                                                                  • TA_PDetsFromPath.TURBOACTIVATE(?), ref: 6C40582D
                                                                    • Part of subcall function 6C4053DA: __EH_prolog3_catch.LIBCMT ref: 6C4053E1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Path$AppendDetsFileFromH_prolog3_catchModuleName
                                                                  • String ID: TurboActivate.dat
                                                                  • API String ID: 2890083343-1888833027
                                                                  • Opcode ID: ab5e9707e91c7852ac552321d5b4da8bfb3e06369a37d33eb4f6cbbec273d25e
                                                                  • Instruction ID: 0ce4463704b98e4ae6f3d01cfbfed08fc52fcc350350da14757becd622a491c6
                                                                  • Opcode Fuzzy Hash: ab5e9707e91c7852ac552321d5b4da8bfb3e06369a37d33eb4f6cbbec273d25e
                                                                  • Instruction Fuzzy Hash: 1E01F231B8420C9ADF24EF75C84EDEA33B8FF05304F0008AED905C3981EA70AA48CB54
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C440E3E: GetModuleHandleW.KERNEL32(kernel32,00000000,1A85EC53,security.dll,6C4530C7,security.dll,00000004,00000000,00000002,00000002,6C440FF1), ref: 6C440E48
                                                                    • Part of subcall function 6C440E3E: GetProcAddress.KERNEL32(00000000,LoadLibraryExW), ref: 6C440E60
                                                                    • Part of subcall function 6C440E3E: LoadLibraryExW.KERNELBASE(?,00000000,00000800), ref: 6C440EA9
                                                                  • GetProcAddress.KERNELBASE(00000000,InitSecurityInterfaceW), ref: 6C4530D9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleLibraryLoadModule
                                                                  • String ID: InitSecurityInterfaceW$secur32.dll$security.dll
                                                                  • API String ID: 384173800-1950755585
                                                                  • Opcode ID: 66e3997e5950a8f9462b7c81957520fed4bf5a88c0c5fb556b8453c7dc072b5a
                                                                  • Instruction ID: 64a697d11a2fd2dcdc88fc1fd10736baa50cf09e507f5d3809b5040cba117981
                                                                  • Opcode Fuzzy Hash: 66e3997e5950a8f9462b7c81957520fed4bf5a88c0c5fb556b8453c7dc072b5a
                                                                  • Instruction Fuzzy Hash: F2F0E5A0B017026AEE60EB360C17F1137750B41B4AF95C529B500DA7C6DFB0C810CA10
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C40CFD9: __EH_prolog3.LIBCMT ref: 6C40CFE0
                                                                    • Part of subcall function 6C40E7DA: __EH_prolog3.LIBCMT ref: 6C40E7E1
                                                                    • Part of subcall function 6C4127F4: __EH_prolog3.LIBCMT ref: 6C4127FB
                                                                    • Part of subcall function 6C413460: __EH_prolog3_GS.LIBCMT ref: 6C413467
                                                                    • Part of subcall function 6C412B28: __EH_prolog3.LIBCMT ref: 6C412B2F
                                                                    • Part of subcall function 6C3E2E5F: __EH_prolog3.LIBCMT ref: 6C3E2E66
                                                                    • Part of subcall function 6C45E1AA: KiUserExceptionDispatcher.NTDLL(E06D7363,00000001,00000003,6C3E165C,00000000,6C3E2DF5,?,6C3E165C,00000008,6C4DC3E0,00000008), ref: 6C45E20A
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C41E166
                                                                  Strings
                                                                  • X>Il, xrefs: 6C41E17B
                                                                  • InvertibleRSAFunction: computational error during private key operation, xrefs: 6C41E131
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_$DispatcherExceptionUser
                                                                  • String ID: InvertibleRSAFunction: computational error during private key operation$X>Il
                                                                  • API String ID: 985688456-980319426
                                                                  • Opcode ID: 34e80ae991febf7070316ab64de89ba3773badcef86beb40e05d7f4c2607c4fc
                                                                  • Instruction ID: cc3be618daaef871c4f6149a69cb7195984d25fd0d998b9e4541ad5ec4abcc44
                                                                  • Opcode Fuzzy Hash: 34e80ae991febf7070316ab64de89ba3773badcef86beb40e05d7f4c2607c4fc
                                                                  • Instruction Fuzzy Hash: C9A11D71900259EFCF14DFA4C984EEEB7B8BF19308F04855DE94AA7650DB34AA0DCB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C3FE9BF: SHGetFolderPathW.SHELL32(00000000,00008023,00000000,00000000,00000000,9634BA50,00000000,00000000,00000000,?,?,?,?,0000009C,6C48D9EF,000000FF), ref: 6C3FEA04
                                                                    • Part of subcall function 6C3FE9BF: PathAppendW.SHLWAPI(00000000,DIBsection,?,?,?,?,0000009C,6C48D9EF,000000FF,?,6C3FFC77,9634BA50,00000000,00000000,00000000), ref: 6C3FEA1A
                                                                    • Part of subcall function 6C3FE9BF: PathAppendW.SHLWAPI(00000000,0000000F,?,?,?,?,0000009C,6C48D9EF,000000FF,?,6C3FFC77,9634BA50,00000000,00000000,00000000), ref: 6C3FEA23
                                                                  • DeleteFileW.KERNEL32(00000000,9634BA50,00000000), ref: 6C40078F
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,000000FF,00000080,00000000), ref: 6C400995
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Path$AppendFile$AttributesDeleteFolder
                                                                  • String ID: TATFV1
                                                                  • API String ID: 641179217-3456698836
                                                                  • Opcode ID: 3a946d64ef5b312149e935a1e53a3ac5a3ede4d0414a13e249af65743ab94f99
                                                                  • Instruction ID: b6e6986152f3ed02abb6c07f85b8ece8cc16d248476bda99491084b93c5be045
                                                                  • Opcode Fuzzy Hash: 3a946d64ef5b312149e935a1e53a3ac5a3ede4d0414a13e249af65743ab94f99
                                                                  • Instruction Fuzzy Hash: 6971B1729016559FEB28CF24DC40FDAB7B5BF44308F1046AED45A63B80DB31AA49CF61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C479D21: GetConsoleOutputCP.KERNEL32(00000000,00000000,?), ref: 6C479D69
                                                                  • WriteFile.KERNELBASE(?,00000000,00000000,6C4DC108,00000000,00000000,00000000,00000000,00000000,6C4DC108,00000010,6C46A249,00000000,00000000,00000000,00000000), ref: 6C47A6D4
                                                                  • GetLastError.KERNEL32 ref: 6C47A6DE
                                                                  • __dosmaperr.LIBCMT ref: 6C47A71D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ConsoleErrorFileLastOutputWrite__dosmaperr
                                                                  • String ID:
                                                                  • API String ID: 910155933-0
                                                                  • Opcode ID: bc0ec0c50343d4ab25c8c372f9ee72ba024beed379319412f4972e82d29d7412
                                                                  • Instruction ID: 76d66aea4b80a9dc8242b743bc4d8f04204df9562f69169177a29a195f4fa115
                                                                  • Opcode Fuzzy Hash: bc0ec0c50343d4ab25c8c372f9ee72ba024beed379319412f4972e82d29d7412
                                                                  • Instruction Fuzzy Hash: BC51E171E0110AABDB21DFA9C844FDEBBB4EF4A319F142049E400A7B91D375DA46CBB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _free.LIBCMT ref: 6C479AFA
                                                                    • Part of subcall function 6C4798D0: _free.LIBCMT ref: 6C479930
                                                                    • Part of subcall function 6C4798D0: GetTimeZoneInformation.KERNELBASE(?,?,00000000,?,?,00000000,?,?,?,?,?,?,6C479AF1,?,?,00000000), ref: 6C479942
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$InformationTimeZone
                                                                  • String ID:
                                                                  • API String ID: 597776487-0
                                                                  • Opcode ID: f8be51e2a344fe07e51916a7600c7422020eee4e5721b6b24b0b0355ee862f75
                                                                  • Instruction ID: f34f721f9069f3db88fc3a16e25d95bdf8e80218eb2bb9a7e3b5b6814ed6745b
                                                                  • Opcode Fuzzy Hash: f8be51e2a344fe07e51916a7600c7422020eee4e5721b6b24b0b0355ee862f75
                                                                  • Instruction Fuzzy Hash: D521073290231996DF30FA388C85EDA33BCDF92268F240259ED64A3A41EB71D94586B0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateThread.KERNELBASE(?,?,6C46BBDA,00000000,6C3F1A85,?), ref: 6C46BD7F
                                                                  • GetLastError.KERNEL32(?,?,00000000,6C3F19EB,00000000,?,6C3F1A85,?), ref: 6C46BD8B
                                                                  • __dosmaperr.LIBCMT ref: 6C46BD92
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CreateErrorLastThread__dosmaperr
                                                                  • String ID:
                                                                  • API String ID: 2744730728-0
                                                                  • Opcode ID: 1ec435b00f1403024dbf0ea67c325d57cd79babe7f62f5c0d94ad4cd69faa0d6
                                                                  • Instruction ID: dffdb0eb8176db257f9416a9c1efe7022667000577be5dbbb60dc945a42e53da
                                                                  • Opcode Fuzzy Hash: 1ec435b00f1403024dbf0ea67c325d57cd79babe7f62f5c0d94ad4cd69faa0d6
                                                                  • Instruction Fuzzy Hash: CB018C72504219AFDF05DFA2CC04EDE3B74EF00369F104198B81196E54DB718A50EBD0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000), ref: 6C478162
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID: @
                                                                  • API String ID: 823142352-2766056989
                                                                  • Opcode ID: 817daad6ea2dec695ebf10e09797b5eec124ee5bf11d6f9e1928f3c556ee0775
                                                                  • Instruction ID: 4bc268817ff450beb33a10b46ab78dda94c7bfd606d4a3f6a08cceb124c7f8b9
                                                                  • Opcode Fuzzy Hash: 817daad6ea2dec695ebf10e09797b5eec124ee5bf11d6f9e1928f3c556ee0775
                                                                  • Instruction Fuzzy Hash: EA611171A09149AAEB31CA28DD84FED3768EB0136DF650626E924E7F90D375CD81C2B1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • SHGetFolderPathW.SHELL32(00000000,00008023,00000000,00000000,?,9634BA50,0000009C,00000000,00000000), ref: 6C3FEAFE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: FolderPath
                                                                  • String ID: \DIBsection
                                                                  • API String ID: 1514166925-669289608
                                                                  • Opcode ID: 645cb2f0e24b3a294802b9c07efda436b1cefd8c42568ac972bed35fef150ae6
                                                                  • Instruction ID: 9b8f0e067bfac2f2aadba684f0d5ee875880f753d9f90daedc13fcaaef8e1769
                                                                  • Opcode Fuzzy Hash: 645cb2f0e24b3a294802b9c07efda436b1cefd8c42568ac972bed35fef150ae6
                                                                  • Instruction Fuzzy Hash: 2A418271A00214AFCB24DF64CC98FEAB7B8EF49304F0041ADE45993650DB349E89CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3F144A
                                                                    • Part of subcall function 6C3EB988: __EH_prolog3.LIBCMT ref: 6C3EB98F
                                                                    • Part of subcall function 6C3EA437: __EH_prolog3.LIBCMT ref: 6C3EA43E
                                                                    • Part of subcall function 6C3E2153: __EH_prolog3.LIBCMT ref: 6C3E21C4
                                                                    • Part of subcall function 6C3E2153: std::locale::_Init.LIBCPMT ref: 6C3E220E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$Initstd::locale::_
                                                                  • String ID: ?Il
                                                                  • API String ID: 463956699-3422423984
                                                                  • Opcode ID: 16c611486e0a16ba6673688737edf68126552f3f2047bf8c5a08e0ec9ba95e38
                                                                  • Instruction ID: 4d08780d526d3dd59d733a6d275f1c834ccb6a06832365544a1311b5c3b810f4
                                                                  • Opcode Fuzzy Hash: 16c611486e0a16ba6673688737edf68126552f3f2047bf8c5a08e0ec9ba95e38
                                                                  • Instruction Fuzzy Hash: 801153B0B10216AFDB05CF78C885F99BBF0BF48308F10866AA069DB741D770A9168F90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C413467
                                                                    • Part of subcall function 6C4127F4: __EH_prolog3.LIBCMT ref: 6C4127FB
                                                                    • Part of subcall function 6C413508: __EH_prolog3.LIBCMT ref: 6C41350F
                                                                  Strings
                                                                  • Integer: Min must be no greater than Max, xrefs: 6C4134DC
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_
                                                                  • String ID: Integer: Min must be no greater than Max
                                                                  • API String ID: 4240126716-615354371
                                                                  • Opcode ID: 20b3f194b099c128de449d5ad7ab4f79c0bf765a9a544143462b8e39f2807fcb
                                                                  • Instruction ID: ad2f9944957d77da3aa717f5dc88eedfa88f0455b1dea4e845cec1e0acd271a8
                                                                  • Opcode Fuzzy Hash: 20b3f194b099c128de449d5ad7ab4f79c0bf765a9a544143462b8e39f2807fcb
                                                                  • Instruction Fuzzy Hash: 9B114C75A042589BCF04DFE1C894EFEBBB9AF99318F50401DD845A7B40DB74A90DCBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: "T@l
                                                                  • API String ID: 0-4105657523
                                                                  • Opcode ID: d5083f71e5b44cb9ae4df71972017d8c4e7a60b15056cb7888d04c8dac905473
                                                                  • Instruction ID: 342c65ca8bba0039ce40a72b17506b62cf604d32b000de14080693f12f630576
                                                                  • Opcode Fuzzy Hash: d5083f71e5b44cb9ae4df71972017d8c4e7a60b15056cb7888d04c8dac905473
                                                                  • Instruction Fuzzy Hash: 0DF0D132606A149BC631DA6B8800FDA33A88F43339F110B1BE860A2FD1DB74D44A87E5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: D!>l
                                                                  • API String ID: 431132790-159124143
                                                                  • Opcode ID: 40053d5c632fe45c2a89fd75e8e6e1d39c3298ec9ec860fc5ee60152e6dcc4c6
                                                                  • Instruction ID: d0e3d05c9e19abdf23c80091932ca51ee8db13223706d9d3c6166aaa9b71c930
                                                                  • Opcode Fuzzy Hash: 40053d5c632fe45c2a89fd75e8e6e1d39c3298ec9ec860fc5ee60152e6dcc4c6
                                                                  • Instruction Fuzzy Hash: CDE01272900239ABCF15DF54C814EEEBB70EF18724F10801AE89577A51DB709A19CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __fread_nolock
                                                                  • String ID:
                                                                  • API String ID: 2638373210-0
                                                                  • Opcode ID: 36325ae9fc6de725ae21317e91409636039fdbe7c9289d62a526f7f8d673222b
                                                                  • Instruction ID: eb9cb7713cf2fee9c086ff0048b066098f9e9b9276f7fd5deebc472639fdeba8
                                                                  • Opcode Fuzzy Hash: 36325ae9fc6de725ae21317e91409636039fdbe7c9289d62a526f7f8d673222b
                                                                  • Instruction Fuzzy Hash: 3D31D1327002219FDB04CE6DC890AAB77A9EFCA71CF10853EF85497A51D77698088FA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 258fff93d3b13228f9896675ca51fb7449b4110ad9d73f9725d8ae9cd4bd0da8
                                                                  • Instruction ID: 0387af8ec43a5ac1c367eb214d8d2eff4bc7766c577b7daee9605b5f443bfe5b
                                                                  • Opcode Fuzzy Hash: 258fff93d3b13228f9896675ca51fb7449b4110ad9d73f9725d8ae9cd4bd0da8
                                                                  • Instruction Fuzzy Hash: A121B072901218BAEB02EF669C41F9E37299F4273DF204319F9242BED4DB715D09A6E1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __RTC_Initialize.LIBCMT ref: 6C4331DE
                                                                    • Part of subcall function 6C432A90: InitializeSListHead.KERNEL32(6C4E7B00,6C4331E8,6C4DBA70,00000010,6C433179,?,?,?,6C4333A1,?,00000001,?,?,00000001,?,6C4DBAB8), ref: 6C432A95
                                                                  • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6C433248
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                                  • String ID:
                                                                  • API String ID: 3231365870-0
                                                                  • Opcode ID: 87ec6077181167195790708f8acd170ae80cf5695bb5949fc8771ffa3f0de738
                                                                  • Instruction ID: 40309e101fbd2ab35f6c10831c1bce78ed9573bc161cea83b09e817d0f410cf3
                                                                  • Opcode Fuzzy Hash: 87ec6077181167195790708f8acd170ae80cf5695bb5949fc8771ffa3f0de738
                                                                  • Instruction Fuzzy Hash: BC21D4316492759EDB20EBB69809FDC3B609F8E32DF10680DD84857FC2CF61054AC6E9
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • FileTimeToSystemTime.KERNEL32(00000000,?,?,?,?,6C46B601,?,?,00000000,00000000), ref: 6C46B6F8
                                                                  • SystemTimeToTzSpecificLocalTime.KERNELBASE(00000000,?,?,?,?,?,6C46B601,?,?,00000000,00000000), ref: 6C46B70C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Time$System$FileLocalSpecific
                                                                  • String ID:
                                                                  • API String ID: 1707611234-0
                                                                  • Opcode ID: e1e5bc0c293664574f51121cddf45c648ffe403b1148f024ed7d74ef500d46c3
                                                                  • Instruction ID: 1b888365d7dcdf96063b7ff9a1da358ed1e92da4446c6f45084c8223439627e2
                                                                  • Opcode Fuzzy Hash: e1e5bc0c293664574f51121cddf45c648ffe403b1148f024ed7d74ef500d46c3
                                                                  • Instruction Fuzzy Hash: A0111F7290020CABDB10DEA6C844ECFB7BCAB09316F505266F915E3584EB30EB44DBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C4048FD
                                                                    • Part of subcall function 6C40379F: __EH_prolog3_GS.LIBCMT ref: 6C4037A6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_H_prolog3_catch_
                                                                  • String ID:
                                                                  • API String ID: 2112800272-0
                                                                  • Opcode ID: d0fa2f5cc20ab8b5bdfc972e0e23c41dc6e2566cc9456eaed0db3a77decfa496
                                                                  • Instruction ID: 8a3e02693728fa3afbd1a5253c5046f101ed21b59a1591d29d25cc3b3f2fcb33
                                                                  • Opcode Fuzzy Hash: d0fa2f5cc20ab8b5bdfc972e0e23c41dc6e2566cc9456eaed0db3a77decfa496
                                                                  • Instruction Fuzzy Hash: 8A51CE30E41218EBDB14DFA8D551EEDBBB1AF68308F14812DE95577B80CB344A099F95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS_align.LIBCMT ref: 6C4051A7
                                                                    • Part of subcall function 6C3E3DE9: __EH_prolog3.LIBCMT ref: 6C3E3DF0
                                                                    • Part of subcall function 6C40E529: __EH_prolog3_GS.LIBCMT ref: 6C40E530
                                                                    • Part of subcall function 6C3F25BF: __EH_prolog3.LIBCMT ref: 6C3F25C6
                                                                    • Part of subcall function 6C3F2573: CloseHandle.KERNEL32(00000000,?,6C4053C1,?,?,000000E8,00000008,6C40542D,?,00000010,6C405832,?), ref: 6C3F25B1
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3H_prolog3_$CloseHandleS_align
                                                                  • String ID:
                                                                  • API String ID: 2238001428-0
                                                                  • Opcode ID: 5e4ba6c91260a76a9c443dd6f18774a55e510cd79103d80e1f978a3be88b7d10
                                                                  • Instruction ID: e78e9ed973817dde562e064977b3dc14cbabd22a7bc5df25e79ec661e3897409
                                                                  • Opcode Fuzzy Hash: 5e4ba6c91260a76a9c443dd6f18774a55e510cd79103d80e1f978a3be88b7d10
                                                                  • Instruction Fuzzy Hash: 62515A31A00269DFCB64DB64CC84FDEB7B5AF19318F1040AED549A7691DB306B89CF92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C403F07
                                                                    • Part of subcall function 6C40379F: __EH_prolog3_GS.LIBCMT ref: 6C4037A6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID:
                                                                  • API String ID: 2427045233-0
                                                                  • Opcode ID: 999650a7c38d9c6617b28c70f99d8cbe0b9969a25c72e2cecc01d8557ee4f0ac
                                                                  • Instruction ID: 1ff59adc6277efdc3aa4e477ee88dd52dc7fd47dccba7d8739537d0032dda3ef
                                                                  • Opcode Fuzzy Hash: 999650a7c38d9c6617b28c70f99d8cbe0b9969a25c72e2cecc01d8557ee4f0ac
                                                                  • Instruction Fuzzy Hash: DA31BE31B402159BDB14DF68D850FEDBBB1EF48314F14886ED509A7B81DB309A89CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C40380F
                                                                    • Part of subcall function 6C40379F: __EH_prolog3_GS.LIBCMT ref: 6C4037A6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID:
                                                                  • API String ID: 2427045233-0
                                                                  • Opcode ID: 698b1c943e4cc737b54e9f281841652cfd7031866014bcabff3f8d7630686841
                                                                  • Instruction ID: f735f69ba492be365ec99746916a83a6bfb2c43bb183285e13346b00c7467600
                                                                  • Opcode Fuzzy Hash: 698b1c943e4cc737b54e9f281841652cfd7031866014bcabff3f8d7630686841
                                                                  • Instruction Fuzzy Hash: C0112F32AC462456E711DB348800FED6AA16F88718F10057CEDA55BB81DF64C90E8BD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __wsopen_s
                                                                  • String ID:
                                                                  • API String ID: 3347428461-0
                                                                  • Opcode ID: e31be87a611b6e7000d23cfa744ebab7ca68c45601be361ba39e854b4caccb55
                                                                  • Instruction ID: ff258c0209fb409838d9a3a9d3da28366a97d4df3c6953a4227c07ff11725f82
                                                                  • Opcode Fuzzy Hash: e31be87a611b6e7000d23cfa744ebab7ca68c45601be361ba39e854b4caccb55
                                                                  • Instruction Fuzzy Hash: F1114571A0420AAFCF05DF58E940DCB7BF5EF48308F004069F909AB311D630EA15CBA4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C403900
                                                                    • Part of subcall function 6C40379F: __EH_prolog3_GS.LIBCMT ref: 6C4037A6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_H_prolog3_catch_
                                                                  • String ID:
                                                                  • API String ID: 2112800272-0
                                                                  • Opcode ID: 2703b1805f639ae5df247c7a913d0622eb4ecc125f7d9691b878cad1057c924c
                                                                  • Instruction ID: 9e0b45e498525ecdde9295e5f20b13d4ff91126c9850cc6ac455ece629f83c03
                                                                  • Opcode Fuzzy Hash: 2703b1805f639ae5df247c7a913d0622eb4ecc125f7d9691b878cad1057c924c
                                                                  • Instruction Fuzzy Hash: 65110630E40228DACB11CBB48800FDDBB696F5430CF10889AD589F7780CF705A4E8FA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000,?,?,?,?,?,?,?,000000FF,?,6C3F1CA3), ref: 6C3F22ED
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: TimerWaitable
                                                                  • String ID:
                                                                  • API String ID: 1823812067-0
                                                                  • Opcode ID: 58f3b97b69cdb9066cedd9b68c72b4dfb95d9bf057d405480f81750491a17ffd
                                                                  • Instruction ID: 91bd65d3371fa9bdf536ad966681ca7eaa9cfce81ad9bad821d151df6b65d517
                                                                  • Opcode Fuzzy Hash: 58f3b97b69cdb9066cedd9b68c72b4dfb95d9bf057d405480f81750491a17ffd
                                                                  • Instruction Fuzzy Hash: 0D01B176B04751AFC614DE29C88982BF7A8FB89624B41892EE9158BB00DA31EC058ED1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3F9F71
                                                                    • Part of subcall function 6C3F9DA9: WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,6C4E88EC,?), ref: 6C3F9DED
                                                                    • Part of subcall function 6C3FA89E: __EH_prolog3.LIBCMT ref: 6C3FA8A5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$ObjectSingleWait
                                                                  • String ID:
                                                                  • API String ID: 3802047751-0
                                                                  • Opcode ID: 9f002bfb1d3c18d1172e4c9a371af3a2ba31a84cb8ae97000d38a5c0f410ba6f
                                                                  • Instruction ID: 19c0b269f9b2547230c618acc0b56109af20e1b795c26096bd8a89389438e617
                                                                  • Opcode Fuzzy Hash: 9f002bfb1d3c18d1172e4c9a371af3a2ba31a84cb8ae97000d38a5c0f410ba6f
                                                                  • Instruction Fuzzy Hash: 3C014970A05365AEEB05CF644050AEDBF706F5520CF14054ED6A43BB81CB75AA4BDFE2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID:
                                                                  • API String ID: 431132790-0
                                                                  • Opcode ID: b15639b36a92a04233bfd7e4f012439db68ee7c1bbf04eb26e58183cf0bbbc76
                                                                  • Instruction ID: bbf61beb3b66481e1955ea3afeb860a174fbec3c503c1508b72f919ed06c0269
                                                                  • Opcode Fuzzy Hash: b15639b36a92a04233bfd7e4f012439db68ee7c1bbf04eb26e58183cf0bbbc76
                                                                  • Instruction Fuzzy Hash: E911A574B402159BCF10DF64C890FED3771AB4930DF1545A9C9917BB41CB216D0EDBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C4026B0
                                                                    • Part of subcall function 6C3F9DA9: WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,6C4E88EC,?), ref: 6C3F9DED
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3ObjectSingleWait
                                                                  • String ID:
                                                                  • API String ID: 2100491740-0
                                                                  • Opcode ID: 4d658bd4263f53f61652dd5892b636420953fb7d46a198aa870f39413654b2d6
                                                                  • Instruction ID: 9b54b4c1d560abaf7a2361a85809c42ef5931ef5fbae0f58dc5b37e9804338b3
                                                                  • Opcode Fuzzy Hash: 4d658bd4263f53f61652dd5892b636420953fb7d46a198aa870f39413654b2d6
                                                                  • Instruction Fuzzy Hash: 83115970A00605DBDB61CF64C084FDEB7F4BB44309F10885ED596A7791DB70A989CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3FA8A5
                                                                    • Part of subcall function 6C3F9AE3: __EH_prolog3.LIBCMT ref: 6C3F9AEA
                                                                    • Part of subcall function 6C3F9AE3: EnterCriticalSection.KERNEL32(?,00000008,6C3FA8DB,?,6C3FAFF3,?), ref: 6C3F9AF5
                                                                    • Part of subcall function 6C3F9AE3: LeaveCriticalSection.KERNEL32(?,?,00000008,6C3FA8DB,?), ref: 6C3F9B23
                                                                    • Part of subcall function 6C3F9AE3: EnterCriticalSection.KERNEL32(?,?,00000008,6C3FA8DB,?), ref: 6C3F9B45
                                                                    • Part of subcall function 6C3F9AE3: LeaveCriticalSection.KERNEL32(?,?,?,00000008,6C3FA8DB,?), ref: 6C3F9B74
                                                                    • Part of subcall function 6C3FADD1: __EH_prolog3.LIBCMT ref: 6C3FADD8
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$H_prolog3$EnterLeave
                                                                  • String ID:
                                                                  • API String ID: 4021137310-0
                                                                  • Opcode ID: 8cd2584721896bd9dad0fc9a8046ee5dc24b645b7e552aeb6e00c88c1a0ddc9f
                                                                  • Instruction ID: d8c4e7f9a5169d369460bd7d6deade89b67301f7bfa1d827655d7c673c1dfbd8
                                                                  • Opcode Fuzzy Hash: 8cd2584721896bd9dad0fc9a8046ee5dc24b645b7e552aeb6e00c88c1a0ddc9f
                                                                  • Instruction Fuzzy Hash: 0311C5B0D0071AAFCB00DF6AC88099AFBB4BF18314B50866E94689BB50C774A655CFE1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3EA43E
                                                                    • Part of subcall function 6C3EC52A: __EH_prolog3_GS.LIBCMT ref: 6C3EC531
                                                                    • Part of subcall function 6C3EC52A: std::_Lockit::_Lockit.LIBCPMT ref: 6C3EC53E
                                                                    • Part of subcall function 6C3EC52A: std::_Lockit::~_Lockit.LIBCPMT ref: 6C3EC5A2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Lockitstd::_$H_prolog3H_prolog3_Lockit::_Lockit::~_
                                                                  • String ID:
                                                                  • API String ID: 2728201062-0
                                                                  • Opcode ID: 5f4753096f2a90741928abed47baf22cad95d6930fc98c2a7728349143d7a325
                                                                  • Instruction ID: 144b50bd9f617cc62f843d1cdbd1d34a8c8e9a2dab8dfa562799096b726b4d73
                                                                  • Opcode Fuzzy Hash: 5f4753096f2a90741928abed47baf22cad95d6930fc98c2a7728349143d7a325
                                                                  • Instruction Fuzzy Hash: 2A019E306002249FDB01CB65C949FADBBF5BF48329F10802AE5459BF90DB75E908CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • KiUserExceptionDispatcher.NTDLL(E06D7363,00000001,00000003,6C3E165C,00000000,6C3E2DF5,?,6C3E165C,00000008,6C4DC3E0,00000008), ref: 6C45E20A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: DispatcherExceptionUser
                                                                  • String ID:
                                                                  • API String ID: 6842923-0
                                                                  • Opcode ID: 0bbdc1c8720d548222beb053baaa403bfc5054203b99e8c4effc9320c44d0c37
                                                                  • Instruction ID: 87bd7d52d4d04b2be01ea4e6aaa7dba13fbec9fd90b43df265520100866ee9b7
                                                                  • Opcode Fuzzy Hash: 0bbdc1c8720d548222beb053baaa403bfc5054203b99e8c4effc9320c44d0c37
                                                                  • Instruction Fuzzy Hash: 9D017C36A00219ABDB01DF58C880FAEBBB8FF48619F114059E925AB391DB70A901CBD0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3FB0F6
                                                                    • Part of subcall function 6C3F9AE3: __EH_prolog3.LIBCMT ref: 6C3F9AEA
                                                                    • Part of subcall function 6C3F9AE3: EnterCriticalSection.KERNEL32(?,00000008,6C3FA8DB,?,6C3FAFF3,?), ref: 6C3F9AF5
                                                                    • Part of subcall function 6C3F9AE3: LeaveCriticalSection.KERNEL32(?,?,00000008,6C3FA8DB,?), ref: 6C3F9B23
                                                                    • Part of subcall function 6C3F9AE3: EnterCriticalSection.KERNEL32(?,?,00000008,6C3FA8DB,?), ref: 6C3F9B45
                                                                    • Part of subcall function 6C3F9AE3: LeaveCriticalSection.KERNEL32(?,?,?,00000008,6C3FA8DB,?), ref: 6C3F9B74
                                                                    • Part of subcall function 6C3F9CA2: __EH_prolog3_GS.LIBCMT ref: 6C3F9CA9
                                                                    • Part of subcall function 6C3F9CA2: EnterCriticalSection.KERNEL32(?,00000028,6C3FB167,6C3FB027,?,6C3FACB2,?,6C3FB027,?), ref: 6C3F9CBA
                                                                    • Part of subcall function 6C3F9CA2: CreateWaitableTimerW.KERNEL32(00000000,00000000,00000000), ref: 6C3F9CDA
                                                                    • Part of subcall function 6C3F9CA2: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 6C3F9CE7
                                                                    • Part of subcall function 6C3F9CA2: SetWaitableTimer.KERNELBASE(00000001,?,000493E0,00000000,00000000,00000000), ref: 6C3F9D29
                                                                    • Part of subcall function 6C3F9CA2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 6C3F9D8D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$H_prolog3TimerWaitable$CreateErrorH_prolog3_Last
                                                                  • String ID:
                                                                  • API String ID: 1872940341-0
                                                                  • Opcode ID: 545ecc589fec3b87d301389ced39897d0a3b95a46a2b7bf2d03007635f735342
                                                                  • Instruction ID: fb7c8d5491d28503a71dd59a738c83614046612554f44b7d073bb6c77b41bbbc
                                                                  • Opcode Fuzzy Hash: 545ecc589fec3b87d301389ced39897d0a3b95a46a2b7bf2d03007635f735342
                                                                  • Instruction Fuzzy Hash: 7411F0B1D00706AFCB40DFB9C400A9AFBF4BF48304B10892E9069D7B00EB34AA56CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000008,6C3E2DD3,00000000,?,6C47B30E,00000001,00000364,FFFFFFFF,000000FF,?,6C45D730,7FFFFFC6,7FFFFFC0,7FFFFFC0), ref: 6C478F01
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: dc75889b17fed60a7a000d67e7ed0b9d455e09648e249cea1fb99f9dc86e35c6
                                                                  • Instruction ID: 0464d9489c43b472e977f8257005daad64597326c3a4be3ac633a78ea047a9a1
                                                                  • Opcode Fuzzy Hash: dc75889b17fed60a7a000d67e7ed0b9d455e09648e249cea1fb99f9dc86e35c6
                                                                  • Instruction Fuzzy Hash: F9F0B4326465349BEB71EA2B9C04FCB3799AF41765B114523E924FBE80CB30D40586F0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3FCEEE
                                                                    • Part of subcall function 6C3F14EE: __EH_prolog3.LIBCMT ref: 6C3F14F5
                                                                    • Part of subcall function 6C3E2153: __EH_prolog3.LIBCMT ref: 6C3E21C4
                                                                    • Part of subcall function 6C3E2153: std::locale::_Init.LIBCPMT ref: 6C3E220E
                                                                    • Part of subcall function 6C3FCF6F: __EH_prolog3_catch_GS_align.LIBCMT ref: 6C3FCF7B
                                                                    • Part of subcall function 6C3F0E07: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C3F0E3F
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_H_prolog3_catch_InitIos_base_dtorS_alignstd::ios_base::_std::locale::_
                                                                  • String ID:
                                                                  • API String ID: 1125224168-0
                                                                  • Opcode ID: 4414f023e69e695a2f8b247797b94163b2fc4385aa8e59bbe916caf3677c32b6
                                                                  • Instruction ID: 00a531deb3312b2014d532be176f413caa9a9dcb92466d81887e5c6b89807b45
                                                                  • Opcode Fuzzy Hash: 4414f023e69e695a2f8b247797b94163b2fc4385aa8e59bbe916caf3677c32b6
                                                                  • Instruction Fuzzy Hash: 87018B71901119DBFB24DB10DC45FE8B374AB50308F108589E50CAB680DBB1AA4ACFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID:
                                                                  • API String ID: 431132790-0
                                                                  • Opcode ID: 9a36b154d3627d81a01ea5386e823385b7fa6ac97986b6f22aefe6a0fc4bd2bb
                                                                  • Instruction ID: ba9aac2a05722bee7c539084ad705285ca695d0deda54592d0eeeea7364ecc67
                                                                  • Opcode Fuzzy Hash: 9a36b154d3627d81a01ea5386e823385b7fa6ac97986b6f22aefe6a0fc4bd2bb
                                                                  • Instruction Fuzzy Hash: 08011635900229DBCF00CFA4C954EEE7BB4AF5C318F908059E85577691DB74EE49CBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C478EC0: RtlAllocateHeap.NTDLL(00000008,6C3E2DD3,00000000,?,6C47B30E,00000001,00000364,FFFFFFFF,000000FF,?,6C45D730,7FFFFFC6,7FFFFFC0,7FFFFFC0), ref: 6C478F01
                                                                  • _free.LIBCMT ref: 6C47E267
                                                                    • Part of subcall function 6C47A768: HeapFree.KERNEL32(00000000,00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000), ref: 6C47A77E
                                                                    • Part of subcall function 6C47A768: GetLastError.KERNEL32(00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000,00000000), ref: 6C47A790
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$AllocateErrorFreeLast_free
                                                                  • String ID:
                                                                  • API String ID: 314386986-0
                                                                  • Opcode ID: 276d8724f6e520aee69ebaccae84323900427befc063d678485cd2583d443af5
                                                                  • Instruction ID: b514b23356d28ffe0e31afd99b230dcc1383e6eef9b912307676bccef3e697f7
                                                                  • Opcode Fuzzy Hash: 276d8724f6e520aee69ebaccae84323900427befc063d678485cd2583d443af5
                                                                  • Instruction Fuzzy Hash: 8EF049726017009FE331DF45D841F92B7F8EB91B16F10882EE69A9BA90D7B4E445CB94
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID:
                                                                  • API String ID: 431132790-0
                                                                  • Opcode ID: cdc1fac33cd4df8552a5ff1d26e4614de79af00aaae68be6ab00b7ae4eea8a4c
                                                                  • Instruction ID: 6adbf69f1dc7b19ae8b48cba728d80ece36723a478cadb5c860c776203d3446f
                                                                  • Opcode Fuzzy Hash: cdc1fac33cd4df8552a5ff1d26e4614de79af00aaae68be6ab00b7ae4eea8a4c
                                                                  • Instruction Fuzzy Hash: 2EF06231905229AFDB01DB94CC80EEE77B8BF59318F20004DE1956B780CB34A909CF65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,7FFFFFC4,7FFFFFC0,?,6C45D730,7FFFFFC6,7FFFFFC0,7FFFFFC0,?,?,6C3E1573,6C3E2DD3,7FFFFFC4,6C3E2DD3,6C3E2DD3), ref: 6C47AB2F
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: ed2289cba83c377fe3d681618ae2de402a6cfbfa677839cbd2a338510bf16483
                                                                  • Instruction ID: e90000be3d9a92457553ad7204e85034df063cc1d7a28d5c32cbd101eb97c7d4
                                                                  • Opcode Fuzzy Hash: ed2289cba83c377fe3d681618ae2de402a6cfbfa677839cbd2a338510bf16483
                                                                  • Instruction Fuzzy Hash: 36E065216421259AEA31DA6A8D14FCA7F9ADF423AAF112125DF1497ED4DB20C800C5F1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ResumeThread.KERNELBASE(?,00000000,?,?,?,6C3F2735,00000044,6C40527F,00000010,6C405832,?), ref: 6C4099F7
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: 063dfcff6d412df66534375c4cda300f12ac54afb51848b2e7fb616d64f63753
                                                                  • Instruction ID: fc8a0be5b17f3434323ecfa4cbce47e70f139a33232a6ee13cf8c33ac3e088f0
                                                                  • Opcode Fuzzy Hash: 063dfcff6d412df66534375c4cda300f12ac54afb51848b2e7fb616d64f63753
                                                                  • Instruction Fuzzy Hash: BFF065313541106BDA24DF58EC81FA573E4EF85315F14046EF945CB751D6619D829A90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch.LIBCMT ref: 6C4053E1
                                                                    • Part of subcall function 6C3F9DA9: WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,6C4E88EC,?), ref: 6C3F9DED
                                                                    • Part of subcall function 6C3FCEE4: __EH_prolog3_GS.LIBCMT ref: 6C3FCEEE
                                                                    • Part of subcall function 6C40519B: __EH_prolog3_GS_align.LIBCMT ref: 6C4051A7
                                                                    • Part of subcall function 6C3E2DDE: SetEvent.KERNEL32(00000000,?,00000000), ref: 6C3E2E02
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$EventH_prolog3_catchObjectS_alignSingleWait
                                                                  • String ID:
                                                                  • API String ID: 2842236713-0
                                                                  • Opcode ID: dc5e7388a26ee399204ecd398175a9bd1e92bec19cf959913acb292118e269c7
                                                                  • Instruction ID: 89319d883e94ffdf91029d2ba9f4adb439bb84e52f1f37429595737095e721c7
                                                                  • Opcode Fuzzy Hash: dc5e7388a26ee399204ecd398175a9bd1e92bec19cf959913acb292118e269c7
                                                                  • Instruction Fuzzy Hash: 06F0B470F402289BCF15EBA88014FECBAA15F9472DF21405DD584ABB80CBB94E0A97D6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WSAStartup.WS2_32(00000002,00000002), ref: 6C3E2B7A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Startup
                                                                  • String ID:
                                                                  • API String ID: 724789610-0
                                                                  • Opcode ID: b8e81ae17be4991dc70eb2c627c4c547b20b576b664198747d82ad9d1399fa8c
                                                                  • Instruction ID: 0b3c29760e845e8689521f51aa6a6f5561592a9ad4c84c27bcacf8ffeb2153f2
                                                                  • Opcode Fuzzy Hash: b8e81ae17be4991dc70eb2c627c4c547b20b576b664198747d82ad9d1399fa8c
                                                                  • Instruction Fuzzy Hash: B6E09231A152114BDB64FB38C95BAB973E8EB4F329F41062EDD6EC6580EE3194058AC2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C4214A8
                                                                    • Part of subcall function 6C421466: __EH_prolog3.LIBCMT ref: 6C42146D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID:
                                                                  • API String ID: 431132790-0
                                                                  • Opcode ID: 85c26ab7b1b19565ec9f3e4309f186aea75fad1f5d0b35fd39ab0935907b868e
                                                                  • Instruction ID: f81570ba18c0bfbe0aa97be2bd24ce75891fa438804ccee453f71f8283839c20
                                                                  • Opcode Fuzzy Hash: 85c26ab7b1b19565ec9f3e4309f186aea75fad1f5d0b35fd39ab0935907b868e
                                                                  • Instruction Fuzzy Hash: 67E0E531901119AFDF05DF94CC15EED7B31FF54318F108459A4591B6A0DB729A29DF81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3FAFFA
                                                                    • Part of subcall function 6C3FB0EF: __EH_prolog3.LIBCMT ref: 6C3FB0F6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID:
                                                                  • API String ID: 431132790-0
                                                                  • Opcode ID: af9f5824788343aa82165147347c3ddf5e671cca246dc920769abdc67015d713
                                                                  • Instruction ID: 8f3db3130cfa99357a0f75ffaf82a4c93c3dc42a04dca67be046ba234fee1a01
                                                                  • Opcode Fuzzy Hash: af9f5824788343aa82165147347c3ddf5e671cca246dc920769abdc67015d713
                                                                  • Instruction Fuzzy Hash: FFD0C230A5113076E721EB919C01FCC3A106F94A6DF804018F1987EBC1CBA4560987D9
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000), ref: 6C478162
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: ba888b6c8cd88b57eb77e5a038d5f6ec5a021024d23a8530c11bcbbeafdd6886
                                                                  • Instruction ID: 696ed214f0245d432da759a88967d0156251ae7e1620a26016d19e4a03ec4df6
                                                                  • Opcode Fuzzy Hash: ba888b6c8cd88b57eb77e5a038d5f6ec5a021024d23a8530c11bcbbeafdd6886
                                                                  • Instruction Fuzzy Hash: FDD06C3210010DBBDF129E84DD0AEDA3BBAFB48714F018000BA1856020C732E861EB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3E3DF0
                                                                    • Part of subcall function 6C427BD6: __EH_prolog3.LIBCMT ref: 6C427BDD
                                                                    • Part of subcall function 6C4214A1: __EH_prolog3.LIBCMT ref: 6C4214A8
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID:
                                                                  • API String ID: 431132790-0
                                                                  • Opcode ID: c37d39a842a58b4b974a0e9395ae5c2303f6281746aa6341fc9c5aadcb238721
                                                                  • Instruction ID: d7b58a4c97ef632b13f1e702a7e051d04bd878ddabcfcbb169a1b86f15f51280
                                                                  • Opcode Fuzzy Hash: c37d39a842a58b4b974a0e9395ae5c2303f6281746aa6341fc9c5aadcb238721
                                                                  • Instruction Fuzzy Hash: 45D0A7B2B40234A7D711DB608413FADB910AF64B3DF00404DE2445FFC0CBB5890983EA
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C42146D
                                                                    • Part of subcall function 6C42138B: __EH_prolog3_GS.LIBCMT ref: 6C421392
                                                                    • Part of subcall function 6C42138B: BCryptGenRandom.BCRYPT(?,00000000,00000000,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000,00000010,6C3E3E14,00000000), ref: 6C4213C2
                                                                    • Part of subcall function 6C42134F: BCryptCloseAlgorithmProvider.BCRYPT(?,00000000,6C42149B,00000000,?,00000008,6C4214CC,?,?,00000000,00000000,00000010,6C3E3E14,00000000,00000020,00000004), ref: 6C421358
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Crypt$AlgorithmCloseH_prolog3H_prolog3_ProviderRandom
                                                                  • String ID:
                                                                  • API String ID: 3013398009-0
                                                                  • Opcode ID: 69aa529bed7937d3761ddf1599d16b8250951fb42c2c004608644bcd593bcfa0
                                                                  • Instruction ID: c26b02b69b91066be1f691152e0b1e07bb4bc4646934b215eaad07596cb6b283
                                                                  • Opcode Fuzzy Hash: 69aa529bed7937d3761ddf1599d16b8250951fb42c2c004608644bcd593bcfa0
                                                                  • Instruction Fuzzy Hash: C1E0EC314002299ADF01DF91C912FEEBB31BF54219F90440CA41076A90DB369B18CBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6C4080C7
                                                                  • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 6C4080D5
                                                                  • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 6C4080E6
                                                                  • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 6C4080F7
                                                                  • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 6C408108
                                                                  • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 6C408119
                                                                  • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 6C40812A
                                                                  • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 6C40813B
                                                                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 6C40814C
                                                                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 6C40815D
                                                                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 6C40816E
                                                                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 6C40817F
                                                                  • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 6C408190
                                                                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 6C4081A1
                                                                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 6C4081B2
                                                                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 6C4081C3
                                                                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 6C4081D4
                                                                  • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 6C4081E5
                                                                  • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 6C4081F6
                                                                  • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 6C408207
                                                                  • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 6C408218
                                                                  • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 6C408229
                                                                  • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 6C40823A
                                                                  • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 6C40824B
                                                                  • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 6C40825C
                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 6C40826D
                                                                  • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 6C40827E
                                                                  • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 6C40828F
                                                                  • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 6C4082A0
                                                                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 6C4082B1
                                                                  • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 6C4082C2
                                                                  • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 6C4082D3
                                                                  • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 6C4082E4
                                                                  • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 6C4082F5
                                                                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 6C408306
                                                                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 6C408317
                                                                  • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 6C408328
                                                                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 6C408339
                                                                  • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 6C40834A
                                                                  • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 6C40835B
                                                                  • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 6C40836C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                                  • API String ID: 667068680-295688737
                                                                  • Opcode ID: 0ee1382a0f9bc8954c0320dc5d54ef4e42918cd6b8936267c2d5ebe25fe1bd57
                                                                  • Instruction ID: d9f74078161b7d482b47c21619c72ce706f2dfcc295373558e8b11893f8a02ba
                                                                  • Opcode Fuzzy Hash: 0ee1382a0f9bc8954c0320dc5d54ef4e42918cd6b8936267c2d5ebe25fe1bd57
                                                                  • Instruction Fuzzy Hash: 926127B1A52274ABCF60FFB5888ED963FF8BA2F2157028916B309E3603DB7544118F55
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS_align.LIBCMT ref: 6C3F747D
                                                                  • GetAdaptersInfo.IPHLPAPI(00000000,?), ref: 6C3F7639
                                                                  • GetAdaptersInfo.IPHLPAPI(00000000,?), ref: 6C3F7662
                                                                  • CoInitializeEx.OLE32(00000000,00000000,00000000,?,?,?,?,00000022,0000000C,6C403897,00000000), ref: 6C3F7708
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AdaptersInfo$H_prolog3_InitializeS_align
                                                                  • String ID: Capacity$Manufacturer$Model$Name$Parallels$ProcessorId$Product$SMBIOSBIOSVersion$Select Capacity from Win32_PhysicalMemory$Select Model from Win32_DiskDrive$Select Name, SerialNumber, SMBIOSBIOSVersion, Manufacturer, Version from Win32_BIOS$Select ProcessorId, Name, Manufacturer from Win32_Processor$Select Product, Manufacturer from Win32_BaseBoard$SerialNumber$VMware$Version$VirtualBox$WQL$Winmgmt$Xen$root\cimv2
                                                                  • API String ID: 502173611-2058923299
                                                                  • Opcode ID: e033257122b6f71e32c657796fd897bd37dfc8f0c868734c6c4e527a628c7fdf
                                                                  • Instruction ID: f3c02b3eacd570f2fb340ecd0b4b35c96d12baf6ea9551cc33efe05defb1cf32
                                                                  • Opcode Fuzzy Hash: e033257122b6f71e32c657796fd897bd37dfc8f0c868734c6c4e527a628c7fdf
                                                                  • Instruction Fuzzy Hash: 6CF2D430E002589FDF29CFA5CC48BADB7B9BF46308F144999E429EB651D7319A86CF11
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C44F8F0: MultiByteToWideChar.KERNEL32(0000FDE9,00000008,00000000,000000FF,00000000,00000000,00000000,00000000,6C44F9BD,00000000,00000000,?,00000000,6C441650,00000000,6C498858), ref: 6C44F909
                                                                    • Part of subcall function 6C44F8F0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,0000071B,?,00000000), ref: 6C44F934
                                                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 6C45A600
                                                                  • GetLastError.KERNEL32(?,00000100), ref: 6C45A614
                                                                    • Part of subcall function 6C451ED9: _strncpy.LIBCMT ref: 6C451F18
                                                                    • Part of subcall function 6C451ED9: GetLastError.KERNEL32 ref: 6C451F39
                                                                    • Part of subcall function 6C451ED9: SetLastError.KERNEL32(00000000), ref: 6C451F44
                                                                  • GetLastError.KERNEL32(?,00000100,00000000,?,00000000,?), ref: 6C45A597
                                                                    • Part of subcall function 6C451ED9: GetLastError.KERNEL32(?,00000000,?,6C45A3EA,00000000), ref: 6C451EDC
                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,?,00000000,?), ref: 6C45A5CC
                                                                  • GetLastError.KERNEL32(?,00000100), ref: 6C45A5E5
                                                                  • CloseHandle.KERNEL32(?), ref: 6C45A819
                                                                  Strings
                                                                  • schannel: failed to determine size of CA file '%s': %s, xrefs: 6C45A622
                                                                  • schannel: CA file exceeds max size of %u bytes, xrefs: 6C45A64E
                                                                  • schannel: failed to add certificate from CA file '%s' to certificate store: %s, xrefs: 6C45A7C4
                                                                  • -----BEGIN CERTIFICATE-----, xrefs: 6C45A6CA
                                                                  • -----END CERTIFICATE-----, xrefs: 6C45A6F0
                                                                  • schannel: failed to extract certificate from CA file '%s': %s, xrefs: 6C45A7F8
                                                                  • schannel: CA file '%s' is not correctly formatted, xrefs: 6C45A800
                                                                  • schannel: unexpected content type '%d' when extracting certificate from CA file '%s', xrefs: 6C45A7D0
                                                                  • schannel: invalid path name for CA file '%s': %s, xrefs: 6C45A5A5
                                                                  • schannel: failed to open CA file '%s': %s, xrefs: 6C45A5F3
                                                                  • schannel: failed to read from CA file '%s': %s, xrefs: 6C45A79C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$ByteCharFileMultiWide$CloseCreateHandleSize_strncpy
                                                                  • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                                                  • API String ID: 1831725766-4093726272
                                                                  • Opcode ID: 584135d4d1c5f69609786c0d3ceb67f4d72d9d86030b4bc36dd6304c158ff9a2
                                                                  • Instruction ID: b0c1d51dc32a860c87f07e0df83b353862257a6c7bd9b00b68b922e860efbdfc
                                                                  • Opcode Fuzzy Hash: 584135d4d1c5f69609786c0d3ceb67f4d72d9d86030b4bc36dd6304c158ff9a2
                                                                  • Instruction Fuzzy Hash: 5581C471A05355AFE710DF25CC48EAB7BBCEF5A718F80091EF68592A80D730D9158BB2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • getsockname() failed with errno %d: %s, xrefs: 6C44068A
                                                                  • bind failed with errno %d: %s, xrefs: 6C4406C0
                                                                  • Couldn't bind to '%s', xrefs: 6C440594
                                                                  • Couldn't bind to interface '%s', xrefs: 6C440456
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: htons$ErrorLastbind$___from_strstr_to_strchrgetsockname
                                                                  • String ID: Couldn't bind to '%s'$Couldn't bind to interface '%s'$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
                                                                  • API String ID: 3019491166-44904850
                                                                  • Opcode ID: f918e626deeeca7f6988222851bb671491ed4ca201b384ce32b80681d0caa020
                                                                  • Instruction ID: f193b5fc7d7b3fc7ee9dc889decfc5fb9232bd294e4de89e580bea5966fcb627
                                                                  • Opcode Fuzzy Hash: f918e626deeeca7f6988222851bb671491ed4ca201b384ce32b80681d0caa020
                                                                  • Instruction Fuzzy Hash: 49C1DB71508381AFE721DF24C844FAB7BE8EF99318F24861DF98897641E731D51987A2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • socket.WS2_32 ref: 6C4481C9
                                                                  • htonl.WS2_32(7F000001), ref: 6C4481EE
                                                                  • setsockopt.WS2_32(00000000,0000FFFF,00000004,00000006,00000004), ref: 6C448213
                                                                  • bind.WS2_32(00000000,00000002,00000010), ref: 6C448229
                                                                  • getsockname.WS2_32(00000000,00000002,00000006), ref: 6C448242
                                                                  • listen.WS2_32(00000000,00000001), ref: 6C448253
                                                                  • socket.WS2_32(00000002,00000001,00000000), ref: 6C448269
                                                                  • connect.WS2_32(00000000,00000002,00000010), ref: 6C44827D
                                                                  • accept.WS2_32(00000000,00000000,00000000), ref: 6C448290
                                                                  • __fprintf_l.LIBCMT ref: 6C4482AA
                                                                  • send.WS2_32(?,?,?,00000000), ref: 6C4482CC
                                                                  • recv.WS2_32(00000008,?,0000000C,00000000), ref: 6C4482E2
                                                                  • closesocket.WS2_32(00000000), ref: 6C448304
                                                                  • closesocket.WS2_32(00000000), ref: 6C448315
                                                                  • closesocket.WS2_32(?), ref: 6C448319
                                                                  • closesocket.WS2_32(00000008), ref: 6C44831E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: closesocket$socket$__fprintf_lacceptbindconnectgetsocknamehtonllistenrecvsendsetsockopt
                                                                  • String ID:
                                                                  • API String ID: 4040947024-0
                                                                  • Opcode ID: 49ab0df351421ee54859f2d07f3d04595d5af97b01435f5b6b9824642dc2db9d
                                                                  • Instruction ID: 094f7566181ebcf7f63d76f7d90eeacd8bc8f57c79d072bbd1fb02f6f02ae220
                                                                  • Opcode Fuzzy Hash: 49ab0df351421ee54859f2d07f3d04595d5af97b01435f5b6b9824642dc2db9d
                                                                  • Instruction Fuzzy Hash: 8F41C271704214AFE720EF60CD49F6BBBAAFF46704F60491AF551D6180DB71D9088BA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000001,00000001,00000001,?,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F), ref: 6C3F1FBA
                                                                  • GetLastError.KERNEL32(?,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3F1FC4
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3F200A
                                                                  • EnterCriticalSection.KERNEL32(?), ref: 6C3F2039
                                                                  • LeaveCriticalSection.KERNEL32(?,?), ref: 6C3F209F
                                                                  • SetLastError.KERNEL32(00000000,00000048,?,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832), ref: 6C3F20B1
                                                                  • GetQueuedCompletionStatus.KERNEL32(?,000000FF,?,?,00000004,?,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044), ref: 6C3F20C9
                                                                  • GetLastError.KERNEL32(?,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3F20D2
                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000), ref: 6C3F21DD
                                                                  • GetLastError.KERNEL32 ref: 6C3F21E7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$CompletionQueuedStatus$CriticalPostSection$EnterH_prolog3_Leave
                                                                  • String ID: $8Il$pqcs
                                                                  • API String ID: 4045081058-1275610015
                                                                  • Opcode ID: 3b75ca05bb478568244b742bde1298d409092cbb360611abbef86c9b19245618
                                                                  • Instruction ID: ab47e4ec37cd697087aa98bd91918cc35eeb4c4fc6519018780e1bcaedbf12ed
                                                                  • Opcode Fuzzy Hash: 3b75ca05bb478568244b742bde1298d409092cbb360611abbef86c9b19245618
                                                                  • Instruction Fuzzy Hash: ACA1E071D00219EFCF19CFA9D9489DEBBB8FF09314B11852AE865A7600DB319906CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3F7125
                                                                  • SysFreeString.OLEAUT32(00000000), ref: 6C3F71F6
                                                                  • VariantClear.OLEAUT32(00000000), ref: 6C3F735B
                                                                  • VariantClear.OLEAUT32(00000000), ref: 6C3F73B6
                                                                  • SysFreeString.OLEAUT32(00000000), ref: 6C3F7452
                                                                  Strings
                                                                  • GUID, xrefs: 6C3F7273
                                                                  • DeviceID, xrefs: 6C3F7374
                                                                  • SELECT GUID, DeviceID FROM Win32_NetworkAdapter WHERE PhysicalAdapter = TRUE AND (PNPDeviceID LIKE "PCI\\%" OR PNPDeviceID LIKE "U, xrefs: 6C3F71C9
                                                                  • WQL, xrefs: 6C3F713A
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ClearFreeStringVariant$H_prolog3_
                                                                  • String ID: DeviceID$GUID$SELECT GUID, DeviceID FROM Win32_NetworkAdapter WHERE PhysicalAdapter = TRUE AND (PNPDeviceID LIKE "PCI\\%" OR PNPDeviceID LIKE "U$WQL
                                                                  • API String ID: 2589909221-3455312690
                                                                  • Opcode ID: 57e6b480061f5e8d0b6f906e2877f4238ca64b4a9a108a5cc159ed5a182402ab
                                                                  • Instruction ID: 085318332b81f6c8ac3ad7b11b582d501a05445f91a76e3ac7c0fc1d4b4f56cf
                                                                  • Opcode Fuzzy Hash: 57e6b480061f5e8d0b6f906e2877f4238ca64b4a9a108a5cc159ed5a182402ab
                                                                  • Instruction Fuzzy Hash: 8CA1E531E01255DFDB21DFA4CC44AEEB7B5AF85308F1089A9D459AB640DB309E86CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CertGetNameStringW.CRYPT32(?,00000006,00010002,00000000,?,?), ref: 6C45A892
                                                                  Strings
                                                                  • schannel: Not enough memory to list all host names., xrefs: 6C45A9CF
                                                                  • schannel: Null certificate context., xrefs: 6C45A8C4
                                                                  • 2.5.29.17, xrefs: 6C45A8ED, 6C45A925
                                                                  • schannel: Null certificate info., xrefs: 6C45A8E0
                                                                  • schannel: CertFindExtension() returned no extension., xrefs: 6C45A8FC
                                                                  • schannel: CryptDecodeObjectEx() returned no alternate name information., xrefs: 6C45A939
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CertNameString
                                                                  • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.
                                                                  • API String ID: 149855834-882765523
                                                                  • Opcode ID: 07571d2b6deb185a17201bf35c00e163f70548231e555d5d7846f490bd14c097
                                                                  • Instruction ID: de220418ccf9741dcc2ba6bbd10a10849c436ee9f5faaee8f0b085e4168f3b25
                                                                  • Opcode Fuzzy Hash: 07571d2b6deb185a17201bf35c00e163f70548231e555d5d7846f490bd14c097
                                                                  • Instruction Fuzzy Hash: 3341FF71208362EFC310DF19C840E2ABBF1FF85709F81491EF5859BA50D731986ACBA6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C47B16C: GetLastError.KERNEL32(00000006,00000000,0000000A,6C46898C,00000000,00000000,00000006,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B171
                                                                    • Part of subcall function 6C47B16C: SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B20F
                                                                  • GetACP.KERNEL32(?,?,?,?,?,?,6C47C7B5,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 6C486FEB
                                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,6C47C7B5,?,?,?,00000055,?,-00000050,?,?), ref: 6C487016
                                                                  • _wcschr.LIBVCRUNTIME ref: 6C4870AA
                                                                  • _wcschr.LIBVCRUNTIME ref: 6C4870B8
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 6C487179
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                                                  • String ID: 8RLlE$utf8$YLlU
                                                                  • API String ID: 4147378913-2283748238
                                                                  • Opcode ID: 81985a74834f3bbda8b03abe701737168092c6ea32a4a5b34dab818f4ab250af
                                                                  • Instruction ID: 9377573ad2eda40ce214c2218bf089b60b6cae7ce5e5c68a24f16eecbeeb2566
                                                                  • Opcode Fuzzy Hash: 81985a74834f3bbda8b03abe701737168092c6ea32a4a5b34dab818f4ab250af
                                                                  • Instruction Fuzzy Hash: 4571FF32716602AAE725EB25CC41FEA73B8EF45759F100429FA04DBF81EB70E84487A0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,?,00000000), ref: 6C3F594C
                                                                  • GetVolumePathNameW.KERNEL32(?,?,00000104), ref: 6C3F596E
                                                                  • GetVolumeNameForVolumeMountPointW.KERNEL32(?,?,00000104), ref: 6C3F5987
                                                                  • CreateFileW.KERNEL32(?,00000000,00000007,00000000,00000003,02000000,00000000), ref: 6C3F59E2
                                                                  • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000020,?,00000000), ref: 6C3F5A58
                                                                  • DeviceIoControl.KERNEL32(?,002D1400,?,0000000C,00000000,?,?,00000000), ref: 6C3F5A97
                                                                  • CloseHandle.KERNEL32(?,?,00000000), ref: 6C3F5B5F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Volume$ControlDeviceNamePath$CloseCreateFileFolderHandleMountPoint
                                                                  • String ID: \
                                                                  • API String ID: 1997105313-2967466578
                                                                  • Opcode ID: 2c8758f939fd175682409fa87f8a26fd3a9088226d3ec65de3639c64565334d7
                                                                  • Instruction ID: 1b6ca2eddc7bb7b8d9700cbc220f5d497b7dc9c73b2b50377489c5c2e4a9c2a8
                                                                  • Opcode Fuzzy Hash: 2c8758f939fd175682409fa87f8a26fd3a9088226d3ec65de3639c64565334d7
                                                                  • Instruction Fuzzy Hash: 8161B171604305AFD714DF25C888EABBBF8EF85314F10892DF9A582641D734DA4ACFA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C47B16C: GetLastError.KERNEL32(00000006,00000000,0000000A,6C46898C,00000000,00000000,00000006,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B171
                                                                    • Part of subcall function 6C47B16C: SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B20F
                                                                    • Part of subcall function 6C47B16C: _free.LIBCMT ref: 6C47B1CE
                                                                    • Part of subcall function 6C47B16C: _free.LIBCMT ref: 6C47B204
                                                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 6C487997
                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 6C4879E0
                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 6C4879EF
                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 6C487A37
                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 6C487A56
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Locale$ErrorInfoLastValid_free$CodeDefaultPageUser
                                                                  • String ID: 8RLlE$YLlU
                                                                  • API String ID: 949163717-2534537158
                                                                  • Opcode ID: 2915850a409ef135b45497679bf8c0283baf490a114dba4353a4c4de826aafaa
                                                                  • Instruction ID: 6705177bb8df95b0ceb207c5c47359bf3e2e699a95727c04f830be42f83c1a0c
                                                                  • Opcode Fuzzy Hash: 2915850a409ef135b45497679bf8c0283baf490a114dba4353a4c4de826aafaa
                                                                  • Instruction Fuzzy Hash: BB51AD71B06205AAFF10DFA5CC54EAE73B8BF45309F140529F924E7650EB70D944CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,?,F0000040), ref: 6C44D98A
                                                                  • CryptCreateHash.ADVAPI32(?,?,00000000,00000000,?), ref: 6C44D9A0
                                                                  • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 6C44D9B4
                                                                  • CryptGetHashParam.ADVAPI32(?,00000004,?,?,00000000), ref: 6C44D9D1
                                                                  • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000), ref: 6C44D9E9
                                                                  • CryptDestroyHash.ADVAPI32(?), ref: 6C44D9F3
                                                                  • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C44DA02
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                                                  • String ID:
                                                                  • API String ID: 3606780921-0
                                                                  • Opcode ID: 96737903112ee6cf5ac72428ba1e86bbb3cdaba75f1204d3c7259d21c1b6979b
                                                                  • Instruction ID: 024d4ecbc6115f7f806dc7984f4dff3a7d0fb9c3cb2e0636d8a9c18c799d72a8
                                                                  • Opcode Fuzzy Hash: 96737903112ee6cf5ac72428ba1e86bbb3cdaba75f1204d3c7259d21c1b6979b
                                                                  • Instruction Fuzzy Hash: 6121D4B290111DBFEF11EF96CC85DAFBB7DFB05649F208465BA10A2150D7319E21DBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3F6F86
                                                                  • CoCreateInstance.OLE32(6C4BC5F4,00000000,00000001,6C4BC614,00000000,?,?,?,?,?,?,?,?,?,?,00000010), ref: 6C3F6FC0
                                                                  • SysFreeString.OLEAUT32(00000000), ref: 6C3F700F
                                                                  • CoSetProxyBlanket.OLE32(00000000,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,?,?,?,?,?,?), ref: 6C3F7028
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: BlanketCreateFreeH_prolog3_InstanceProxyString
                                                                  • String ID: root\StandardCimv2
                                                                  • API String ID: 2704008548-3092346560
                                                                  • Opcode ID: d4f9eaf055bbeafb82fdf33a9ed398f4c56c2568ae389c66fc7bbe4766727711
                                                                  • Instruction ID: 4a27b2ae8681cda2c42a8354d4b6a6cf7134bce248c88352e82477731abd25cb
                                                                  • Opcode Fuzzy Hash: d4f9eaf055bbeafb82fdf33a9ed398f4c56c2568ae389c66fc7bbe4766727711
                                                                  • Instruction Fuzzy Hash: B351C170A01216AFEB15CBA4C854FFEB779AF46708F108858E411EB690CB769D46CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,6C4879D4,00000002,00000000,?,?,?,6C4879D4,?,00000000), ref: 6C48774F
                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,6C4879D4,00000002,00000000,?,?,?,6C4879D4,?,00000000), ref: 6C487778
                                                                  • GetACP.KERNEL32(?,?,6C4879D4,?,00000000), ref: 6C48778D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID: ACP$OCP
                                                                  • API String ID: 2299586839-711371036
                                                                  • Opcode ID: d34d6650fcfd5af4538fada39861599f18aeaa73ed1c7a49aabc1d235042ffdd
                                                                  • Instruction ID: 70d8d43ee97ff71a3fd9d6c59f447e9a7adcd7d71bd9c1d34006d366aaaa5d02
                                                                  • Opcode Fuzzy Hash: d34d6650fcfd5af4538fada39861599f18aeaa73ed1c7a49aabc1d235042ffdd
                                                                  • Instruction Fuzzy Hash: E721B521F0F100A6EB25DF69C961F8773B7AB40B59B5A4524F909D7B14E732FA41C390
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CryptGetHashParam.ADVAPI32(?,00000002,00000000,?,00000000), ref: 6C45D067
                                                                  • CryptGetHashParam.ADVAPI32(00000020,00000002,?,00000020,00000000), ref: 6C45D080
                                                                  • CryptDestroyHash.ADVAPI32(00000020), ref: 6C45D08E
                                                                  • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C45D09B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                                                  • String ID:
                                                                  • API String ID: 2110207923-3916222277
                                                                  • Opcode ID: 7e885de48d194edda202c4c0ac688ac636a62921dd1d0b1d25a01a0c5ad45856
                                                                  • Instruction ID: ddf0e47bac90b5e6f47e29dd091e23c730fd318cb4cd1c40924897a7be702569
                                                                  • Opcode Fuzzy Hash: 7e885de48d194edda202c4c0ac688ac636a62921dd1d0b1d25a01a0c5ad45856
                                                                  • Instruction Fuzzy Hash: 2EF09071500209FFEF30DF80CE89CAABBBDEF05749B908429F646A2510C7719E50DB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000007,?,00000000,6C3FBF12), ref: 6C3F3246
                                                                  • SetEntriesInAclW.ADVAPI32(00000001,?,00000000,?,?,00000007,?,00000000,6C3FBF12,?,00000000), ref: 6C3F327E
                                                                  • LocalAlloc.KERNEL32(00000040,00000014,?,00000007,?,00000000,6C3FBF12,?,00000000), ref: 6C3F328C
                                                                  • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000007,?,00000000,6C3FBF12,?,00000000), ref: 6C3F329C
                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000,?,00000007,?,00000000,6C3FBF12,?,00000000), ref: 6C3F32AE
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: DescriptorInitializeSecurity$AllocAllocateDaclEntriesLocal
                                                                  • String ID:
                                                                  • API String ID: 1469326821-0
                                                                  • Opcode ID: fccc880287845616df307bf9d317d962d76254f59055f617483dea9504745261
                                                                  • Instruction ID: 160b73d570b6aa107bd07f99be6699a71054cb8c832f8143e508c6bb9dda324e
                                                                  • Opcode Fuzzy Hash: fccc880287845616df307bf9d317d962d76254f59055f617483dea9504745261
                                                                  • Instruction Fuzzy Hash: C531F670601B11AFE7709F2AC848B43FBF8BF45754F104A1EE596C6AA0D7B2E045CB51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ~XHl$~XHl
                                                                  • API String ID: 0-4057192888
                                                                  • Opcode ID: 9f3ddfe32db0ceb49d31c68f4458acb65d6e2788ff2468c8e4915f42ec656399
                                                                  • Instruction ID: e2af16735fa39e9af8b611a49fd596554c07b86c94e1b483016c99f18cf1b99a
                                                                  • Opcode Fuzzy Hash: 9f3ddfe32db0ceb49d31c68f4458acb65d6e2788ff2468c8e4915f42ec656399
                                                                  • Instruction Fuzzy Hash: C1F14E71E016199FDB14CFAAC8D0E9EBBF1FF48314F258269D819ABB44D731A905CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 6C433B12
                                                                  • IsDebuggerPresent.KERNEL32 ref: 6C433BDE
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6C433BFE
                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 6C433C08
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                  • String ID:
                                                                  • API String ID: 254469556-0
                                                                  • Opcode ID: 95691492f217b4ae210cdbc58f8662d4823dd89ac8e36478f27fe69bdf520cb1
                                                                  • Instruction ID: 73664dd1284d054884a43057ddef5192cc1def3e3b8761a49b6e47804f4d4c6f
                                                                  • Opcode Fuzzy Hash: 95691492f217b4ae210cdbc58f8662d4823dd89ac8e36478f27fe69bdf520cb1
                                                                  • Instruction Fuzzy Hash: FF312B75D4522C9BDF20DFA5D989BCDBBB8AF48304F10419AE40CA7250EB709A89DF45
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,F0000040), ref: 6C44CEA7
                                                                  • CryptGenRandom.ADVAPI32(?,?,?), ref: 6C44CEC0
                                                                  • CryptReleaseContext.ADVAPI32(?,00000000), ref: 6C44CED5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                                  • String ID:
                                                                  • API String ID: 1815803762-0
                                                                  • Opcode ID: a9d6d0d57964bca509405dff99c4e2fbaf26fd626d8d006453163224943bfc6f
                                                                  • Instruction ID: a21699bfdd11a87b3755302fd0b5d57b237981c083dcf9986ff364f0ed271108
                                                                  • Opcode Fuzzy Hash: a9d6d0d57964bca509405dff99c4e2fbaf26fd626d8d006453163224943bfc6f
                                                                  • Instruction Fuzzy Hash: 89F09472644119FBEB20EE8A8C0EF8B7B79EB82B51F348025FA01A2000D7708A04E760
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C47B16C: GetLastError.KERNEL32(00000006,00000000,0000000A,6C46898C,00000000,00000000,00000006,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B171
                                                                    • Part of subcall function 6C47B16C: SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B20F
                                                                  • EnumSystemLocalesW.KERNEL32(6C48733D,00000001,00000000,?,-00000050,?,6C48796B,00000000,?,?,?,00000055,?), ref: 6C487289
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                  • String ID: kyHl
                                                                  • API String ID: 2417226690-3941012671
                                                                  • Opcode ID: 8ec3726a68a8123b3f25ad6022763bae9ab220f208a52d05336134e1f64aeff2
                                                                  • Instruction ID: 27fce648cf0dc0678a7a437e7d605db06549bc31163af2097f8e8fe8129fed9e
                                                                  • Opcode Fuzzy Hash: 8ec3726a68a8123b3f25ad6022763bae9ab220f208a52d05336134e1f64aeff2
                                                                  • Instruction Fuzzy Hash: 8E11C2362087059FDB18DF3988A1DAAB7A1FB80369B18452DFA8687B40D771A942C740
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastrecv
                                                                  • String ID:
                                                                  • API String ID: 2514157807-0
                                                                  • Opcode ID: 8599f411711810c91163633cfaa6954d224316b7318c184379a1486ba3ea7945
                                                                  • Instruction ID: 6b488a1a0797a6c15a6a9b580911952727f6fda56226d473d271a05c995642e4
                                                                  • Opcode Fuzzy Hash: 8599f411711810c91163633cfaa6954d224316b7318c184379a1486ba3ea7945
                                                                  • Instruction Fuzzy Hash: E3E09231348208AFEF29DF70EC45B6937B9FB85321F104559FE198A7E0CB719D509A51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000040,?,?,6C45D0B3,?), ref: 6C45D016
                                                                  • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?,?,?,6C45D0B3,?), ref: 6C45D02D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Crypt$AcquireContextCreateHash
                                                                  • String ID:
                                                                  • API String ID: 1914063823-0
                                                                  • Opcode ID: a24417159c2fd302bed96dbbcd70b03a1a6ae899eaf99bbda20d3b1a64055eb3
                                                                  • Instruction ID: 7d539ff9ad161538c5e7dd7149d841a813879f08730e083e79f0774c20e4c692
                                                                  • Opcode Fuzzy Hash: a24417159c2fd302bed96dbbcd70b03a1a6ae899eaf99bbda20d3b1a64055eb3
                                                                  • Instruction Fuzzy Hash: 52D017362051A0BAEA70AE17DC0CF8B3FBDEBC7F41F104029B744A2044CA209516CB74
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C47B16C: GetLastError.KERNEL32(00000006,00000000,0000000A,6C46898C,00000000,00000000,00000006,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B171
                                                                    • Part of subcall function 6C47B16C: SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B20F
                                                                    • Part of subcall function 6C47B16C: _free.LIBCMT ref: 6C47B1CE
                                                                    • Part of subcall function 6C47B16C: _free.LIBCMT ref: 6C47B204
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 6C4875E4
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast_free$InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2003897158-0
                                                                  • Opcode ID: 09b86410c1cd5241dcae37d2638e9e6f84a75c241899e6acf4ae9fb8c7665dfc
                                                                  • Instruction ID: 4e28ce449487ce3a6f7e4ea80b57e8703570eb8b93b439c4fbad9b243b9bf6ca
                                                                  • Opcode Fuzzy Hash: 09b86410c1cd5241dcae37d2638e9e6f84a75c241899e6acf4ae9fb8c7665dfc
                                                                  • Instruction Fuzzy Hash: 4321F83274A106ABEB18DA29CC51EAA37B8EF45329F14007EFD01D6A44EB34D804D794
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C47B16C: GetLastError.KERNEL32(00000006,00000000,0000000A,6C46898C,00000000,00000000,00000006,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B171
                                                                    • Part of subcall function 6C47B16C: SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B20F
                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,6C487559,00000000,00000000,?), ref: 6C4877E8
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 3736152602-0
                                                                  • Opcode ID: ece779bbe103dc5f4cb3ccee5bfd17baa222274f52d884bbaed1cc3cc9be1744
                                                                  • Instruction ID: 4b2e043a424755e69b947dac3315b6c733001bcca338c5e9b678f5f24c8fe50e
                                                                  • Opcode Fuzzy Hash: ece779bbe103dc5f4cb3ccee5bfd17baa222274f52d884bbaed1cc3cc9be1744
                                                                  • Instruction Fuzzy Hash: 51F0D632B161116BDB14DA258815EFA37A8EB40759F554828FE15A3A80DA30ED41C5E0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C47B16C: GetLastError.KERNEL32(00000006,00000000,0000000A,6C46898C,00000000,00000000,00000006,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B171
                                                                    • Part of subcall function 6C47B16C: SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B20F
                                                                    • Part of subcall function 6C47B16C: _free.LIBCMT ref: 6C47B1CE
                                                                    • Part of subcall function 6C47B16C: _free.LIBCMT ref: 6C47B204
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 6C487179
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast_free$InfoLocale
                                                                  • String ID: 8RLlE$utf8$YLlU
                                                                  • API String ID: 2003897158-2283748238
                                                                  • Opcode ID: d8edf4c1c8c290d914bef57f74e5a778d6a338febdb61730eef34f6701fb1499
                                                                  • Instruction ID: 7319daa0b4e2d63d6973c9158c56c428a032ef68dc729db4ea9f1e61aa9102cf
                                                                  • Opcode Fuzzy Hash: d8edf4c1c8c290d914bef57f74e5a778d6a338febdb61730eef34f6701fb1499
                                                                  • Instruction Fuzzy Hash: 63F0A432715115ABD724EA38CC59DFA33A8DB86718F05017DE606D7B40DE74AD0597E0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C470F97: EnterCriticalSection.KERNEL32(13B17E7C,?,6C474876,00000000,6C4DBF48,0000000C,6C47483D,6C3E2DD3,?,6C478EF3,6C3E2DD3,?,6C47B30E,00000001,00000364,FFFFFFFF), ref: 6C470FA6
                                                                  • EnumSystemLocalesW.KERNEL32(6C47D8B8,00000001,6C4DC248,0000000C,6C47DD23,00000000), ref: 6C47D8FD
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                  • String ID:
                                                                  • API String ID: 1272433827-0
                                                                  • Opcode ID: 6cba542958077fd2ff58bd44ecf8bd8fb88ee6782f0c65f7360fdd14d8ddf16c
                                                                  • Instruction ID: c11880efccc4d72a8fb9b14661d7fa51326d653afc923c9f8dc9e88e55e920cf
                                                                  • Opcode Fuzzy Hash: 6cba542958077fd2ff58bd44ecf8bd8fb88ee6782f0c65f7360fdd14d8ddf16c
                                                                  • Instruction Fuzzy Hash: 92F04976A14214DFDB10EF98D841FDD7BF1EB8A724F10412AE411DB790CB7559048F90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C47B16C: GetLastError.KERNEL32(00000006,00000000,0000000A,6C46898C,00000000,00000000,00000006,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B171
                                                                    • Part of subcall function 6C47B16C: SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B20F
                                                                  • EnumSystemLocalesW.KERNEL32(6C487125,00000001,00000006,?,?,6C48798D,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 6C487203
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                  • String ID:
                                                                  • API String ID: 2417226690-0
                                                                  • Opcode ID: 6180475e283e2e6dbbeeeb8a62ea93514cfecbd068ea80a82536a104f3fd854d
                                                                  • Instruction ID: 728fe50eca85ee1f6df02a26228a3839f3775f6065bf277f46cdc9c0828d6c73
                                                                  • Opcode Fuzzy Hash: 6180475e283e2e6dbbeeeb8a62ea93514cfecbd068ea80a82536a104f3fd854d
                                                                  • Instruction Fuzzy Hash: 1CF0553670420457CB14DF36C868EAABFA1EFC2758B0A4058FA098BB40CA71D942C7A0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,6C47D310,?,20001004,00000000,00000002,?,?,6C47C91D), ref: 6C47DEB2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: 74ff2d54cb6ba7dfed367d9af98710ffacf304247a394635a285ecc1c100eaf5
                                                                  • Instruction ID: 976e71fc5d80f54f8d81927ad1e06ecad927a4b3490315e47993505f8dde1c11
                                                                  • Opcode Fuzzy Hash: 74ff2d54cb6ba7dfed367d9af98710ffacf304247a394635a285ecc1c100eaf5
                                                                  • Instruction Fuzzy Hash: CCE04F32541528BBCF32AF61DC08EEE3F3AEF95761F004015FD1565650CB328921AAE0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • BCryptCloseAlgorithmProvider.BCRYPT(0099BB70,00000000), ref: 6C491B97
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AlgorithmCloseCryptProvider
                                                                  • String ID:
                                                                  • API String ID: 3378198380-0
                                                                  • Opcode ID: 3f45d4dfa4a8c7eb3c5eb64b0021719119a726a0f4d38fd2468256d214a5afa4
                                                                  • Instruction ID: 4e8cd72eaf956d47b660ce1b5192bd4f486a5804b84bc70e933fc6fb2d0fd4dc
                                                                  • Opcode Fuzzy Hash: 3f45d4dfa4a8c7eb3c5eb64b0021719119a726a0f4d38fd2468256d214a5afa4
                                                                  • Instruction Fuzzy Hash: D1B0122474132051FD68E5338C44F522B6C274A509F9044042A14D1A83DA68E0004050
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CryptHashData.ADVAPI32(?,?,?,00000000,6C45D0C8,?,?,00000000,?,?), ref: 6C45D047
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CryptDataHash
                                                                  • String ID:
                                                                  • API String ID: 4245837645-0
                                                                  • Opcode ID: 14031a71af21bcbd89b02ecc3e47599a2f059cf8fb40fbc3d8be7fc62bef3739
                                                                  • Instruction ID: 0cf548a193a6e6dfe4af675c62528e960d9080aecc72093972904267a8f7b141
                                                                  • Opcode Fuzzy Hash: 14031a71af21bcbd89b02ecc3e47599a2f059cf8fb40fbc3d8be7fc62bef3739
                                                                  • Instruction Fuzzy Hash: 9FC04832208341EFCF12DF80CE09F1ABBB2BB88700F088848B29445071C732D824EB02
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: hXMV
                                                                  • API String ID: 0-2057747057
                                                                  • Opcode ID: 67593a9535b0a8fd5aaaf841a0740f933ed5871c41b2fe72853b3936ce6e95e8
                                                                  • Instruction ID: 5ad389eb192d57e48fd738de3fad3d2da78bed6bcd307962d357b47317f4a15b
                                                                  • Opcode Fuzzy Hash: 67593a9535b0a8fd5aaaf841a0740f933ed5871c41b2fe72853b3936ce6e95e8
                                                                  • Instruction Fuzzy Hash: BFF0A0B3D08609DFF704CB85D800BADB3B4EB80735F20492ED011A26D0D3395605CF20
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3F5B84
                                                                  • SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,WQL,00000460,6C3F7C62,?,?,00000010,1FFFFFFF), ref: 6C3F5BC4
                                                                  • SysFreeString.OLEAUT32(?), ref: 6C3F5BD4
                                                                  • GetVolumePathNameW.KERNEL32(?,?,00000104,?,?,00000010,1FFFFFFF,?,?,?,?,?,?,?,?,00000022), ref: 6C3F5C01
                                                                  • VariantClear.OLEAUT32(00000000), ref: 6C3F5D7B
                                                                  Strings
                                                                  • "} WHERE AssocClass = Win32_DiskDriveToDiskPartition KEYSONLY, xrefs: 6C3F5D64
                                                                  • \, xrefs: 6C3F5C25
                                                                  • "} WHERE AssocClass = Win32_LogicalDiskToPartition KEYSONLY, xrefs: 6C3F5C75
                                                                  • Select Model, SerialNumber from Win32_DiskDrive WHERE DeviceID=", xrefs: 6C3F5E41
                                                                  • SerialNumber, xrefs: 6C3F5FC5
                                                                  • Model, xrefs: 6C3F5F10
                                                                  • ASSOCIATORS OF {Win32_LogicalDisk.DeviceID=", xrefs: 6C3F5C4D
                                                                  • DeviceID, xrefs: 6C3F5D14, 6C3F5E12
                                                                  • WQL, xrefs: 6C3F5BA2
                                                                  • ASSOCIATORS OF {Win32_DiskPartition.DeviceID=", xrefs: 6C3F5D43
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Path$ClearFolderFreeH_prolog3_NameStringVariantVolume
                                                                  • String ID: "} WHERE AssocClass = Win32_DiskDriveToDiskPartition KEYSONLY$"} WHERE AssocClass = Win32_LogicalDiskToPartition KEYSONLY$ASSOCIATORS OF {Win32_DiskPartition.DeviceID="$ASSOCIATORS OF {Win32_LogicalDisk.DeviceID="$DeviceID$Model$Select Model, SerialNumber from Win32_DiskDrive WHERE DeviceID="$SerialNumber$WQL$\
                                                                  • API String ID: 1504758213-738064816
                                                                  • Opcode ID: 46e18ec4ebc80832888d088620b4a038e98bbf054d5455b82769e416fe31d200
                                                                  • Instruction ID: eb1bdd35dc80b3007d046ebb8f0405c41530f66e907eefc26422547b1e976e16
                                                                  • Opcode Fuzzy Hash: 46e18ec4ebc80832888d088620b4a038e98bbf054d5455b82769e416fe31d200
                                                                  • Instruction Fuzzy Hash: 700282B0A012599BDF20DF60CC88FDDB778AF45308F1085D8E619EB681DB359A86CF55
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CertOpenStore.CRYPT32(00000002,00000000,00000000,00002000,00000000), ref: 6C45A289
                                                                  • GetLastError.KERNEL32(?,00000100), ref: 6C45A2A3
                                                                  • CertCreateCertificateChainEngine.CRYPT32(?,?), ref: 6C45A324
                                                                  • GetLastError.KERNEL32(?,00000100), ref: 6C45A338
                                                                  • CertGetCertificateChain.CRYPT32(?,?,00000000,?,?,?,00000000,?), ref: 6C45A3CA
                                                                  • GetLastError.KERNEL32(?,00000100), ref: 6C45A3DE
                                                                  • CertFreeCertificateChainEngine.CRYPT32(00000000), ref: 6C45A4F1
                                                                  • CertCloseStore.CRYPT32(?,00000000), ref: 6C45A4FE
                                                                  • CertFreeCertificateChain.CRYPT32(00000000), ref: 6C45A50F
                                                                  • CertFreeCertificateContext.CRYPT32(00000000), ref: 6C45A520
                                                                  Strings
                                                                  • schannel: Failed to read remote certificate context: %s, xrefs: 6C45A4D1
                                                                  • schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN, xrefs: 6C45A45B
                                                                  • schannel: this version of Windows is too old to support certificate verification via CA bundle file., xrefs: 6C45A26B
                                                                  • 0, xrefs: 6C45A30E
                                                                  • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT, xrefs: 6C45A443
                                                                  • schannel: failed to create certificate store: %s, xrefs: 6C45A2B0
                                                                  • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID, xrefs: 6C45A44F
                                                                  • schannel: CertGetCertificateChain error mask: 0x%08x, xrefs: 6C45A46B
                                                                  • schannel: CertGetCertificateChain failed: %s, xrefs: 6C45A3EB
                                                                  • schannel: failed to create certificate chain engine: %s, xrefs: 6C45A345
                                                                  • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN, xrefs: 6C45A437
                                                                  • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED, xrefs: 6C45A428
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateOpen
                                                                  • String ID: 0$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: Failed to read remote certificate context: %s$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                                                  • API String ID: 713146188-2670036763
                                                                  • Opcode ID: 21f746474714170bb83b4e3ed7848193ee851902bd3da554f0d109ec7394ea11
                                                                  • Instruction ID: d94043ffa58a194a06ca1e2280fb827d27033229b6d0dbcb4a0362b9e8b2c374
                                                                  • Opcode Fuzzy Hash: 21f746474714170bb83b4e3ed7848193ee851902bd3da554f0d109ec7394ea11
                                                                  • Instruction Fuzzy Hash: 78B1EF71208300EFD720DE64CC49FA7B7F9AF8631AF90491DF5A986691E730D954CBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Name::operator+$NameName::$Decorator::getName::operator|=ReturnTypeoperator+
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 1186856153-2525777580
                                                                  • Opcode ID: edd9606dc46fd03dcc0280be825fa455a1f812d43c08b7f45b11bc1d03ead1b8
                                                                  • Instruction ID: 89258b8575e7363f8dd2f8c62d4da5cb509fa34247619978b043f8a696ec465d
                                                                  • Opcode Fuzzy Hash: edd9606dc46fd03dcc0280be825fa455a1f812d43c08b7f45b11bc1d03ead1b8
                                                                  • Instruction Fuzzy Hash: 3CC181B5D00208AFCF04DF99C4A1EEDBBB5AB09358F10515EE115A7F95DB30D649CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: : missing required parameter '$BaseN_Decoder$BaseN_Decoder: Log2Base must be between 1 and 7 inclusive$BaseN_Encoder$BaseN_Encoder: Log2Base must be between 1 and 7 inclusive$DecodingLookupArray$EncodingLookupArray$GroupSize$Grouper$Log2Base$Pad$PaddingByte$Separator$Terminator
                                                                  • API String ID: 2427045233-4155197624
                                                                  • Opcode ID: a2e94c4efa93a089f91cc474d0366dfd6517ec0fb003e261baa534351adf1a6f
                                                                  • Instruction ID: ed97d631110a76aa5e4303ce5b171831f1b3c237c34b1787974922ed97d6d234
                                                                  • Opcode Fuzzy Hash: a2e94c4efa93a089f91cc474d0366dfd6517ec0fb003e261baa534351adf1a6f
                                                                  • Instruction Fuzzy Hash: 84019275800258BADF01DBA0CC44FDE7B7CAF5820CF104545F449B7B01CB35A6098BA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • DName::operator+.LIBCMT ref: 6C46572F
                                                                  • DName::operator+.LIBCMT ref: 6C465865
                                                                    • Part of subcall function 6C461641: shared_ptr.LIBCMT ref: 6C46165D
                                                                  • DName::operator+.LIBCMT ref: 6C4658B1
                                                                  • DName::operator+.LIBCMT ref: 6C4658C0
                                                                  • DName::operator+.LIBCMT ref: 6C46581B
                                                                    • Part of subcall function 6C466F4B: DName::operator=.LIBVCRUNTIME ref: 6C466FDA
                                                                  • DName::operator+.LIBCMT ref: 6C4659ED
                                                                  • DName::operator=.LIBVCRUNTIME ref: 6C465A2D
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C465A45
                                                                  • DName::operator+.LIBCMT ref: 6C465A54
                                                                  • DName::operator+.LIBCMT ref: 6C465A60
                                                                    • Part of subcall function 6C466F4B: Replicator::operator[].LIBVCRUNTIME ref: 6C466F88
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Name::operator+$Name::operator=$NameName::Replicator::operator[]shared_ptr
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 1026175760-2525777580
                                                                  • Opcode ID: 4d2d19a769481076bf11654abeaec145de9328938bd4eba41cedd1a144081483
                                                                  • Instruction ID: 4f4354493ca890d1bdc17c5436885f39d424194df159af3ee84763aa3755344c
                                                                  • Opcode Fuzzy Hash: 4d2d19a769481076bf11654abeaec145de9328938bd4eba41cedd1a144081483
                                                                  • Instruction Fuzzy Hash: 9EC19171A042089FDF14CFA9C880FEEB7F9AB09309F14445EE546A7F86EB359649CB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$Info
                                                                  • String ID:
                                                                  • API String ID: 2509303402-0
                                                                  • Opcode ID: b779acd89bb6c1bf17988d960bfb1d3b4a5f7dfb28f3f11a900c50e311c4414a
                                                                  • Instruction ID: 5b3a8595cdfdce1f88f78c0ec849f27dfc2b92bd39f95ce580e135ab63880d72
                                                                  • Opcode Fuzzy Hash: b779acd89bb6c1bf17988d960bfb1d3b4a5f7dfb28f3f11a900c50e311c4414a
                                                                  • Instruction Fuzzy Hash: E5D17A71E012059FDB21DFA8C890FEABBF5BF08305F144169E499A7781D775E849CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: shared_ptr$operator+$Name::operator+Name::operator=
                                                                  • String ID: double$j;NlQ;Nl
                                                                  • API String ID: 1464150960-3889802265
                                                                  • Opcode ID: 87c7b03d69b424d1bcce4e717cf61acc1d6f065dda3c4a3da04dae53e656f1cf
                                                                  • Instruction ID: 41cb5a56e13278d74a1e7f9ecad1c9060e4d3c2366c646a2595b6c426ed7da20
                                                                  • Opcode Fuzzy Hash: 87c7b03d69b424d1bcce4e717cf61acc1d6f065dda3c4a3da04dae53e656f1cf
                                                                  • Instruction Fuzzy Hash: 6BD16EB6C0520AAECB14CF9AC589FEEBB74AF05308F10815AD521B7F58DB349606CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C3E59FD
                                                                    • Part of subcall function 6C3F121D: __EH_prolog3_catch_GS.LIBCMT ref: 6C3F1227
                                                                    • Part of subcall function 6C3E57D4: __EH_prolog3_GS_align.LIBCMT ref: 6C3E57E0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_catch_$H_prolog3_S_align
                                                                  • String ID: #$$$&pv_id=$code$deactivation$err$fail$method=limelm.activation.deactivate&ablock=$ret$rsp$stat
                                                                  • API String ID: 681511622-3673989637
                                                                  • Opcode ID: 941bb680ecd16fdc8b41271aa1148f3df676579b4b033855d8e60cbdeaa3ffa0
                                                                  • Instruction ID: 13132390509031822a3bf9309bdc63969c2f1216c08f50559856c812b6933807
                                                                  • Opcode Fuzzy Hash: 941bb680ecd16fdc8b41271aa1148f3df676579b4b033855d8e60cbdeaa3ffa0
                                                                  • Instruction Fuzzy Hash: 2EB16771C0426CAEDB10EFA4C995FDDBBB8AB09308F50449BD119B7A50DB315B89CF62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3F6CDE
                                                                    • Part of subcall function 6C3F564A: SysAllocString.OLEAUT32(00000000), ref: 6C3F5661
                                                                  • SysFreeString.OLEAUT32(00000000), ref: 6C3F6D5B
                                                                  • SysFreeString.OLEAUT32(00000000), ref: 6C3F6F60
                                                                  Strings
                                                                  • FALSE, xrefs: 6C3F6D02
                                                                  • PermanentAddress, xrefs: 6C3F6E7B
                                                                  • SELECT DeviceID, PermanentAddress FROM MSFT_NetAdapter WHERE (Virtual = , xrefs: 6C3F6CF2
                                                                  • DeviceID, xrefs: 6C3F6DAB
                                                                  • TRUE, xrefs: 6C3F6D09, 6C3F6D14
                                                                  • OR PNPDeviceID LIKE "XEN%\\%" OR PNPDeviceID LIKE "VMBUS\\%") AND (InterfaceType = 6 OR InterfaceType = 71) AND NOT NdisPhysicalM, xrefs: 6C3F6D1A
                                                                  • WQL, xrefs: 6C3F6D36
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: String$Free$AllocH_prolog3_
                                                                  • String ID: OR PNPDeviceID LIKE "XEN%\\%" OR PNPDeviceID LIKE "VMBUS\\%") AND (InterfaceType = 6 OR InterfaceType = 71) AND NOT NdisPhysicalM$DeviceID$FALSE$PermanentAddress$SELECT DeviceID, PermanentAddress FROM MSFT_NetAdapter WHERE (Virtual = $TRUE$WQL
                                                                  • API String ID: 3315771951-3087152901
                                                                  • Opcode ID: 0cbf694387e951c3270970ceca85cb972513d44d9191a7321b6f8622db49a64b
                                                                  • Instruction ID: cfab6efd83a75300be44486cb91b9d0c4aacc9edd6bfce6596752c311cb95129
                                                                  • Opcode Fuzzy Hash: 0cbf694387e951c3270970ceca85cb972513d44d9191a7321b6f8622db49a64b
                                                                  • Instruction Fuzzy Hash: E491AE71A11349EFDF10CFA4C884EEEBBB4AF55308F14886DE461EB691D731990ACB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C42E289
                                                                    • Part of subcall function 6C3E34D1: __EH_prolog3.LIBCMT ref: 6C3E34D8
                                                                    • Part of subcall function 6C42BEA0: __EH_prolog3.LIBCMT ref: 6C42BEA7
                                                                    • Part of subcall function 6C42E104: __EH_prolog3.LIBCMT ref: 6C42E10B
                                                                    • Part of subcall function 6C3F057F: __EH_prolog3_GS.LIBCMT ref: 6C3F0586
                                                                    • Part of subcall function 6C3EDCEE: __EH_prolog3_GS.LIBCMT ref: 6C3EDCF5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_
                                                                  • String ID: (DIl$8pIl$EncodingLookupArray$GroupSize$InsertLineBreaks$Log2Base$MaxLineLength$PaddingByte$Separator$Terminator$VIl
                                                                  • API String ID: 4240126716-2892921949
                                                                  • Opcode ID: 2e409f686697738ba3c18dfa5ae897ba7e2f6363a58e6024d5b7300e019558ac
                                                                  • Instruction ID: aa08cdf19c490d23c08f03388188d4d98f72df18f2e0aff449d76a96d3d0f579
                                                                  • Opcode Fuzzy Hash: 2e409f686697738ba3c18dfa5ae897ba7e2f6363a58e6024d5b7300e019558ac
                                                                  • Instruction Fuzzy Hash: AA41C3B1A00278ABDF04CBA0C855FFEBBB4AF18354F04455DE555AB780DB749E08CBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(6C4E7ADC,00000FA0,?,?,6C43288C), ref: 6C4328BA
                                                                  • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,6C43288C), ref: 6C4328C5
                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,6C43288C), ref: 6C4328D6
                                                                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 6C4328E8
                                                                  • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 6C4328F6
                                                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,6C43288C), ref: 6C432919
                                                                  • DeleteCriticalSection.KERNEL32(6C4E7ADC,00000007,?,?,6C43288C), ref: 6C432935
                                                                  • CloseHandle.KERNEL32(?,?,?,6C43288C), ref: 6C432945
                                                                  Strings
                                                                  • WakeAllConditionVariable, xrefs: 6C4328EE
                                                                  • kernel32.dll, xrefs: 6C4328D1
                                                                  • SleepConditionVariableCS, xrefs: 6C4328E2
                                                                  • api-ms-win-core-synch-l1-2-0.dll, xrefs: 6C4328C0
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                  • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                  • API String ID: 2565136772-3242537097
                                                                  • Opcode ID: ef24409b5f71e1081a35aa0daec16a08fc9e21783551d8a2baa631af1992df26
                                                                  • Instruction ID: d50df9cea38f5a9bc76e101c44bf440daf8db3f58ca4a4eebd49f0349469deb6
                                                                  • Opcode Fuzzy Hash: ef24409b5f71e1081a35aa0daec16a08fc9e21783551d8a2baa631af1992df26
                                                                  • Instruction Fuzzy Hash: B3015271B056316BDE30FF768C0DE563B78EB9A6267114414FE19E2A42DE60C90086A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___free_lconv_mon.LIBCMT ref: 6C4841FA
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485B4D
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485B5F
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485B71
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485B83
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485B95
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485BA7
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485BB9
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485BCB
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485BDD
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485BEF
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485C01
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485C13
                                                                    • Part of subcall function 6C485B30: _free.LIBCMT ref: 6C485C25
                                                                  • _free.LIBCMT ref: 6C4841EF
                                                                    • Part of subcall function 6C47A768: HeapFree.KERNEL32(00000000,00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000), ref: 6C47A77E
                                                                    • Part of subcall function 6C47A768: GetLastError.KERNEL32(00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000,00000000), ref: 6C47A790
                                                                  • _free.LIBCMT ref: 6C484211
                                                                  • _free.LIBCMT ref: 6C484226
                                                                  • _free.LIBCMT ref: 6C484231
                                                                  • _free.LIBCMT ref: 6C484253
                                                                  • _free.LIBCMT ref: 6C484266
                                                                  • _free.LIBCMT ref: 6C484274
                                                                  • _free.LIBCMT ref: 6C48427F
                                                                  • _free.LIBCMT ref: 6C4842B7
                                                                  • _free.LIBCMT ref: 6C4842BE
                                                                  • _free.LIBCMT ref: 6C4842DB
                                                                  • _free.LIBCMT ref: 6C4842F3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                  • String ID:
                                                                  • API String ID: 161543041-0
                                                                  • Opcode ID: f3bf350a3ae1c7165b7a7ed3e7d34a9396890e091b312ae3234a1473787e1aa6
                                                                  • Instruction ID: ef12d43389b2951acf81425fea498b1b1f5f670026116d7a242ddbaee0c6bdf5
                                                                  • Opcode Fuzzy Hash: f3bf350a3ae1c7165b7a7ed3e7d34a9396890e091b312ae3234a1473787e1aa6
                                                                  • Instruction Fuzzy Hash: 1F318D31A0A300DFEB20EA79D950F9AB3FCAF0139AF64652DE055D6B50DB34E884C760
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID:
                                                                  • API String ID: 269201875-0
                                                                  • Opcode ID: 71214c0496030dc74753500b5d6845871cef569483820ffbb82d93f52444198d
                                                                  • Instruction ID: c4948c71da2e9a89796f33f5db30708ba195f9ae56c60698fadf71949ae5f8ef
                                                                  • Opcode Fuzzy Hash: 71214c0496030dc74753500b5d6845871cef569483820ffbb82d93f52444198d
                                                                  • Instruction Fuzzy Hash: A4C142B2D41214ABEB20DBA8CD81FDE77F8AF08705F540159FA05EB785EB70D9458BA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: VIl$%%25%s]$%ld$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                                                  • API String ID: 0-2300113248
                                                                  • Opcode ID: 9eba1d01c39142c5cf0b47c88f65d12c956444a5d89b6a2ab7efb258de929f9e
                                                                  • Instruction ID: 89368a01386cb4cca3e188cbfe3d22e130d79bc89b06e26add5a5a6f9339fdfe
                                                                  • Opcode Fuzzy Hash: 9eba1d01c39142c5cf0b47c88f65d12c956444a5d89b6a2ab7efb258de929f9e
                                                                  • Instruction Fuzzy Hash: B9D1E179609385AFD720CE29C840F17BBE4AF8675DF94091DF89587B40E371E825CB92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • DName::operator+.LIBCMT ref: 6C46627A
                                                                  • UnDecorator::getSignedDimension.LIBCMT ref: 6C466285
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C466296
                                                                  • UnDecorator::getSignedDimension.LIBCMT ref: 6C4663A2
                                                                  • UnDecorator::getSignedDimension.LIBCMT ref: 6C4663BF
                                                                  • UnDecorator::getSignedDimension.LIBCMT ref: 6C4663DC
                                                                  • UnDecorator::getSignedDimension.LIBCMT ref: 6C466418
                                                                  • DName::operator+.LIBCMT ref: 6C466511
                                                                    • Part of subcall function 6C4625A9: DName::DName.LIBVCRUNTIME ref: 6C4625BE
                                                                  • DName::operator+.LIBCMT ref: 6C46651C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Decorator::getDimensionSigned$Name::operator+$NameName::
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 3679549980-2525777580
                                                                  • Opcode ID: beb73e8a15571d71ca9ec5a795383e5993792da92c0b8fc5935ab7e17777706c
                                                                  • Instruction ID: 95e2d816599b80fdfeb6f4758a2791a195869b49ba2d21831ca6665faf999392
                                                                  • Opcode Fuzzy Hash: beb73e8a15571d71ca9ec5a795383e5993792da92c0b8fc5935ab7e17777706c
                                                                  • Instruction Fuzzy Hash: 2191C6719452069ACB00DFB6C995FFEBB78AB06319F20012DD111E2F8CDB35D609C7A5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CertFreeCertificateContext.CRYPT32(?), ref: 6C44F023
                                                                  Strings
                                                                  • http, xrefs: 6C44EE9F
                                                                  • schannel: failed to setup sequence detection, xrefs: 6C44EDDE
                                                                  • schannel: failed to setup replay detection, xrefs: 6C44EDF5
                                                                  • schannel: failed to setup stream orientation, xrefs: 6C44EE40
                                                                  • schannel: failed to retrieve ALPN result, xrefs: 6C44EE86
                                                                  • schannel: failed to setup confidentiality, xrefs: 6C44EE0C
                                                                  • /1.1, xrefs: 6C44EEA8
                                                                  • schannel: failed to setup memory allocation, xrefs: 6C44EE26
                                                                  • schannel: failed to retrieve remote cert context, xrefs: 6C44F040
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CertCertificateContextFree
                                                                  • String ID: /1.1$http$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation
                                                                  • API String ID: 3080675121-158868958
                                                                  • Opcode ID: 24ebb873c7099b346d72703b139dca3bdce005ab225ec4a289c0af6187a4e75e
                                                                  • Instruction ID: 08ccb57eb0ba238e8da73788a4ed5f2368ca4713ef96dd3c780e0751fca82791
                                                                  • Opcode Fuzzy Hash: 24ebb873c7099b346d72703b139dca3bdce005ab225ec4a289c0af6187a4e75e
                                                                  • Instruction Fuzzy Hash: 2F91E031109741AFE710CE15C885F9AB7E4FF8932AF30890DF59886A91DB31A949CBD6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C444F9C
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C444FAE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___from_strstr_to_strchr
                                                                  • String ID: %s$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                                                  • API String ID: 601868998-2985882615
                                                                  • Opcode ID: e73d1bbed8d98f830082abb76d9749a2f8a8767420392419bcccd4e00ccd12e8
                                                                  • Instruction ID: c9cde48119c7ba50c58aeacccb8fe5b149466dbcd55fb0e7e2e176ff5d32fce2
                                                                  • Opcode Fuzzy Hash: e73d1bbed8d98f830082abb76d9749a2f8a8767420392419bcccd4e00ccd12e8
                                                                  • Instruction Fuzzy Hash: 1171F670A09382ABFB21CE298840F5B7BF4DF8134EF34866DE89996B81E731D504C752
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _wcschr
                                                                  • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Services$Users
                                                                  • API String ID: 2691759472-3209074899
                                                                  • Opcode ID: 54966282bd6a15f7929e6a3d46ee2a03b9ce09333edabc9337c305b1d2506e5c
                                                                  • Instruction ID: 08108bb361ba82227d5342238c89d0217d6dde638e2cb038623edd4bd4bb64e0
                                                                  • Opcode Fuzzy Hash: 54966282bd6a15f7929e6a3d46ee2a03b9ce09333edabc9337c305b1d2506e5c
                                                                  • Instruction Fuzzy Hash: 9F41D576D082129BE322DE15DC80F6B7BE8EF96369F158828FC0497B00E774944686F2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C3E5054
                                                                    • Part of subcall function 6C3F121D: __EH_prolog3_catch_GS.LIBCMT ref: 6C3F1227
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_catch_
                                                                  • String ID: Response$activation$avm$data$exdata$exp$feats$genuine$jab
                                                                  • API String ID: 1329019490-252001470
                                                                  • Opcode ID: 86d1c9dcf6e08a73af067f0484d6bfd791d503bb9d6402d17032efc61b96ce01
                                                                  • Instruction ID: 6b6f8aace23cc4b786dd11c07118ed888062dfc6e1fa7f0b5bd804854fc2d782
                                                                  • Opcode Fuzzy Hash: 86d1c9dcf6e08a73af067f0484d6bfd791d503bb9d6402d17032efc61b96ce01
                                                                  • Instruction Fuzzy Hash: 15114275D002589ADB20CB55CC81FDE7B78AB58348F0089ABE50777640DB705A89CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • IsInExceptionSpec.LIBVCRUNTIME ref: 6C460642
                                                                  • ___TypeMatch.LIBVCRUNTIME ref: 6C460773
                                                                  • CatchIt.LIBVCRUNTIME ref: 6C4607C4
                                                                  • IsInExceptionSpec.LIBVCRUNTIME ref: 6C460845
                                                                  • _UnwindNestedFrames.LIBCMT ref: 6C4608C9
                                                                  • CallUnexpected.LIBVCRUNTIME ref: 6C4608E4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionSpec$CallCatchFramesMatchNestedTypeUnexpectedUnwind
                                                                  • String ID: csm$csm$csm
                                                                  • API String ID: 2378971308-393685449
                                                                  • Opcode ID: 853c80ceff433293d9edb33f78611d571cb597d343cd0168e27ae44539096123
                                                                  • Instruction ID: c4b2545dade9548348975dad92c40173f8cc0244f08b84364bef2e3cbe15e164
                                                                  • Opcode Fuzzy Hash: 853c80ceff433293d9edb33f78611d571cb597d343cd0168e27ae44539096123
                                                                  • Instruction Fuzzy Hash: 1EB16471801289EFCF04CFA6C880D9EBBB5EF0431AB14425AE8116BF09D775DA55CBA9
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • Replicator::operator[].LIBVCRUNTIME ref: 6C466F88
                                                                  • DName::operator=.LIBVCRUNTIME ref: 6C466FDA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Name::operator=Replicator::operator[]
                                                                  • String ID: generic-type-$j;NlQ;Nl$template-parameter-
                                                                  • API String ID: 3211817929-1437206786
                                                                  • Opcode ID: 4c39eacb98ba880fcf6b048c7cd88ea59d5af7698a5a437333a548627fcd7fa2
                                                                  • Instruction ID: fbf84ac18ddf6aea5a49062cdd2991b275253e033995501464b8a0ae7d630ca2
                                                                  • Opcode Fuzzy Hash: 4c39eacb98ba880fcf6b048c7cd88ea59d5af7698a5a437333a548627fcd7fa2
                                                                  • Instruction Fuzzy Hash: FF61B171D042099FCF04DFAAC851FEEBBB8AB09304F11401ED551A7F85DB349A49CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WinHttpGetIEProxyConfigForCurrentUser.WINHTTP(?,?,?,?,00000000), ref: 6C3FDCE5
                                                                  • GlobalFree.KERNEL32(?), ref: 6C3FDDD6
                                                                  • GlobalFree.KERNEL32(?), ref: 6C3FDDE1
                                                                  • GlobalFree.KERNEL32(?), ref: 6C3FDDED
                                                                  • GlobalFree.KERNEL32(?), ref: 6C3FDDF8
                                                                  • GlobalFree.KERNEL32(?), ref: 6C3FDE04
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeGlobal$ConfigCurrentHttpProxyUser
                                                                  • String ID:
                                                                  • API String ID: 3941548018-0
                                                                  • Opcode ID: c653a4e99f851b7c6fc26ad9ff92d920ca556e54d0a5a2d4f580510a39437ebd
                                                                  • Instruction ID: 05cff5972b77043a88a20d3570c6a2beaa8c604f908a76891f00fe6fca062d85
                                                                  • Opcode Fuzzy Hash: c653a4e99f851b7c6fc26ad9ff92d920ca556e54d0a5a2d4f580510a39437ebd
                                                                  • Instruction Fuzzy Hash: 2C519DB1209305AFE714EF29C84892BB7F9FF99648B114D2DF5A5D3610DB31E8068F62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _free.LIBCMT ref: 6C47B03E
                                                                    • Part of subcall function 6C47A768: HeapFree.KERNEL32(00000000,00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000), ref: 6C47A77E
                                                                    • Part of subcall function 6C47A768: GetLastError.KERNEL32(00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000,00000000), ref: 6C47A790
                                                                  • _free.LIBCMT ref: 6C47B04A
                                                                  • _free.LIBCMT ref: 6C47B055
                                                                  • _free.LIBCMT ref: 6C47B060
                                                                  • _free.LIBCMT ref: 6C47B06B
                                                                  • _free.LIBCMT ref: 6C47B076
                                                                  • _free.LIBCMT ref: 6C47B081
                                                                  • _free.LIBCMT ref: 6C47B08C
                                                                  • _free.LIBCMT ref: 6C47B097
                                                                  • _free.LIBCMT ref: 6C47B0A5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 014c01ff0ad40affa1412a4ed3ba98ac18b80688c147cba6c6e2bd6d88be4719
                                                                  • Instruction ID: 1167d43c809377b48aa965a3604a8da02a0ac951fd6819aad640a6815f9c73e0
                                                                  • Opcode Fuzzy Hash: 014c01ff0ad40affa1412a4ed3ba98ac18b80688c147cba6c6e2bd6d88be4719
                                                                  • Instruction Fuzzy Hash: BF21CB7A900208EFCB11EF94C940DDE7BF9BF08645F44516AF515AB621EB35DA48CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __aulldvrm
                                                                  • String ID: :$f$f$f$p$p$p
                                                                  • API String ID: 1302938615-1434680307
                                                                  • Opcode ID: d7617a95ef95273675babb54a9996f7ff7c87d82bfd2498a6b23da885754df9c
                                                                  • Instruction ID: a216f10f700fb108999f7ce8ed42f45109ec0ddaa33caccac35a2c1d61c10819
                                                                  • Opcode Fuzzy Hash: d7617a95ef95273675babb54a9996f7ff7c87d82bfd2498a6b23da885754df9c
                                                                  • Instruction Fuzzy Hash: FC02A275A03298CBEB31CFA5D488EDDB7B2FB40B58F644256D014B7A84D7324D888B72
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C4091FE
                                                                  • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 6C4092AE
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C4092DC
                                                                    • Part of subcall function 6C40913F: TlsGetValue.KERNEL32(FFFFFFFF,6C40923A,00000048,6C409516,00000000,000000FF,0000000C,6C3F2886,?,9634BA50,?,?,1A85EC53), ref: 6C40914D
                                                                  • WaitForMultipleObjectsEx.KERNEL32(00000000,?,00000000,?,00000000,00000048,6C409516,00000000,000000FF,0000000C,6C3F2886,?,9634BA50,?,?,1A85EC53), ref: 6C4093AC
                                                                  • CloseHandle.KERNEL32(00000000,00000048,6C409516,00000000,000000FF,0000000C,6C3F2886,?,9634BA50,?,?,1A85EC53), ref: 6C409464
                                                                    • Part of subcall function 6C4099A2: Sleep.KERNEL32(00000000,6C4093DF,?,00000048,6C409516,00000000,000000FF,0000000C,6C3F2886,?,9634BA50,?), ref: 6C4099B1
                                                                  • CloseHandle.KERNEL32(00000000,?,1A85EC53), ref: 6C409483
                                                                  • ResetEvent.KERNEL32(00000000,?,1A85EC53), ref: 6C40949B
                                                                    • Part of subcall function 6C409739: QueryPerformanceFrequency.KERNEL32(?,00000000,9634BA50,?,?,1A85EC53), ref: 6C409744
                                                                    • Part of subcall function 6C409110: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C409139
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandleUnothrow_t@std@@@__ehfuncinfo$??2@$CreateEventFrequencyH_prolog3_MultipleObjectsPerformanceQueryResetSleepTimerValueWaitWaitable
                                                                  • String ID:
                                                                  • API String ID: 2922591083-3916222277
                                                                  • Opcode ID: 523869b46fb672966449235c0723743e5064d20d12443035a1bd21c66965d775
                                                                  • Instruction ID: 2ce410bb204b3d4979d84ee2ed4f564ad9d1bf1f8d0d61ef439030ca79b8f3b4
                                                                  • Opcode Fuzzy Hash: 523869b46fb672966449235c0723743e5064d20d12443035a1bd21c66965d775
                                                                  • Instruction Fuzzy Hash: 32918075E452089FDB04CFA4C884DEDBBB5AF5D324F24822EE821A7B90DB319945CF64
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • DName::operator+.LIBCMT ref: 6C462972
                                                                  • DName::operator+.LIBCMT ref: 6C4629C5
                                                                    • Part of subcall function 6C461641: shared_ptr.LIBCMT ref: 6C46165D
                                                                    • Part of subcall function 6C46156C: DName::operator+.LIBCMT ref: 6C46158D
                                                                  • DName::operator+.LIBCMT ref: 6C4629B6
                                                                  • DName::operator+.LIBCMT ref: 6C462A16
                                                                  • DName::operator+.LIBCMT ref: 6C462A23
                                                                  • DName::operator+.LIBCMT ref: 6C462A6A
                                                                  • DName::operator+.LIBCMT ref: 6C462A77
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Name::operator+$shared_ptr
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 1037112749-2525777580
                                                                  • Opcode ID: da8d8754d7579759df680e34027d3a522639cecd9050d6d5439e41a658ee6404
                                                                  • Instruction ID: 9fe41e0adbf5d1ab1d11177f2b7500ea6f7b042e017c4dce23e1f512f41bd9b3
                                                                  • Opcode Fuzzy Hash: da8d8754d7579759df680e34027d3a522639cecd9050d6d5439e41a658ee6404
                                                                  • Instruction Fuzzy Hash: 625162B1A00219BFCF15CB95C855EEEBBB8AB48714F04415EE506A7B84EF70D648CBE0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C463B56
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C463B83
                                                                    • Part of subcall function 6C4613B1: __aulldvrm.LIBCMT ref: 6C4613E2
                                                                  • DName::operator+.LIBCMT ref: 6C463B9E
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C463BBB
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C463BEB
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C463BF5
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C463C1C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: NameName::$Name::operator+__aulldvrm
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 4069495278-2525777580
                                                                  • Opcode ID: a88a8e6739535b544b48e7bc6ddd8bf71eeebcd96b8ab426b3dcc7448ff5149a
                                                                  • Instruction ID: 4fd5a12db8ff1ead3598dac0cca36ec0f1e73d5826927c142f5ce3f7a50321fc
                                                                  • Opcode Fuzzy Hash: a88a8e6739535b544b48e7bc6ddd8bf71eeebcd96b8ab426b3dcc7448ff5149a
                                                                  • Instruction Fuzzy Hash: 0E3192729481849ADF08DFBAC890FED7BB5BF0A718F04414DE452A7E8ADB31964AC750
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000000,?,?,6C43F189,00000000,?,00000100), ref: 6C451DFC
                                                                  • _strncpy.LIBCMT ref: 6C451E43
                                                                  • _strrchr.LIBCMT ref: 6C451E7B
                                                                  • _strrchr.LIBCMT ref: 6C451E95
                                                                  • GetLastError.KERNEL32(6C43F189,00000000,?,00000100), ref: 6C451EC0
                                                                  • SetLastError.KERNEL32(00000000), ref: 6C451ECB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_strrchr$_strncpy
                                                                  • String ID: Unknown error %d (%#x)
                                                                  • API String ID: 1320708361-2414550090
                                                                  • Opcode ID: bc2747a8c09b7d91e978fbf34e10b54dd41b76a24365d74af6704beddacd48de
                                                                  • Instruction ID: 202124e733e85a9d26bb7ca6baf3a9e1316e515c08124cb77fc168effa02044c
                                                                  • Opcode Fuzzy Hash: bc2747a8c09b7d91e978fbf34e10b54dd41b76a24365d74af6704beddacd48de
                                                                  • Instruction Fuzzy Hash: 6621F1613086429EEB02EE269C44FAF7BA8DFA225DF21045EE44197F51EB60CC5482F2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free_wcschr
                                                                  • String ID:
                                                                  • API String ID: 3422831350-0
                                                                  • Opcode ID: 27fed7ab220e5315aa185a25f0a7bf42d53ef90364e0d7554951645528c22710
                                                                  • Instruction ID: 593a120a7031e229e6c1c10612b30e6a6fc3dfba9483efe53af2f950d22580bf
                                                                  • Opcode Fuzzy Hash: 27fed7ab220e5315aa185a25f0a7bf42d53ef90364e0d7554951645528c22710
                                                                  • Instruction Fuzzy Hash: 6D5116B1E023019BDB20EFA9C880F9E77F4AF05719F55456EE910E7B80E731D5048BA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID:
                                                                  • API String ID: 269201875-0
                                                                  • Opcode ID: 1c6545dd3c35e55a85425d5c62c7090959eb8791fb8e46acfb4fe560cd7c79bc
                                                                  • Instruction ID: 3af9657ce330da2977d86f877b49124a868e4924702f623dd635511df2051988
                                                                  • Opcode Fuzzy Hash: 1c6545dd3c35e55a85425d5c62c7090959eb8791fb8e46acfb4fe560cd7c79bc
                                                                  • Instruction Fuzzy Hash: 6F610F71912700AFEB20EF68C880FDAB7F8AF05715F14415AE955EB781EB30E940CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentThread$_xtime_get$Xtime_diff_to_millis2
                                                                  • String ID:
                                                                  • API String ID: 3943753294-0
                                                                  • Opcode ID: 5e878222b53d93d9162934e2c59692f9bd6198f226e1b940b4a99bd6d2ac0d99
                                                                  • Instruction ID: d316fa271d95afc7344cfc61806e289b873b039d83d3ca1c711ba7a1099f3498
                                                                  • Opcode Fuzzy Hash: 5e878222b53d93d9162934e2c59692f9bd6198f226e1b940b4a99bd6d2ac0d99
                                                                  • Instruction Fuzzy Hash: 48519E70B88215CFCF10EF64C584DAA77B4FF09315B244669E815ABB86DB30ED41CB92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: avm$data$exdata$exp$user_ts$veritrial
                                                                  • API String ID: 2427045233-2543966825
                                                                  • Opcode ID: 016a9e7f94c7bb6095c17ad322f67bcb615d96bc379534e83f3966e436c05968
                                                                  • Instruction ID: d7b0b657879f49239649a3595c81fde80e1a65c0291e8980b350e7e8cb270663
                                                                  • Opcode Fuzzy Hash: 016a9e7f94c7bb6095c17ad322f67bcb615d96bc379534e83f3966e436c05968
                                                                  • Instruction Fuzzy Hash: 75514975C0029DAECF10DFE0C980EEEBBB5AF58308F14482AD56177A50DB755A4ACFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • StreamTransformationFilter: ONE_AND_ZEROS_PADDING cannot be used with , xrefs: 6C41FFF5
                                                                  • BlockPaddingScheme, xrefs: 6C41FF56
                                                                  • StreamTransformationFilter: PKCS_PADDING cannot be used with , xrefs: 6C42005F
                                                                  • StreamTransformationFilter: W3C_PADDING cannot be used with , xrefs: 6C41FFBC
                                                                  • FilterWithBufferedInput, xrefs: 6C4200BC
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: BlockPaddingScheme$FilterWithBufferedInput$StreamTransformationFilter: ONE_AND_ZEROS_PADDING cannot be used with $StreamTransformationFilter: PKCS_PADDING cannot be used with $StreamTransformationFilter: W3C_PADDING cannot be used with
                                                                  • API String ID: 2427045233-2286867357
                                                                  • Opcode ID: 6bc54b63ad9212aa8c442768cfc52124f71eb2df8b246770db59a84debb6442d
                                                                  • Instruction ID: 6d0f48dd6ace91640ddb68984539f7e50ee08e7e955bc868d28c061be0cd699f
                                                                  • Opcode Fuzzy Hash: 6bc54b63ad9212aa8c442768cfc52124f71eb2df8b246770db59a84debb6442d
                                                                  • Instruction Fuzzy Hash: D751EE71900258EFEB00DFA4CC44FDEBBB4BF09308F104199E449ABA90CB75AA49CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3F1B2E
                                                                  • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3F1B9B
                                                                  • VerifyVersionInfoW.KERNEL32(0000011C,00000002,00000000), ref: 6C3F1BAC
                                                                  • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3F1BF2
                                                                  • GetLastError.KERNEL32(?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3F1BFF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CompletionConditionCreateErrorH_prolog3_InfoLastMaskPortVerifyVersion
                                                                  • String ID: $8Il$iocp
                                                                  • API String ID: 1253481005-4004021322
                                                                  • Opcode ID: e9e97139cd4fe11822ea033568000e1819ed35b0e792da59692fbcee17328d75
                                                                  • Instruction ID: 5111fe5b555edd6209d8208403c05e8baf5a15ef97ed1bd88f6a7aa23397a56b
                                                                  • Opcode Fuzzy Hash: e9e97139cd4fe11822ea033568000e1819ed35b0e792da59692fbcee17328d75
                                                                  • Instruction Fuzzy Hash: 1751CFB0900350AFDB20DF6AD885B9ABBF4AF95714F10419EE9189B291CB74C945CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • DName::operator+.LIBCMT ref: 6C466E39
                                                                  • DName::operator+.LIBCMT ref: 6C466E45
                                                                    • Part of subcall function 6C461641: shared_ptr.LIBCMT ref: 6C46165D
                                                                  • DName::operator+=.LIBCMT ref: 6C466F05
                                                                    • Part of subcall function 6C4656C4: DName::operator+.LIBCMT ref: 6C46572F
                                                                    • Part of subcall function 6C4656C4: DName::operator+.LIBCMT ref: 6C4659ED
                                                                    • Part of subcall function 6C46156C: DName::operator+.LIBCMT ref: 6C46158D
                                                                  • DName::operator+.LIBCMT ref: 6C466EC0
                                                                    • Part of subcall function 6C461699: DName::operator=.LIBVCRUNTIME ref: 6C4616BA
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C466F29
                                                                  • DName::operator+.LIBCMT ref: 6C466F35
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Name::operator+$NameName::Name::operator+=Name::operator=shared_ptr
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 2795783184-2525777580
                                                                  • Opcode ID: 4f91a8a0c3dee93965b2077cc6bfba145fd68dbbd9f752fe4830165cd408e2fa
                                                                  • Instruction ID: 1156ff85ab7cf10f36114e447db458ab6b5e35e12b4cbf68c7c12a86b648dfc4
                                                                  • Opcode Fuzzy Hash: 4f91a8a0c3dee93965b2077cc6bfba145fd68dbbd9f752fe4830165cd408e2fa
                                                                  • Instruction Fuzzy Hash: 364192B0A04248AFDB14DFA9C490FDEBBF9AB0A308F44445DE196D7F89DB349944CB94
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C466F4B: Replicator::operator[].LIBVCRUNTIME ref: 6C466F88
                                                                  • DName::operator=.LIBVCRUNTIME ref: 6C465B1C
                                                                    • Part of subcall function 6C4656C4: DName::operator+.LIBCMT ref: 6C46572F
                                                                    • Part of subcall function 6C4656C4: DName::operator+.LIBCMT ref: 6C4659ED
                                                                  • DName::operator+.LIBCMT ref: 6C465AD7
                                                                  • DName::operator+.LIBCMT ref: 6C465AE3
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C465B30
                                                                  • DName::operator+.LIBCMT ref: 6C465B3F
                                                                  • DName::operator+.LIBCMT ref: 6C465B4B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Name::operator+$NameName::Name::operator=Replicator::operator[]
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 955152517-2525777580
                                                                  • Opcode ID: 0a9cc14050dbbbde2c6c9321fbb669a879ed98a9ff40819f84f01f7661dafb97
                                                                  • Instruction ID: 8b08485fc0ed33fe164b0c7016d8c4c956f599f6ce68ee014757f518179cc7de
                                                                  • Opcode Fuzzy Hash: 0a9cc14050dbbbde2c6c9321fbb669a879ed98a9ff40819f84f01f7661dafb97
                                                                  • Instruction Fuzzy Hash: 7931A2B1A043049FCB18CFAAC490EEABBF9AF59708F00445EE587A7F55DB319548CB64
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __fprintf_l.LIBCMT ref: 6C439561
                                                                    • Part of subcall function 6C44C651: getaddrinfo.WS2_32(?,?,?,?), ref: 6C44C673
                                                                    • Part of subcall function 6C44C651: freeaddrinfo.WS2_32(?), ref: 6C44C77B
                                                                  • WSAGetLastError.WS2_32 ref: 6C43958A
                                                                  • WSAGetLastError.WS2_32 ref: 6C439590
                                                                  • EnterCriticalSection.KERNEL32(?), ref: 6C4395A1
                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 6C4395AF
                                                                  • send.WS2_32(000000FF,?), ref: 6C4395DD
                                                                  • WSAGetLastError.WS2_32 ref: 6C4395E7
                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 6C4395F5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalErrorLastSection$Leave$Enter__fprintf_lfreeaddrinfogetaddrinfosend
                                                                  • String ID:
                                                                  • API String ID: 3536314493-0
                                                                  • Opcode ID: 176306f736046c60a2ff2e371832d7abe073eacd4688ddb0c1167e6a55c9cb96
                                                                  • Instruction ID: 4a4bd5a510730ce8f15e2f4df56b3ad07598a0cbcb6e31e5d449c10860ff3b11
                                                                  • Opcode Fuzzy Hash: 176306f736046c60a2ff2e371832d7abe073eacd4688ddb0c1167e6a55c9cb96
                                                                  • Instruction Fuzzy Hash: 13219F721007119FE720EF26CC49E5BB7F8FF99315F10492DE99A82650EF32E5588BA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C47B16C: GetLastError.KERNEL32(00000006,00000000,0000000A,6C46898C,00000000,00000000,00000006,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B171
                                                                    • Part of subcall function 6C47B16C: SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B20F
                                                                  • _free.LIBCMT ref: 6C47D239
                                                                  • _free.LIBCMT ref: 6C47D252
                                                                  • _free.LIBCMT ref: 6C47D290
                                                                  • _free.LIBCMT ref: 6C47D299
                                                                  • _free.LIBCMT ref: 6C47D2A5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorLast
                                                                  • String ID: C
                                                                  • API String ID: 3291180501-1037565863
                                                                  • Opcode ID: 34bf0537aff0c936b2362018fd0409907979f48f43ae0d9691e907bdc8cac907
                                                                  • Instruction ID: 85f190bccd9e17fe36a58e45b1ef7df3fc50e1c8277b0a7004c9b650a5bd0e67
                                                                  • Opcode Fuzzy Hash: 34bf0537aff0c936b2362018fd0409907979f48f43ae0d9691e907bdc8cac907
                                                                  • Instruction Fuzzy Hash: 80B13875A112199BDB24DF28C888EDDB3B4FF49309F5045AED809A7750D730AE91CFA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • Read callback asked for PAUSE when not supported!, xrefs: 6C448534
                                                                  • operation aborted by trailing headers callback, xrefs: 6C4484D2
                                                                  • read function returned funny value, xrefs: 6C448571
                                                                  • operation aborted by callback, xrefs: 6C4484BD
                                                                  • %zx%s, xrefs: 6C4485C8
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __fprintf_l
                                                                  • String ID: %zx%s$Read callback asked for PAUSE when not supported!$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                                                  • API String ID: 3906573944-3409421463
                                                                  • Opcode ID: c7d3badc93b3668b5f868b39da10167bae9cb47037277aae6722370b530e5ec9
                                                                  • Instruction ID: c6a5a374b0e4f8562b25559595851a24b5d4b9c5ef04a97b8344d45d6fb2932a
                                                                  • Opcode Fuzzy Hash: c7d3badc93b3668b5f868b39da10167bae9cb47037277aae6722370b530e5ec9
                                                                  • Instruction Fuzzy Hash: E981F8314083009FFB11CF25C885FDA7BE4EB89319F28456EEC489E685DB769849CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __fprintf_l
                                                                  • String ID: %c%c%c%c$%c%c%c=$%c%c==
                                                                  • API String ID: 3906573944-3943651191
                                                                  • Opcode ID: 82d3ed3d007d2e0642e3a687199752014e0a324b996d450e7a2da973bd907ec9
                                                                  • Instruction ID: ea67fe3836d7543e40aed734934df5fc69fc63ee194f11659faea3e540169e2d
                                                                  • Opcode Fuzzy Hash: 82d3ed3d007d2e0642e3a687199752014e0a324b996d450e7a2da973bd907ec9
                                                                  • Instruction Fuzzy Hash: C041196140D7D15FF311CE388850F6BBFE4EB4A315F244A9DF8E1D7642D619C60687A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _ValidateLocalCookies.LIBCMT ref: 6C45DB07
                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 6C45DB0F
                                                                  • _ValidateLocalCookies.LIBCMT ref: 6C45DB98
                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 6C45DBC3
                                                                  • _ValidateLocalCookies.LIBCMT ref: 6C45DC18
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                  • String ID: csm
                                                                  • API String ID: 1170836740-1018135373
                                                                  • Opcode ID: a02329a680137a6ea55d5ba66dd97a817cc2355e76933fe0efd097fd478fee46
                                                                  • Instruction ID: c3fdc62793cb17f237d0c0f30517b9e6a983d40e96881f63e705d15c12789e02
                                                                  • Opcode Fuzzy Hash: a02329a680137a6ea55d5ba66dd97a817cc2355e76933fe0efd097fd478fee46
                                                                  • Instruction Fuzzy Hash: FB41D134E012099BCF00DF69C980E9E7FB5EF45328F548199E8189BB95D731EA25CBD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RegOpenKeyExW.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,00000000,00020019,?,00000002,00000000,00000000,00000000,?,?,00000000,00000000,6C3EFB7D,000000FC,000000FC), ref: 6C3E70B3
                                                                  • RegQueryValueExW.ADVAPI32(?,ShutdownTime,00000000,00000000,?,00000000), ref: 6C3E70E8
                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 6C3E70FA
                                                                    • Part of subcall function 6C46A5B4: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,6C3FC297,00000000,00000000,?,?,00000000,?,?,?,00000000,?,00000000), ref: 6C46A5C7
                                                                    • Part of subcall function 6C46A5B4: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C46A5F8
                                                                  • RegCloseKey.ADVAPI32(?), ref: 6C3E7164
                                                                  Strings
                                                                  • ShutdownTime, xrefs: 6C3E70E0
                                                                  • System\CurrentControlSet\Control\Windows, xrefs: 6C3E70A3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Time$FileSystem$CloseOpenQueryUnothrow_t@std@@@Value__ehfuncinfo$??2@
                                                                  • String ID: ShutdownTime$System\CurrentControlSet\Control\Windows
                                                                  • API String ID: 3100410667-4198653432
                                                                  • Opcode ID: ea06582fb585368e3b0df4e0ad99e87b9e528127426b9a09be7cf6ac031d0a85
                                                                  • Instruction ID: 2acf8c83ffd159bec7d9d0190b3ae22b5cb4f98dee28f0f5c134a0cf74c55649
                                                                  • Opcode Fuzzy Hash: ea06582fb585368e3b0df4e0ad99e87b9e528127426b9a09be7cf6ac031d0a85
                                                                  • Instruction Fuzzy Hash: B1419171E0032CAFDF20DFA5C845BEE7BB9EF0A304F14001AE910E6641EB359949DB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C440D90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___from_strstr_to_strchr
                                                                  • String ID: %.*s$%sAuthorization: Digest %s$Digest$Proxy-$n
                                                                  • API String ID: 601868998-4248446944
                                                                  • Opcode ID: 2e98f3d8d924abae8ec67ea41fbfacef93e6e72e9620bd51bddfe70d2e2c4bfc
                                                                  • Instruction ID: aab4ee5bb4c8db6f80ae4486fe6822328f531af4a375f6aad729a1c36e1c08a1
                                                                  • Opcode Fuzzy Hash: 2e98f3d8d924abae8ec67ea41fbfacef93e6e72e9620bd51bddfe70d2e2c4bfc
                                                                  • Instruction Fuzzy Hash: 7A41C371A08745AFE700DF28C800E5BBBE4EF89308F60096DF48497341EB31E968CB62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020119,?,?,00000000,00000000), ref: 6C3F61B6
                                                                  • RegQueryValueExW.ADVAPI32(?,PnpInstanceID,00000000,00000000,00000000,?,?,?,00000000,00000000), ref: 6C3F61DB
                                                                  • RegQueryValueExW.ADVAPI32(?,PnpInstanceID,00000000,00000000,00000000,?,?,?,00000000,00000000), ref: 6C3F621D
                                                                  • RegCloseKey.ADVAPI32(?,?,?,00000000,00000000), ref: 6C3F6234
                                                                  Strings
                                                                  • PnpInstanceID, xrefs: 6C3F61D1, 6C3F61D6, 6C3F6218
                                                                  • SYSTEM\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}\%s\Connection, xrefs: 6C3F6193
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue$CloseOpen
                                                                  • String ID: PnpInstanceID$SYSTEM\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}\%s\Connection
                                                                  • API String ID: 1586453840-3921133955
                                                                  • Opcode ID: 2009e7e2e98f0230facc7efc56af3c1ff7f952a81b0926e71867d13f1da4130b
                                                                  • Instruction ID: adb4c3f9977f96e9e44fbead7e88f3ba0a68a5f9ac304cfc809fd8461292ca3c
                                                                  • Opcode Fuzzy Hash: 2009e7e2e98f0230facc7efc56af3c1ff7f952a81b0926e71867d13f1da4130b
                                                                  • Instruction Fuzzy Hash: 8431CF72104215AFD728DE25DC85DFB73FCEF49348F048A2DF959C6540EB229D068AA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: api-ms-$ext-ms-
                                                                  • API String ID: 0-537541572
                                                                  • Opcode ID: f04fe359646cf9a873baf81839a060eff45d2b604499831e5a2ed3d41fec32b8
                                                                  • Instruction ID: e245c89fc5e9cd582a1f1ce214378008cee6b1940f00aed83cd7a7c577ec88d3
                                                                  • Opcode Fuzzy Hash: f04fe359646cf9a873baf81839a060eff45d2b604499831e5a2ed3d41fec32b8
                                                                  • Instruction Fuzzy Hash: B2210832B56221ABCB31CE658C44F8A3B68EF467A9F210610EC15A7B80D730E901C5F1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C48625B: _free.LIBCMT ref: 6C486280
                                                                  • _free.LIBCMT ref: 6C48655D
                                                                    • Part of subcall function 6C47A768: HeapFree.KERNEL32(00000000,00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000), ref: 6C47A77E
                                                                    • Part of subcall function 6C47A768: GetLastError.KERNEL32(00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000,00000000), ref: 6C47A790
                                                                  • _free.LIBCMT ref: 6C486568
                                                                  • _free.LIBCMT ref: 6C486573
                                                                  • _free.LIBCMT ref: 6C4865C7
                                                                  • _free.LIBCMT ref: 6C4865D2
                                                                  • _free.LIBCMT ref: 6C4865DD
                                                                  • _free.LIBCMT ref: 6C4865E8
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 80dcd65657719537ad1fb46a5a0d9fd5db74bb28997df363f943005b6895872d
                                                                  • Instruction ID: f57d2c210d795c7488bf0703b2b6f3e1eba5f24964e56318a2a6047dc8fd6618
                                                                  • Opcode Fuzzy Hash: 80dcd65657719537ad1fb46a5a0d9fd5db74bb28997df363f943005b6895872d
                                                                  • Instruction Fuzzy Hash: 3C118471951B04E6D5B0FB70CC49FDB77EE6F84706F44081CA299A6A90DB24F5088690
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WSAStartup.WS2_32(00000202,?), ref: 6C440FC4
                                                                  • WSACleanup.WS2_32 ref: 6C440FE4
                                                                  • GetProcAddress.KERNEL32(00000000,if_nametoindex), ref: 6C44100F
                                                                  • QueryPerformanceFrequency.KERNEL32(6C4E8968), ref: 6C441044
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCleanupFrequencyPerformanceProcQueryStartup
                                                                  • String ID: if_nametoindex$iphlpapi.dll
                                                                  • API String ID: 1406996172-3097795196
                                                                  • Opcode ID: 9303f982ced346c846b558b89e55af2dceec98448ec0c58554f96776e3a34577
                                                                  • Instruction ID: 7acb76b10776a7ad2f3e2ca73d132568900e4f6415783def426eebb9f40c7ab5
                                                                  • Opcode Fuzzy Hash: 9303f982ced346c846b558b89e55af2dceec98448ec0c58554f96776e3a34577
                                                                  • Instruction Fuzzy Hash: F6110630B043449BFB20EB788D5AF5937B4DB0A309FA04469E905E6A82EB70C911C691
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3EBE44
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C3EBE51
                                                                    • Part of subcall function 6C3E1E9E: std::_Lockit::_Lockit.LIBCPMT ref: 6C3E1EBA
                                                                    • Part of subcall function 6C3E1E9E: std::_Lockit::~_Lockit.LIBCPMT ref: 6C3E1ED6
                                                                  • std::_Facet_Register.LIBCPMT ref: 6C3EBE9F
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C3EBEB5
                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C3EBEC2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3_Register
                                                                  • String ID: PgNl
                                                                  • API String ID: 3498242614-2368684771
                                                                  • Opcode ID: 0b20f14ff7e16a8ab5f500ec1491d95d3493ee4358563076abef406ad8746d22
                                                                  • Instruction ID: 88d4842e8690afe9ec1a7d23d24bba560e4c78ea4fbe19ddb4aeead46833baa4
                                                                  • Opcode Fuzzy Hash: 0b20f14ff7e16a8ab5f500ec1491d95d3493ee4358563076abef406ad8746d22
                                                                  • Instruction Fuzzy Hash: 2501F531A012258BCB01DB64C440FEE77B5AFC872CF20054AE955ABB80CB34CE498BD2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C41356E
                                                                    • Part of subcall function 6C40E125: __EH_prolog3.LIBCMT ref: 6C40E12C
                                                                    • Part of subcall function 6C40DDDF: __EH_prolog3.LIBCMT ref: 6C40DDE6
                                                                    • Part of subcall function 6C40DE52: __EH_prolog3.LIBCMT ref: 6C40DE59
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: EquivalentTo$Max$Min$Mod$RandomNumberType
                                                                  • API String ID: 431132790-3534478594
                                                                  • Opcode ID: 910c0445901c51f2b365c8f7cf6accc6d462a784dc9111744e6602268c3a44b7
                                                                  • Instruction ID: 3201dc9df8be10f62d545604deb563562abfdfa44e005feeaf4363e1235fea2f
                                                                  • Opcode Fuzzy Hash: 910c0445901c51f2b365c8f7cf6accc6d462a784dc9111744e6602268c3a44b7
                                                                  • Instruction Fuzzy Hash: 2A01B5B56001A87EEF0ADB70C865EFE3B959F44248F04445CB8661BBA1DB249D1CDBB0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,?,6C45A14C,?,?,00000100,?,rcmd), ref: 6C451D84
                                                                  • _strncpy.LIBCMT ref: 6C451DC0
                                                                  • GetLastError.KERNEL32(00000100,?,rcmd), ref: 6C451DE1
                                                                  • SetLastError.KERNEL32(00000000), ref: 6C451DEC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_strncpy
                                                                  • String ID: Error$No error
                                                                  • API String ID: 3397631897-894398594
                                                                  • Opcode ID: 66528d57db5b524df3e021f45473bb098955bde9147a4f601b47fdbccfa61a80
                                                                  • Instruction ID: 40794ebdafabd6b7728fe31998ec94adb5d6bc96b9ba630f6ac54c2f2ccb629d
                                                                  • Opcode Fuzzy Hash: 66528d57db5b524df3e021f45473bb098955bde9147a4f601b47fdbccfa61a80
                                                                  • Instruction Fuzzy Hash: D601A2B4604316AFC701EF65D409E5ABBB8EF9225AF01042EE411C7F11EB70D85886F2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00000000,?,6C45A3EA,00000000), ref: 6C451EDC
                                                                  • _strncpy.LIBCMT ref: 6C451F18
                                                                  • GetLastError.KERNEL32 ref: 6C451F39
                                                                  • SetLastError.KERNEL32(00000000), ref: 6C451F44
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_strncpy
                                                                  • String ID: Error$No error
                                                                  • API String ID: 3397631897-894398594
                                                                  • Opcode ID: 055c517c442cb80e4875b79fcd2de03b5f0586156bc710092e4ca8755a2b2723
                                                                  • Instruction ID: d9d4f3be688d581008dda62f33ab097266eae4df0a03c0f24009ac56e15f64d5
                                                                  • Opcode Fuzzy Hash: 055c517c442cb80e4875b79fcd2de03b5f0586156bc710092e4ca8755a2b2723
                                                                  • Instruction Fuzzy Hash: 5001A2B5204316EFC301EF69D408E5ABBB8EFA225AF010469E451C7F11EB71D85486B2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetConsoleOutputCP.KERNEL32(00000000,00000000,?), ref: 6C479D69
                                                                  • __fassign.LIBCMT ref: 6C479F4E
                                                                  • __fassign.LIBCMT ref: 6C479F6B
                                                                  • WriteFile.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6C479FB3
                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6C479FF3
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 6C47A09B
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                  • String ID:
                                                                  • API String ID: 1735259414-0
                                                                  • Opcode ID: 267a73a5978936175a102d89eef880f169070cef428de8c280d34dd84a9dcdb3
                                                                  • Instruction ID: ac15559fc370612abea42340651506690f087fbd248724b15252012493f55453
                                                                  • Opcode Fuzzy Hash: 267a73a5978936175a102d89eef880f169070cef428de8c280d34dd84a9dcdb3
                                                                  • Instruction Fuzzy Hash: E1C19E75D012988FCF21CFA8C884DEDBBB5AF09314F28416AE855B7741D7329946CFA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __allrem.LIBCMT ref: 6C47917C
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C479198
                                                                  • __allrem.LIBCMT ref: 6C4791AF
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C4791CD
                                                                  • __allrem.LIBCMT ref: 6C4791E4
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C479202
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                  • String ID:
                                                                  • API String ID: 1992179935-0
                                                                  • Opcode ID: b373f589be5bc6dbce8ebe9e11362efe6a7a8c701dad155c810c0b83a26beaf4
                                                                  • Instruction ID: a39f6df29e6434cc6b83396fb81798241950cd1f79b15ab4295b06ea7bf9572c
                                                                  • Opcode Fuzzy Hash: b373f589be5bc6dbce8ebe9e11362efe6a7a8c701dad155c810c0b83a26beaf4
                                                                  • Instruction Fuzzy Hash: F581D271A017069BE730DE69CC40FDAB3B9AF51368F24462DE511E7B90E776D90887A0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C44A435
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C44A449
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C44A49F
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C44A4CA
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C44A52D
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C44A6AB
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                  • String ID:
                                                                  • API String ID: 885266447-0
                                                                  • Opcode ID: 76b17f00a888fbab5e3550b0a3983c379dfb7f8c02c281b129ea10211a84dfb2
                                                                  • Instruction ID: fc6684bd9b5829024148a14118e72ff0d96c5088bd5d7dc673f1c7e004b0183a
                                                                  • Opcode Fuzzy Hash: 76b17f00a888fbab5e3550b0a3983c379dfb7f8c02c281b129ea10211a84dfb2
                                                                  • Instruction Fuzzy Hash: EC91AD719087108BE711DE298884FAB77E5EF89724F24867DEC4C9F701DB74A8058BA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _free.LIBCMT ref: 6C4751EB
                                                                  • _free.LIBCMT ref: 6C475206
                                                                  • _free.LIBCMT ref: 6C475211
                                                                  • _free.LIBCMT ref: 6C47531E
                                                                    • Part of subcall function 6C478EC0: RtlAllocateHeap.NTDLL(00000008,6C3E2DD3,00000000,?,6C47B30E,00000001,00000364,FFFFFFFF,000000FF,?,6C45D730,7FFFFFC6,7FFFFFC0,7FFFFFC0), ref: 6C478F01
                                                                  • _free.LIBCMT ref: 6C4752F3
                                                                    • Part of subcall function 6C47A768: HeapFree.KERNEL32(00000000,00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000), ref: 6C47A77E
                                                                    • Part of subcall function 6C47A768: GetLastError.KERNEL32(00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000,00000000), ref: 6C47A790
                                                                  • _free.LIBCMT ref: 6C475314
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$Heap$AllocateErrorFreeLast
                                                                  • String ID:
                                                                  • API String ID: 4150789928-0
                                                                  • Opcode ID: ac849dd02413efd32639604387616eccf3978339a2a8152788d0a068d7f3f7b8
                                                                  • Instruction ID: 7663f0467bf472cc13ec52e4b00f3f53bd5cedf568d113fefa2651b0bf89384a
                                                                  • Opcode Fuzzy Hash: ac849dd02413efd32639604387616eccf3978339a2a8152788d0a068d7f3f7b8
                                                                  • Instruction Fuzzy Hash: C8516936A042056BDB24DB689850FEA77B9DF85719B24015DE940EFB40EB31D906C6B0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___from_strstr_to_strchr$_strrchr
                                                                  • String ID:
                                                                  • API String ID: 531880317-0
                                                                  • Opcode ID: c938420adb56bf72317b966f7316bf301e339bd3c05ddcdd4ad19f8011f0cfca
                                                                  • Instruction ID: d64eb396da36c9ee29c3adda893183d43847b2c0e0c18e3057621b03b947c131
                                                                  • Opcode Fuzzy Hash: c938420adb56bf72317b966f7316bf301e339bd3c05ddcdd4ad19f8011f0cfca
                                                                  • Instruction Fuzzy Hash: 99516C2A40E3C35FE722CE249814F577BE49F0221DFA4026DE89157F82E766C429C397
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 6C40841D
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 6C408488
                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6C4084A5
                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 6C4084E4
                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 6C408543
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 6C408566
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiStringWide
                                                                  • String ID:
                                                                  • API String ID: 2829165498-0
                                                                  • Opcode ID: 1a5da746d48e1cb3dcf8a0c6bd381e0ab0109e52a289b5bbc2e971dfa0ca0e72
                                                                  • Instruction ID: 246c217419c8c41c5f71cf2599ab216a0ba5ebc27c9580920df1c4acf16889f6
                                                                  • Opcode Fuzzy Hash: 1a5da746d48e1cb3dcf8a0c6bd381e0ab0109e52a289b5bbc2e971dfa0ca0e72
                                                                  • Instruction Fuzzy Hash: BA51CE7274021AAFEF10CF64CD45FAA3BB9EB45769F20453AFD14A6650EB30C915CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __freea
                                                                  • String ID: Q/Gl$a/p$am/pm
                                                                  • API String ID: 240046367-4263137853
                                                                  • Opcode ID: 0d2f1aec8d99c0b32709515ef2a845a9b72b10d0f062f8a999c4e4adc34012d2
                                                                  • Instruction ID: c54c78d1eb4751efbcbd619fc8dfbc2225dbee98c26a8bfec3ea7a2bc9fcb079
                                                                  • Opcode Fuzzy Hash: 0d2f1aec8d99c0b32709515ef2a845a9b72b10d0f062f8a999c4e4adc34012d2
                                                                  • Instruction Fuzzy Hash: CEC1CC31901216DBDB30CF68C988FEABBB1FF16709F244159E810ABB50DB359942CBB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,?,?,?,?,1A85EC53), ref: 6C452641
                                                                  • VerSetConditionMask.KERNEL32(00000000,?,00000001,?,?,?,1A85EC53), ref: 6C452649
                                                                  • VerSetConditionMask.KERNEL32(00000000,?,00000020,?,?,00000001,?,?,?,1A85EC53), ref: 6C452652
                                                                  • VerSetConditionMask.KERNEL32(00000000,?,00000010,?,?,00000020,?,?,00000001,?,?,?,1A85EC53), ref: 6C45265B
                                                                  • VerSetConditionMask.KERNEL32(00000000,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?,?,?,1A85EC53), ref: 6C45266B
                                                                  • VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 6C452675
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ConditionMask$InfoVerifyVersion
                                                                  • String ID:
                                                                  • API String ID: 2793162063-0
                                                                  • Opcode ID: e64144c33f480c9887adc33a6c1a3bc55c58b82a9fd1aace6064cc9be925e234
                                                                  • Instruction ID: 81ef19bedf94b4808dc805eed685ae0a325df55d5d07dc3e3578f524c54a0c79
                                                                  • Opcode Fuzzy Hash: e64144c33f480c9887adc33a6c1a3bc55c58b82a9fd1aace6064cc9be925e234
                                                                  • Instruction Fuzzy Hash: 4B31A3B1A0438CAEEF31DFB98C99FEE7BB8AB85304F50402EE514AB181DA705558CF11
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Connection time-out$Failed to connect to %s port %ld: %s$L'
                                                                  • API String ID: 0-1426291924
                                                                  • Opcode ID: d4e562a1db501a3940497d80820d0978c5266db567e105e582f0492ec7cce11e
                                                                  • Instruction ID: 6b3e595f6d98ceb32743517cf6c169ca36e635ef2c04a86813823e0a8ab323fd
                                                                  • Opcode Fuzzy Hash: d4e562a1db501a3940497d80820d0978c5266db567e105e582f0492ec7cce11e
                                                                  • Instruction Fuzzy Hash: CEB12A31406350AFF711DE668884EAB7BE4EFCE359F140A9DFC588B792D33198048792
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000001,?,6C45FE01,6C432CA1,6C433169,?,6C4333A1,?,00000001,?,?,00000001,?,6C4DBAB8,0000000C,6C43349A), ref: 6C4601E5
                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6C4601F3
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6C46020C
                                                                  • SetLastError.KERNEL32(00000000,6C4333A1,?,00000001,?,?,00000001,?,6C4DBAB8,0000000C,6C43349A,?,00000001,?), ref: 6C46025E
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastValue___vcrt_
                                                                  • String ID:
                                                                  • API String ID: 3852720340-0
                                                                  • Opcode ID: db8b223005e84f40e02e0c007eed2a993099329f714853e2982959852c79351c
                                                                  • Instruction ID: 5c3e359705cbeac41737503296dd07060b246a6041156b23bfd2a3faa9d91f49
                                                                  • Opcode Fuzzy Hash: db8b223005e84f40e02e0c007eed2a993099329f714853e2982959852c79351c
                                                                  • Instruction Fuzzy Hash: 2801B53661E6125DF625EAB76C84D862774EF4277A734033EE12081FD8EF129C4691C8
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C443CA9
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C443D32
                                                                    • Part of subcall function 6C444274: __fprintf_l.LIBCMT ref: 6C4442BD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___from_strstr_to_strchr$__fprintf_l
                                                                  • String ID: %255[^:]:%d$*$+
                                                                  • API String ID: 172319450-1234501806
                                                                  • Opcode ID: 9957b79a20802032f6ebc79ea5ee6c07600dd12812ef9ffba25747966bfb321b
                                                                  • Instruction ID: e2444ec1821ec2def91b6d5aa9c0e436627508d50d6820ae27684a8f69c15037
                                                                  • Opcode Fuzzy Hash: 9957b79a20802032f6ebc79ea5ee6c07600dd12812ef9ffba25747966bfb321b
                                                                  • Instruction Fuzzy Hash: 8C91467200C3419FF721DA24C884F9BB7E9EF85B08F348A1DE59543B81E7319549CB92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • PK_DefaultDecryptionFilter: ciphertext too long, xrefs: 6C40D331
                                                                  • : invalid ciphertext, xrefs: 6C40D2C2
                                                                  • PK_DefaultEncryptionFilter: plaintext too long, xrefs: 6C40D44C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: : invalid ciphertext$PK_DefaultDecryptionFilter: ciphertext too long$PK_DefaultEncryptionFilter: plaintext too long
                                                                  • API String ID: 2427045233-2902848663
                                                                  • Opcode ID: fc499000a69672218f5897bcda385771e086860f9cf765505bf65a73040ac669
                                                                  • Instruction ID: 64f74c079c5dc1925dd0555ba653a72b89ef68fd7aae1f44292f1dc9b949d81a
                                                                  • Opcode Fuzzy Hash: fc499000a69672218f5897bcda385771e086860f9cf765505bf65a73040ac669
                                                                  • Instruction Fuzzy Hash: AB817071600214AFCF04DFA4C894EEE7BB5FF88318F104168E805AB696DB35DA59CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C43F582: htons.WS2_32(?), ref: 6C43F5C0
                                                                  • setsockopt.WS2_32(?,00000006,00000001,?,00000004), ref: 6C440926
                                                                    • Part of subcall function 6C451DF9: GetLastError.KERNEL32(00000000,?,?,6C43F189,00000000,?,00000100), ref: 6C451DFC
                                                                    • Part of subcall function 6C43F5EC: closesocket.WS2_32(6C43CAF5), ref: 6C43F625
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastclosesockethtonssetsockopt
                                                                  • String ID: *$sa_addr inet_ntop() failed with errno %d: %s
                                                                  • API String ID: 239416242-841833560
                                                                  • Opcode ID: 14f25f18146e134a442cad5baedaca1bd9de0410f1f659674653fd9dceb4b07c
                                                                  • Instruction ID: 39f26cf2acc0b1a0aae53635e97f676525521c8e7bdca9d58ba9700e300a4d92
                                                                  • Opcode Fuzzy Hash: 14f25f18146e134a442cad5baedaca1bd9de0410f1f659674653fd9dceb4b07c
                                                                  • Instruction Fuzzy Hash: BC71F471408381ABF720DE25CC44FDF7BE8EF95308F24491EF95896641D7319558CBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C4638CB
                                                                  • UnDecorator::getSymbolName.LIBCMT ref: 6C463959
                                                                  • DName::operator+.LIBCMT ref: 6C463A5D
                                                                    • Part of subcall function 6C461641: shared_ptr.LIBCMT ref: 6C46165D
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C463B1A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Name$Decorator::getH_prolog3Name::Name::operator+Symbolshared_ptr
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 334624791-2525777580
                                                                  • Opcode ID: 16b217729eca9dd920f307d7141ed1c34331ca6b1fcf3628cf806e130c5e1c20
                                                                  • Instruction ID: 53183d9369763a88927b84b1150d87481b9a781972bb3dea0995867a8be209c4
                                                                  • Opcode Fuzzy Hash: 16b217729eca9dd920f307d7141ed1c34331ca6b1fcf3628cf806e130c5e1c20
                                                                  • Instruction Fuzzy Hash: 378159B1D052898FDF00CF9AC480FEDBBB4BB49315F16405AD905ABB56D7309949CFA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C45BE0A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___from_strstr_to_strchr
                                                                  • String ID: ../$/..$/../$/./
                                                                  • API String ID: 601868998-456519384
                                                                  • Opcode ID: 33103a9e198cba91bd468572430bebc20d028020306dbc91636f13f1e9e1d604
                                                                  • Instruction ID: f6ead062c870569d304f177ba2184dbb07cf4443fa0eac30bee5efbd70318da5
                                                                  • Opcode Fuzzy Hash: 33103a9e198cba91bd468572430bebc20d028020306dbc91636f13f1e9e1d604
                                                                  • Instruction Fuzzy Hash: BD516C2674D2911BE321DE399810F767FE48F4321DFAC486DE9C5C7F82E503886687A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: operator+shared_ptr
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 864562889-2525777580
                                                                  • Opcode ID: 2670084ba932aab65b5b6d3a9aba549864f58794222edb3192f72e8e98362437
                                                                  • Instruction ID: a737bc3f325e531cfc082824a1aeb85c908a554ee521fce0e8e6bb232d9cb0c5
                                                                  • Opcode Fuzzy Hash: 2670084ba932aab65b5b6d3a9aba549864f58794222edb3192f72e8e98362437
                                                                  • Instruction Fuzzy Hash: 09615C71904149AFCF00CFAAC844EEABBB5FB46308F14825AE4249BF1AD331D645CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C45D18C
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C45D1E4
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C45D1F7
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C45D21D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___from_strstr_to_strchr
                                                                  • String ID: xn--
                                                                  • API String ID: 601868998-2826155999
                                                                  • Opcode ID: ccae5f30af421dcc08f527b91f811f327f355b8df2ae6efa6442249c70e4f800
                                                                  • Instruction ID: 802336b67733859d61091992de16f77e0e63bf4274f34ba0178a256558628e0c
                                                                  • Opcode Fuzzy Hash: ccae5f30af421dcc08f527b91f811f327f355b8df2ae6efa6442249c70e4f800
                                                                  • Instruction Fuzzy Hash: D841996630E3822EF714DA799E44E7B779CDF86248F94412CFD01C2F85EB42D41982E1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C463FD1
                                                                    • Part of subcall function 6C4613B1: __aulldvrm.LIBCMT ref: 6C4613E2
                                                                  • DName::operator+.LIBCMT ref: 6C463FDE
                                                                  • DName::operator=.LIBVCRUNTIME ref: 6C46405E
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C46407E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: NameName::$Name::operator+Name::operator=__aulldvrm
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 2448499823-2525777580
                                                                  • Opcode ID: 806aee6effab039335a3e660b527b0589147f142e46eae5b21ac8ce04ddd40fc
                                                                  • Instruction ID: 91752485c276e08447de3cb03774de71fcbd891b7a4bf1dfd1e481f1166a05f0
                                                                  • Opcode Fuzzy Hash: 806aee6effab039335a3e660b527b0589147f142e46eae5b21ac8ce04ddd40fc
                                                                  • Instruction Fuzzy Hash: A851E074A00264EFCF01CF5AC8A0E9EBBB0FF4A344F01819AD8919BF59C7719A41CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: no write access$write area exhausted
                                                                  • API String ID: 431132790-3740649124
                                                                  • Opcode ID: b29db426cc3876e6c0f403c6d7eb6eca15e510946b5fb5f018e606ed7b8c925f
                                                                  • Instruction ID: 52554b661fe8e239c9b750b5f88e52a6fa8d530bbd2d872d83ce6cb95f580ef4
                                                                  • Opcode Fuzzy Hash: b29db426cc3876e6c0f403c6d7eb6eca15e510946b5fb5f018e606ed7b8c925f
                                                                  • Instruction Fuzzy Hash: 1641A131600224DFCB04EFA4D840EAD77B0EF49318F20455AE9518BAE0DB72E946DFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___from_strstr_to_strchr__fprintf_l
                                                                  • String ID: %*[^]]%c%n$%ld$[%*45[0123456789abcdefABCDEF:.]%c%n
                                                                  • API String ID: 1914635646-723072255
                                                                  • Opcode ID: 3c6a10e87065da86f70a549ae310e06706969b5f020b7f1717760e07a9d44771
                                                                  • Instruction ID: cbdca5544565c8f845a127a153547884added2dedcdeba9854b57fd337d29154
                                                                  • Opcode Fuzzy Hash: 3c6a10e87065da86f70a549ae310e06706969b5f020b7f1717760e07a9d44771
                                                                  • Instruction Fuzzy Hash: 36313731D06295ABFB20CA689800FEE7BB8DF03719F60445AE944E7B81E724DA4583A5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: NameName::
                                                                  • String ID: %lf$j;NlQ;Nl
                                                                  • API String ID: 1333004437-1371756581
                                                                  • Opcode ID: 9da38ea8ec7d92513fe14300e2f5da367a0cea987b525e68fecde263dcd893e2
                                                                  • Instruction ID: a7493d017cf9e49573e002013393b60dd0b9f70038cc4cb31647d22b72aae325
                                                                  • Opcode Fuzzy Hash: 9da38ea8ec7d92513fe14300e2f5da367a0cea987b525e68fecde263dcd893e2
                                                                  • Instruction Fuzzy Hash: 3631BC74A042589BCF14DFEAC854EDDBBB5FB4A388F04505EE045ABF48CB74994ACB42
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3F1EB1
                                                                  • TlsGetValue.KERNEL32(00000030,6C3F2958,9634BA50,?,?,9634BA50,?), ref: 6C3F1F28
                                                                  • TlsSetValue.KERNEL32(?,?,?,9634BA50,?), ref: 6C3F1F3B
                                                                  • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,9634BA50,?), ref: 6C3F1F6F
                                                                    • Part of subcall function 6C3F1F8C: PostQueuedCompletionStatus.KERNEL32(?,00000001,00000001,00000001,?,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F), ref: 6C3F1FBA
                                                                    • Part of subcall function 6C3F1F8C: GetLastError.KERNEL32(?,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3F1FC4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Value$CompletionErrorH_prolog3_LastPostQueuedStatus
                                                                  • String ID: $8Il
                                                                  • API String ID: 104022934-1104382562
                                                                  • Opcode ID: 63adf453d7d744aa3ed3d1cc0728e5debc3653b3c35f583f844362008a3f05d4
                                                                  • Instruction ID: 5ac69f9b4aa079772075de3dc387ad60781b82d1e87c97229055987c5c24c00b
                                                                  • Opcode Fuzzy Hash: 63adf453d7d744aa3ed3d1cc0728e5debc3653b3c35f583f844362008a3f05d4
                                                                  • Instruction Fuzzy Hash: FD218D75E00208AFEF05DFA9D8409DEBBB5AF4C314B01452AE915B7220D734D94A8FA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,9634BA50), ref: 6C40648E
                                                                    • Part of subcall function 6C4329BA: EnterCriticalSection.KERNEL32(6C4E7ADC,6C4E6A10,?,?,6C4213DE,6C4E6A10,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000), ref: 6C4329C5
                                                                    • Part of subcall function 6C4329BA: LeaveCriticalSection.KERNEL32(6C4E7ADC,?,6C4213DE,6C4E6A10,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000,00000010,6C3E3E14), ref: 6C432A02
                                                                  • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process2,9634BA50), ref: 6C406464
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 6C40646B
                                                                    • Part of subcall function 6C432970: EnterCriticalSection.KERNEL32(6C4E7ADC,?,?,6C42140A,6C4E6A10,6C491B8B,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000), ref: 6C43297A
                                                                    • Part of subcall function 6C432970: LeaveCriticalSection.KERNEL32(6C4E7ADC,?,6C42140A,6C4E6A10,6C491B8B,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000,00000010), ref: 6C4329AD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$AddressCurrentHandleModuleProcProcess
                                                                  • String ID: IsWow64Process2$kernel32
                                                                  • API String ID: 4065268087-1416006014
                                                                  • Opcode ID: 4e4ed3403226eaed36275660da14d3b0d3cbd1e928efeb6165a07530c90c5d33
                                                                  • Instruction ID: 398c5d3e3f0601ce872a108471ef587fa70b20d9029c7ee57c7861a9783ddd63
                                                                  • Opcode Fuzzy Hash: 4e4ed3403226eaed36275660da14d3b0d3cbd1e928efeb6165a07530c90c5d33
                                                                  • Instruction Fuzzy Hash: 0721C432F012559FCF10DFA9C549FDA77B8EB0A325F11052AE511D3681CB389544CBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,6C4676CD,6C4BD64C,6C4BD644,6C4DCB00,00000000,?,6C46777F,00000002,FlsGetValue,6C4BD644,6C4BD64C,00000000), ref: 6C46769C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary
                                                                  • String ID: api-ms-
                                                                  • API String ID: 3664257935-2084034818
                                                                  • Opcode ID: 0760d4d339f2a7c3ba998ab288d3c8f8f65ea6fe9888da69dde4eaed469122fd
                                                                  • Instruction ID: 9d506b79fab145ddda8b54226c2b847472024bc080eedfd218e2ce1094ca9a49
                                                                  • Opcode Fuzzy Hash: 0760d4d339f2a7c3ba998ab288d3c8f8f65ea6fe9888da69dde4eaed469122fd
                                                                  • Instruction Fuzzy Hash: 32117731A49532ABDF22DB6F8C44F4937B49F12779F250260E914A7F88D770E9018AE5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000000,9634BA50,?,?,?,00000000), ref: 6C4063C1
                                                                    • Part of subcall function 6C4329BA: EnterCriticalSection.KERNEL32(6C4E7ADC,6C4E6A10,?,?,6C4213DE,6C4E6A10,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000), ref: 6C4329C5
                                                                    • Part of subcall function 6C4329BA: LeaveCriticalSection.KERNEL32(6C4E7ADC,?,6C4213DE,6C4E6A10,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000,00000010,6C3E3E14), ref: 6C432A02
                                                                  • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process,9634BA50,?,?,?,00000000), ref: 6C40639B
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 6C4063A2
                                                                    • Part of subcall function 6C432970: EnterCriticalSection.KERNEL32(6C4E7ADC,?,?,6C42140A,6C4E6A10,6C491B8B,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000), ref: 6C43297A
                                                                    • Part of subcall function 6C432970: LeaveCriticalSection.KERNEL32(6C4E7ADC,?,6C42140A,6C4E6A10,6C491B8B,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000,00000010), ref: 6C4329AD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeave$AddressCurrentHandleModuleProcProcess
                                                                  • String ID: IsWow64Process$kernel32
                                                                  • API String ID: 4065268087-3789238822
                                                                  • Opcode ID: 2386f1f0d4e3c5a1d06521c3844e4d9d76c76397be4049d705019ab26403cf98
                                                                  • Instruction ID: 897ea55825b7877e22bbcd4e07f9a2d990cd326fbccce72cfcfbc7a1a7ac5bdc
                                                                  • Opcode Fuzzy Hash: 2386f1f0d4e3c5a1d06521c3844e4d9d76c76397be4049d705019ab26403cf98
                                                                  • Instruction Fuzzy Hash: B5119435E01295DFCF14EF68C849F9A77B8FB09715F110A2EE512E3A82DB385944CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C432069
                                                                  • QueryPerformanceFrequency.KERNEL32(00000000), ref: 6C43207A
                                                                  • GetLastError.KERNEL32(0000000A), ref: 6C432092
                                                                  • __EH_prolog3.LIBCMT ref: 6C4320DD
                                                                  Strings
                                                                  • Timer: QueryPerformanceFrequency failed with error , xrefs: 6C4320AA
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFrequencyH_prolog3H_prolog3_LastPerformanceQuery
                                                                  • String ID: Timer: QueryPerformanceFrequency failed with error
                                                                  • API String ID: 4231316894-348333943
                                                                  • Opcode ID: 248ba904e5631a6dee8d89cb2b4fa3923a32651e78cbee83bb82768f6f18105f
                                                                  • Instruction ID: 5d8d466eb2890892982fa6e2b73535bd326c009f8018814611f24e3a462ec63a
                                                                  • Opcode Fuzzy Hash: 248ba904e5631a6dee8d89cb2b4fa3923a32651e78cbee83bb82768f6f18105f
                                                                  • Instruction Fuzzy Hash: CF118671E40224ABDB10EBA1C848FDD7778BB49329F114558E605E7B82CF749509CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3Mtx_init_in_situMtx_unlock
                                                                  • String ID: <zNl$lzNl
                                                                  • API String ID: 1360302138-1320618036
                                                                  • Opcode ID: 135ebb34c7095cf838d129db120e025e15cbb6434df0bf1424309c7e6133b1bf
                                                                  • Instruction ID: 66ec52349177cddd3f20f2a2efb4befdeca80af2a2d3e0fc4f5e220e1d2ccc57
                                                                  • Opcode Fuzzy Hash: 135ebb34c7095cf838d129db120e025e15cbb6434df0bf1424309c7e6133b1bf
                                                                  • Instruction Fuzzy Hash: 6601C831B0817097D610DB358841F4E37646B8D339B06265CE4089BF83CF34DA064BD5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • TlsAlloc.KERNEL32(?,?,?,?,?,?,?,00000000,00000014), ref: 6C3E29F1
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,00000014), ref: 6C3E29FF
                                                                  • DeleteCriticalSection.KERNEL32 ref: 6C3E2A43
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AllocCriticalDeleteErrorLastSection
                                                                  • String ID: $8Il$tss
                                                                  • API String ID: 941276211-1186032462
                                                                  • Opcode ID: 9015e76705a023e839cc0dbab63bc7d9641b236542ee70975c7efcf07e5f0ec1
                                                                  • Instruction ID: b8e76a6cde34510006fe8ee63a0ef1723be7c1819e4b7d1969ca7bbfc54af756
                                                                  • Opcode Fuzzy Hash: 9015e76705a023e839cc0dbab63bc7d9641b236542ee70975c7efcf07e5f0ec1
                                                                  • Instruction Fuzzy Hash: E7F0F471A002345BCF14FF79840EDDEB7B4EB45214B01025ED421A3680DF3199058F95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • EnterCriticalSection.KERNEL32(6C4E7ADC,?,?,6C42140A,6C4E6A10,6C491B8B,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000), ref: 6C43297A
                                                                  • LeaveCriticalSection.KERNEL32(6C4E7ADC,?,6C42140A,6C4E6A10,6C491B8B,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000,00000010), ref: 6C4329AD
                                                                  • SetEvent.KERNEL32(?,6C4E6A10,6C491B8B,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000,00000010,6C3E3E14,00000000), ref: 6C432A2E
                                                                  • ResetEvent.KERNEL32(?,6C4E6A10,6C491B8B,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000,00000000,00000010,6C3E3E14,00000000), ref: 6C432A3A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalEventSection$EnterLeaveReset
                                                                  • String ID: 2X@l
                                                                  • API String ID: 3553466030-2914316872
                                                                  • Opcode ID: cfae2c3c2d34411c4c1e12134eeae99c1efcb8f9a7b59ce5eb8d43946becaa3b
                                                                  • Instruction ID: 13d1c155edd085fcb0dec4dc2c0d89adb14497ca6aaa8f6c86caabd17650286a
                                                                  • Opcode Fuzzy Hash: cfae2c3c2d34411c4c1e12134eeae99c1efcb8f9a7b59ce5eb8d43946becaa3b
                                                                  • Instruction Fuzzy Hash: 9F01E43170A570AFCA65FF18E948D993BB5EB4F7227024059EA0183602CF706E018B94
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C42BF68
                                                                    • Part of subcall function 6C3F053D: __EH_prolog3.LIBCMT ref: 6C3F0544
                                                                    • Part of subcall function 6C3F057F: __EH_prolog3_GS.LIBCMT ref: 6C3F0586
                                                                    • Part of subcall function 6C42B747: __EH_prolog3_GS.LIBCMT ref: 6C42B74E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3H_prolog3_
                                                                  • String ID: DecodingLookupArray$Log2Base$hfIl$VIl
                                                                  • API String ID: 3355343447-3812364788
                                                                  • Opcode ID: 1d34ecaabed70f62a3d387c6acadd5e1cb55eb621d001247213972bba5a7692c
                                                                  • Instruction ID: 3765344d08b4a00542597bd71f4314cbdee5714098b1c84a7e50fb3e3af3c2cd
                                                                  • Opcode Fuzzy Hash: 1d34ecaabed70f62a3d387c6acadd5e1cb55eb621d001247213972bba5a7692c
                                                                  • Instruction Fuzzy Hash: 5C016DB5D0126CAADF05CFA4C846FEEBBB4AB58318F000519D404B7B80DBB45A08CFB2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,6C474CAE,?,?,6C474C76,?,00000000,?), ref: 6C474D11
                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6C474D24
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,6C474CAE,?,?,6C474C76,?,00000000,?), ref: 6C474D47
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                  • API String ID: 4061214504-1276376045
                                                                  • Opcode ID: 65d264043fd596675a106e013b38e20e848db4dfa3e2b00f98f8d84a36b76ce4
                                                                  • Instruction ID: 6e887c5c2aa19cdd39687f23e03c71d70e4040d0a4f43fe14331092afc927434
                                                                  • Opcode Fuzzy Hash: 65d264043fd596675a106e013b38e20e848db4dfa3e2b00f98f8d84a36b76ce4
                                                                  • Instruction Fuzzy Hash: CBF01235602169FBDF21EF61CA0DFED7B79EB5575AF100050F815B1550CB348A01DAA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • LeaveCriticalSection.KERNEL32(6C4E7ADC,2X@l,?,6C4329DF,00000064,?,6C4213DE,6C4E6A10,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?), ref: 6C432A6F
                                                                  • WaitForSingleObjectEx.KERNEL32(2X@l,00000000,?,6C4329DF,00000064,?,6C4213DE,6C4E6A10,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?), ref: 6C432A80
                                                                  • EnterCriticalSection.KERNEL32(6C4E7ADC,?,6C4329DF,00000064,?,6C4213DE,6C4E6A10,00000044,6C42148C,00000000,?,00000008,6C4214CC,?,?,00000000), ref: 6C432A87
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalSection$EnterLeaveObjectSingleWait
                                                                  • String ID: 2X@l$2X@l
                                                                  • API String ID: 501323975-3816884801
                                                                  • Opcode ID: 8a04ed8ecb79a385ff1106368d79074026d18619d6aa8803dc27d57f1a13d5be
                                                                  • Instruction ID: 9e0b8e542f4ed7b4628880a86be82d3f689f959b0222fc8c935d8acecb8da52b
                                                                  • Opcode Fuzzy Hash: 8a04ed8ecb79a385ff1106368d79074026d18619d6aa8803dc27d57f1a13d5be
                                                                  • Instruction Fuzzy Hash: A8E06D32649134AFCE35FE51CC0DD893F38EB0E626B024000FF08A29028EA00A118BC4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C47AAFD: RtlAllocateHeap.NTDLL(00000000,7FFFFFC4,7FFFFFC0,?,6C45D730,7FFFFFC6,7FFFFFC0,7FFFFFC0,?,?,6C3E1573,6C3E2DD3,7FFFFFC4,6C3E2DD3,6C3E2DD3), ref: 6C47AB2F
                                                                  • _free.LIBCMT ref: 6C47CBD2
                                                                  • _free.LIBCMT ref: 6C47CBE9
                                                                  • _free.LIBCMT ref: 6C47CC06
                                                                  • _free.LIBCMT ref: 6C47CC21
                                                                  • _free.LIBCMT ref: 6C47CC38
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 3033488037-0
                                                                  • Opcode ID: 3b41959da4cc36bb881be667490c71fc7b80e7dba8f003758666117673957509
                                                                  • Instruction ID: 377712f53453ffc1a5754041b0369087931e73669ed0e5b381a0620c496c026e
                                                                  • Opcode Fuzzy Hash: 3b41959da4cc36bb881be667490c71fc7b80e7dba8f003758666117673957509
                                                                  • Instruction Fuzzy Hash: 5D51B271A01204AFEB21EF29D941FEAB7F4EF45719B14066DE809E7B50E731E901CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3E23BF
                                                                  • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,?,00000000,00000000,00000028), ref: 6C3E23E4
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 6C3E2410
                                                                  • LocalFree.KERNEL32(?,00000000,-00000001,00000000,?,?,00000000,00000000), ref: 6C3E24DD
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharFormatFreeH_prolog3_LocalMessageMultiWide
                                                                  • String ID:
                                                                  • API String ID: 4049754800-0
                                                                  • Opcode ID: 0af822507af64d886c09da99fd7c8f9702046496892a44d2c2f2b743ff3e8ea5
                                                                  • Instruction ID: 0318ac1343b08176554ce7317d0e747b7f436eaf84e9d1c5865edf81ccef6272
                                                                  • Opcode Fuzzy Hash: 0af822507af64d886c09da99fd7c8f9702046496892a44d2c2f2b743ff3e8ea5
                                                                  • Instruction Fuzzy Hash: 5E4182B0A1421AAEEF08CB94C959FFEBBBCEB0D324F54411EE401B6580DB7699448F31
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3EC531
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C3EC53E
                                                                    • Part of subcall function 6C3E1E9E: std::_Lockit::_Lockit.LIBCPMT ref: 6C3E1EBA
                                                                    • Part of subcall function 6C3E1E9E: std::_Lockit::~_Lockit.LIBCPMT ref: 6C3E1ED6
                                                                  • std::_Facet_Register.LIBCPMT ref: 6C3EC58C
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C3EC5A2
                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C3EC5AF
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3_Register
                                                                  • String ID:
                                                                  • API String ID: 3498242614-0
                                                                  • Opcode ID: 8e0fc19ace708a6a918b894cf27c5768ce5292f0d5a8ead224b8947115c82a79
                                                                  • Instruction ID: 1211052ef93b2635411e6d5e9557269b6001f251e06997d45c2d4accd1e9326f
                                                                  • Opcode Fuzzy Hash: 8e0fc19ace708a6a918b894cf27c5768ce5292f0d5a8ead224b8947115c82a79
                                                                  • Instruction Fuzzy Hash: D501B931A012258FCB01DB65C400EEE7BB55F8C718F21015AD9556BBC1DB34DE498BD2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3EC6CE
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C3EC6DB
                                                                    • Part of subcall function 6C3E1E9E: std::_Lockit::_Lockit.LIBCPMT ref: 6C3E1EBA
                                                                    • Part of subcall function 6C3E1E9E: std::_Lockit::~_Lockit.LIBCPMT ref: 6C3E1ED6
                                                                  • std::_Facet_Register.LIBCPMT ref: 6C3EC729
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C3EC73F
                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C3EC74C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3_Register
                                                                  • String ID:
                                                                  • API String ID: 3498242614-0
                                                                  • Opcode ID: a57373e101864cdc171eba6433afd4c29e46951575199b65847a7f1edb2e5d1f
                                                                  • Instruction ID: 917fc0292d72ffa6f9a47049105ed57104b070c528392dd103b0c156d922c715
                                                                  • Opcode Fuzzy Hash: a57373e101864cdc171eba6433afd4c29e46951575199b65847a7f1edb2e5d1f
                                                                  • Instruction Fuzzy Hash: 5301B531A012258FCB01DB69C540FEE7BB46F4C618F21015AE955ABB81DB34DE098BE2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3EC759
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C3EC766
                                                                    • Part of subcall function 6C3E1E9E: std::_Lockit::_Lockit.LIBCPMT ref: 6C3E1EBA
                                                                    • Part of subcall function 6C3E1E9E: std::_Lockit::~_Lockit.LIBCPMT ref: 6C3E1ED6
                                                                  • std::_Facet_Register.LIBCPMT ref: 6C3EC7B4
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C3EC7CA
                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 6C3EC7D7
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3_Register
                                                                  • String ID:
                                                                  • API String ID: 3498242614-0
                                                                  • Opcode ID: 117e3cd1a95588831fa2632a70803c1da0e3d3a2f0259d4725da71e072c70817
                                                                  • Instruction ID: 05f90bbf26008e97473c125d6e460910523947527afb5d9605bbef1233d00c9f
                                                                  • Opcode Fuzzy Hash: 117e3cd1a95588831fa2632a70803c1da0e3d3a2f0259d4725da71e072c70817
                                                                  • Instruction Fuzzy Hash: 8C01B531A012258FCB01EB65D500EEE7BB46F4D628F21055AE955ABB80DF34DE098BD2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WaitForMultipleObjects.KERNEL32(00000002,6C3F1CA3,00000000,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832), ref: 6C3E2AF8
                                                                  • CloseHandle.KERNEL32(0000001E,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3E2B01
                                                                  • TerminateThread.KERNEL32(00000006,00000000,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3E2B1B
                                                                  • QueueUserAPC.KERNEL32(6C3E2B46,00000006,00000000,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3E2B28
                                                                  • WaitForSingleObject.KERNEL32(00000006,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3E2B33
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Wait$CloseHandleMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                  • String ID:
                                                                  • API String ID: 3892215915-0
                                                                  • Opcode ID: 1f94cd0d1a17f321412c4249bec1ddb4123d0704682aa0f88479b93e2473053d
                                                                  • Instruction ID: a794029dd5ba408f1410fd98a105b1e7b97936e018a9a1b4da2948ede5500de4
                                                                  • Opcode Fuzzy Hash: 1f94cd0d1a17f321412c4249bec1ddb4123d0704682aa0f88479b93e2473053d
                                                                  • Instruction Fuzzy Hash: 71014434601216AFDB20EF68CD0EE59B7F4FB1A714F104169E526D66D0DF71A9108F90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _free.LIBCMT ref: 6C485FFC
                                                                    • Part of subcall function 6C47A768: HeapFree.KERNEL32(00000000,00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000), ref: 6C47A77E
                                                                    • Part of subcall function 6C47A768: GetLastError.KERNEL32(00000000,?,6C486285,00000000,00000000,00000000,7FFFFFC6,?,6C486528,00000000,00000007,00000000,?,6C48434D,00000000,00000000), ref: 6C47A790
                                                                  • _free.LIBCMT ref: 6C48600E
                                                                  • _free.LIBCMT ref: 6C486020
                                                                  • _free.LIBCMT ref: 6C486032
                                                                  • _free.LIBCMT ref: 6C486044
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 0aa4af633fd5953d0d79233c33c059b113710ff68e6e6dd1b97e4095bc9094bf
                                                                  • Instruction ID: 9d17a294863df516a06c7bd2e8acc12da23fdefeb814cfedca8c9fae8a78859e
                                                                  • Opcode Fuzzy Hash: 0aa4af633fd5953d0d79233c33c059b113710ff68e6e6dd1b97e4095bc9094bf
                                                                  • Instruction Fuzzy Hash: 80F04F7195720897CA70FA58D5C1CC633FDAF02B5A7B55809F014D7B00C734F8808AA8
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C452446
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C45245C
                                                                    • Part of subcall function 6C45233B: ___from_strstr_to_strchr.LIBCMT ref: 6C452362
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___from_strstr_to_strchr
                                                                  • String ID: 0123456789ABCDEF$0123456789abcdef
                                                                  • API String ID: 601868998-885041942
                                                                  • Opcode ID: f1792664e0d2422ce080a188a3d71b69f7249ff27ef2cd18e03868d381fd2ff2
                                                                  • Instruction ID: 6429b5c1270af7ce93a9b3d003171194626b92be7a9de587a654ce565517d704
                                                                  • Opcode Fuzzy Hash: f1792664e0d2422ce080a188a3d71b69f7249ff27ef2cd18e03868d381fd2ff2
                                                                  • Instruction Fuzzy Hash: A951157260C3469BC324CE29C458D5BBBE1AF86659FD40A2FF0C597B04EB30E545CB92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: exceeds the maximum of $ is less than the minimum of $: IV length
                                                                  • API String ID: 2427045233-1273958906
                                                                  • Opcode ID: f7673bb3e1d645d5c3d40a2fb67a106026ef43548255b51fa39bc127270121a5
                                                                  • Instruction ID: 2d67450ddccd350fd218cc13e3b6c9eb7cd4a1653fe767437a4db0ff481fd137
                                                                  • Opcode Fuzzy Hash: f7673bb3e1d645d5c3d40a2fb67a106026ef43548255b51fa39bc127270121a5
                                                                  • Instruction Fuzzy Hash: A8519171E00358ABDB11DBA4C848FCEBBBC6F19308F1045D5E149A7741DB749A488FA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • DName::operator+.LIBCMT ref: 6C463CCC
                                                                    • Part of subcall function 6C46161F: DName::operator+=.LIBCMT ref: 6C461635
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Name::operator+Name::operator+=
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 382699925-2525777580
                                                                  • Opcode ID: 0fffc4d535c6d7df0b07352f56953c0d29bddf6d06abbbef41c6b82b16e26d77
                                                                  • Instruction ID: 1a27616834d03846237583d3309e7e445d24b45fb2372e211470cac1a5dbbfef
                                                                  • Opcode Fuzzy Hash: 0fffc4d535c6d7df0b07352f56953c0d29bddf6d06abbbef41c6b82b16e26d77
                                                                  • Instruction Fuzzy Hash: EF411BB6D0424A9ACF00CFAAD582FEEBBB5EF45308F10015AE505B7F59C7349649CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C3E5E5D
                                                                    • Part of subcall function 6C3F121D: __EH_prolog3_catch_GS.LIBCMT ref: 6C3F1227
                                                                    • Part of subcall function 6C3E57D4: __EH_prolog3_GS_align.LIBCMT ref: 6C3E57E0
                                                                    • Part of subcall function 6C3E7B7F: __EH_prolog3.LIBCMT ref: 6C3E7B86
                                                                    • Part of subcall function 6C3E2153: __EH_prolog3.LIBCMT ref: 6C3E21C4
                                                                    • Part of subcall function 6C3E2153: std::locale::_Init.LIBCPMT ref: 6C3E220E
                                                                    • Part of subcall function 6C3F07CB: DeleteFileW.KERNEL32(00000000,00000000), ref: 6C3F07F4
                                                                    • Part of subcall function 6C3EFBB3: __EH_prolog3_GS.LIBCMT ref: 6C3EFBBD
                                                                    • Part of subcall function 6C3EFBB3: DeleteFileW.KERNEL32(00000000,000000B4,6C3E5FC5,?,00000032,?,?,00000000,000000B0), ref: 6C3EFBD6
                                                                  Strings
                                                                  • <?xml version="1.0" encoding="utf-8"?><DeactivationRequest><ablock data=", xrefs: 6C3E5EDE
                                                                  • "/></DeactivationRequest>, xrefs: 6C3E5F34
                                                                  • " id=", xrefs: 6C3E5EEC
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteFileH_prolog3H_prolog3_H_prolog3_catch_$InitS_alignstd::locale::_
                                                                  • String ID: " id="$"/></DeactivationRequest>$<?xml version="1.0" encoding="utf-8"?><DeactivationRequest><ablock data="
                                                                  • API String ID: 1165413723-2913120866
                                                                  • Opcode ID: 17171531833bc5affe341792850d08a6b8a8a471108fccccb1d5343068ac41be
                                                                  • Instruction ID: 56ad8d12ada16263ad811d45acd03e6e6dd5fbf2830dea9af207a10228ded9cb
                                                                  • Opcode Fuzzy Hash: 17171531833bc5affe341792850d08a6b8a8a471108fccccb1d5343068ac41be
                                                                  • Instruction Fuzzy Hash: AA41807194026CAECF05DBA4DD81FDDBBB8AF18308F10809AE145A7681DB705B4DCFA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: operator+$Name::operator+
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 1198235884-2525777580
                                                                  • Opcode ID: 22b7fc49afd32086accdd5b44180530615de26f958bed540f111b9a51a620521
                                                                  • Instruction ID: 804716cd39a7007da4d6ce312d5dcaca73e3a7c6b74d37d5b6179188600f1928
                                                                  • Opcode Fuzzy Hash: 22b7fc49afd32086accdd5b44180530615de26f958bed540f111b9a51a620521
                                                                  • Instruction Fuzzy Hash: 93418D7190824DEFDF00CF86C845FDEBBB1AB05319F04819AE514ABE56D7B49689CF80
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 6C460914
                                                                  • CatchIt.LIBVCRUNTIME ref: 6C4609FA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CatchEncodePointer
                                                                  • String ID: MOC$RCC
                                                                  • API String ID: 1435073870-2084237596
                                                                  • Opcode ID: 253530753a0da11fa8cb5e4ecdb8987fe47402d738f145b87308b3fd564509f4
                                                                  • Instruction ID: 775bcf14ab744c1870e81a401d7ffd0065b0f3aa0684bdeb8a2a0711d25549f2
                                                                  • Opcode Fuzzy Hash: 253530753a0da11fa8cb5e4ecdb8987fe47402d738f145b87308b3fd564509f4
                                                                  • Instruction Fuzzy Hash: B9418871900289AFDF02CF95C880EEE7BB6FF08308F158199EA05A6A18D335D954CB95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C3E4B45
                                                                    • Part of subcall function 6C3F121D: __EH_prolog3_catch_GS.LIBCMT ref: 6C3F1227
                                                                  Strings
                                                                  • <?xml version="1.0" encoding="utf-8"?><ActivationRequest><ablock data=", xrefs: 6C3E4BA2
                                                                  • " id=", xrefs: 6C3E4BB0
                                                                  • "/></ActivationRequest>, xrefs: 6C3E4BF8
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_catch_
                                                                  • String ID: " id="$"/></ActivationRequest>$<?xml version="1.0" encoding="utf-8"?><ActivationRequest><ablock data="
                                                                  • API String ID: 1329019490-832694437
                                                                  • Opcode ID: a5ad431008d487daaad3ae66148dae7a0cf9b02cbccfdc6b7b8bff6b82d8c2ee
                                                                  • Instruction ID: f24ff45aa60b75de7b78f6204414714248f5ab6a46535925327a0e2ca2f641ac
                                                                  • Opcode Fuzzy Hash: a5ad431008d487daaad3ae66148dae7a0cf9b02cbccfdc6b7b8bff6b82d8c2ee
                                                                  • Instruction Fuzzy Hash: B941517190026CAECF04DBE4DC85FDDBB78AF18308F10449AE145A7681DB709B49CF62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __fprintf_l_strncpy
                                                                  • String ID: %s%s%s%s$T7Il
                                                                  • API String ID: 1857242416-3598447550
                                                                  • Opcode ID: 5a72dfc0473484eeef945a55649c82021cfdbcdf07e5e503bf6f82cb45970749
                                                                  • Instruction ID: 559f5a39ad175cd2fbe2bc9ba50a658d0e67332bf5efa79086fd4a9be0da72c1
                                                                  • Opcode Fuzzy Hash: 5a72dfc0473484eeef945a55649c82021cfdbcdf07e5e503bf6f82cb45970749
                                                                  • Instruction Fuzzy Hash: 9B31F4726092559BEF10DF5EC881F5ABBE8AFDE215F54052EE948C3A42D620DC09C7A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CertFreeCertificateContext.CRYPT32(?), ref: 6C44D930
                                                                  Strings
                                                                  • SSL: public key does not match pinned public key!, xrefs: 6C44D8EE
                                                                  • schannel: Failed to read remote certificate context: %s, xrefs: 6C44D918
                                                                  • SSL: failed retrieving public key from server certificate, xrefs: 6C44D8FD
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CertCertificateContextFree
                                                                  • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key!$schannel: Failed to read remote certificate context: %s
                                                                  • API String ID: 3080675121-1775170315
                                                                  • Opcode ID: e062a7a55f7329ecd82303714d8343d99a2d990f6bfa3b1e3b8d4aecc77e64cb
                                                                  • Instruction ID: 9c9c3d8fce347daf56316d99bbe34a16561f3656840d2d7ef1e4655c29340ce8
                                                                  • Opcode Fuzzy Hash: e062a7a55f7329ecd82303714d8343d99a2d990f6bfa3b1e3b8d4aecc77e64cb
                                                                  • Instruction Fuzzy Hash: C731A171605345AFE724DE64C884FBBB7E8EF89355F10882DE998C7A41EB70E8048692
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C41F825
                                                                    • Part of subcall function 6C41F67E: __EH_prolog3.LIBCMT ref: 6C41F685
                                                                  Strings
                                                                  • BlockPaddingScheme, xrefs: 6C41F8E3
                                                                  • StreamTransformationFilter: please use AuthenticatedEncryptionFilter and AuthenticatedDecryptionFilter for AuthenticatedSymmetricCipher, xrefs: 6C41F90F
                                                                  • XIl, xrefs: 6C41F86F
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3H_prolog3_
                                                                  • String ID: BlockPaddingScheme$StreamTransformationFilter: please use AuthenticatedEncryptionFilter and AuthenticatedDecryptionFilter for AuthenticatedSymmetricCipher$XIl
                                                                  • API String ID: 3355343447-3622851053
                                                                  • Opcode ID: 325ca3684c7ad95187d0cd532008c8d7733aa1a981d5e5a3d22e13ef37f1353e
                                                                  • Instruction ID: 606b6f5972bd74e1982da2d05f729ccd9353aa3dbdcb10fa18b412a91367bc82
                                                                  • Opcode Fuzzy Hash: 325ca3684c7ad95187d0cd532008c8d7733aa1a981d5e5a3d22e13ef37f1353e
                                                                  • Instruction Fuzzy Hash: 2B317E70901259EFDB05DFA4C884EADBBB4BF08308F14459EE4559BB60DB30E919CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • UnDecorator::getSignedDimension.LIBCMT ref: 6C466583
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Decorator::getDimensionSigned
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 2996861206-2525777580
                                                                  • Opcode ID: 87c0611fa375f021dd28aec7c4bd32ece74838e1d1d8afc0911dbdc4c01749f1
                                                                  • Instruction ID: 0ba659f54ba4a1a7017bfe23aa36ddf59a1c11c22e9d5525dce486e6fafa7d50
                                                                  • Opcode Fuzzy Hash: 87c0611fa375f021dd28aec7c4bd32ece74838e1d1d8afc0911dbdc4c01749f1
                                                                  • Instruction Fuzzy Hash: 1B319371A042099BDF14DBAAD855FEEB7F9AB49318F10011ED501F3A88DF349A09CBA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: NameName::Name::operator+shared_ptr
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 3919194733-2525777580
                                                                  • Opcode ID: ffca1a1adddb2487067aba251ceabce20176b841d833a09759386b78b3b1989d
                                                                  • Instruction ID: 08adb60b43fa2d5e8ee6d9c7ce5f5554a478bef9b4ddc959325871c1791534d1
                                                                  • Opcode Fuzzy Hash: ffca1a1adddb2487067aba251ceabce20176b841d833a09759386b78b3b1989d
                                                                  • Instruction Fuzzy Hash: 70312AB0904289DFCF08CFA9D445FAEBBB0BB05308F00859AE525A7B99D770D605CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • getpeername.WS2_32(?,?,?), ref: 6C43F99E
                                                                  • WSAGetLastError.WS2_32(?,?), ref: 6C43F9A8
                                                                    • Part of subcall function 6C451DF9: GetLastError.KERNEL32(00000000,?,?,6C43F189,00000000,?,00000100), ref: 6C451DFC
                                                                  Strings
                                                                  • getpeername() failed with errno %d: %s, xrefs: 6C43F9C1
                                                                  • ssrem inet_ntop() failed with errno %d: %s, xrefs: 6C43FA10
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$getpeername
                                                                  • String ID: getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                                                  • API String ID: 664652874-4047410615
                                                                  • Opcode ID: 7c7230ac538c5e6a8fe03a7dca2b1e3d65fd02182df8cefdf0d90f19c2c287e7
                                                                  • Instruction ID: 82070c7638bf82188842d048a7b88336c771d4144d6426d677fedcb14c41c966
                                                                  • Opcode Fuzzy Hash: 7c7230ac538c5e6a8fe03a7dca2b1e3d65fd02182df8cefdf0d90f19c2c287e7
                                                                  • Instruction Fuzzy Hash: 942165729011186BEB21DF75DC45EDE77ACEF09304F10055AF919E7641EB71AA488BE0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • FindMITargetTypeInstance.LIBVCRUNTIME ref: 6C45FD56
                                                                  • PMDtoOffset.LIBCMT ref: 6C45FD7C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: FindInstanceOffsetTargetType
                                                                  • String ID: Bad dynamic_cast!
                                                                  • API String ID: 2363274979-2956939130
                                                                  • Opcode ID: 45d967f4aee52410fe97a9e091065532b7e602f85df16cd224a6d1f5ffb9377f
                                                                  • Instruction ID: aee01aa0e9f3e781392d8c5770965450d3825af942b6cdd816c214dd4ef324c7
                                                                  • Opcode Fuzzy Hash: 45d967f4aee52410fe97a9e091065532b7e602f85df16cd224a6d1f5ffb9377f
                                                                  • Instruction Fuzzy Hash: 52212632A052059FEB04CF68C904EDA77B4FB45718B54861DEC1197B84D730E92986D2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • PutMessage, xrefs: 6C4201FF
                                                                  • TruncatedDigestSize, xrefs: 6C420217
                                                                  • FilterWithBufferedInput: invalid buffer size, xrefs: 6C4201C5
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: FilterWithBufferedInput: invalid buffer size$PutMessage$TruncatedDigestSize
                                                                  • API String ID: 2427045233-3547780871
                                                                  • Opcode ID: 9aecd0cccbb37a0e83f9361ed76364ab1317417c42d9cb84001ffa60c56f86ed
                                                                  • Instruction ID: 3b2ac7e5759e447867250dbd502f2d5fc61ce9e9da97b0b64dd36c83289d0146
                                                                  • Opcode Fuzzy Hash: 9aecd0cccbb37a0e83f9361ed76364ab1317417c42d9cb84001ffa60c56f86ed
                                                                  • Instruction Fuzzy Hash: D221C231201259AFCB04DFA0C894FE9BBB4FF48329F10025EE5595BE80DB74E959CBA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • getsockname.WS2_32(?,?,?), ref: 6C43F8C8
                                                                  • WSAGetLastError.WS2_32 ref: 6C43F8D2
                                                                    • Part of subcall function 6C451DF9: GetLastError.KERNEL32(00000000,?,?,6C43F189,00000000,?,00000100), ref: 6C451DFC
                                                                  Strings
                                                                  • getsockname() failed with errno %d: %s, xrefs: 6C43F8EE
                                                                  • ssloc inet_ntop() failed with errno %d: %s, xrefs: 6C43F933
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$getsockname
                                                                  • String ID: getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                                                                  • API String ID: 3066790409-2605427207
                                                                  • Opcode ID: 1189508aa9e3d9b8cf0afe8b79f8b3f3a1d1bff453325880f6d5d6cc352b2fc9
                                                                  • Instruction ID: a124f6f07657bbbc612f16adffc4f419a7ee5137627a0f1f5602013d0520bbe6
                                                                  • Opcode Fuzzy Hash: 1189508aa9e3d9b8cf0afe8b79f8b3f3a1d1bff453325880f6d5d6cc352b2fc9
                                                                  • Instruction Fuzzy Hash: ED214D76901229BBDF11DE669C45EDA776CEF49314F50049AF908E3641EF30AE488BE0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C44B449
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___from_strstr_to_strchr
                                                                  • String ID: %s%s%s:%d$Host$Host: %s
                                                                  • API String ID: 601868998-4134764909
                                                                  • Opcode ID: 56b9bb0099b5161d71affb72b80d2d4a9bfa67d6c46f7f22053d2c1ffc377d73
                                                                  • Instruction ID: ee1e8d86973f69eb30912397ae7b7aeaf46abcd378c6a5bd4e11d946af10df29
                                                                  • Opcode Fuzzy Hash: 56b9bb0099b5161d71affb72b80d2d4a9bfa67d6c46f7f22053d2c1ffc377d73
                                                                  • Instruction Fuzzy Hash: B51121722059246FFB02DE599C41E9B3BACDF862A5B24C02AFD08DBB01F631CC1186E0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __fprintf_l
                                                                  • String ID: PROXY %s %s %s %i %i$TCP4$TCP6
                                                                  • API String ID: 3906573944-1048566547
                                                                  • Opcode ID: 5525e4633421e455701a6d47d9a055dfdcec3e702cf4faf06d4d182dc94a1bdf
                                                                  • Instruction ID: c2f00ade4bc8f73a4c24d7a48f51a9b8a0271075419e15b8793c9d7566f2ff0a
                                                                  • Opcode Fuzzy Hash: 5525e4633421e455701a6d47d9a055dfdcec3e702cf4faf06d4d182dc94a1bdf
                                                                  • Instruction Fuzzy Hash: 46214F72900658AEEB11DFA8CC44EEB7BFCEB09204F14452BE959D3641EB30E549CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: byte digest to $ bytes$HashTransformation: can't truncate a
                                                                  • API String ID: 2427045233-1139078987
                                                                  • Opcode ID: 2c503902c78c1526cebe13a3bafc0a4078f7bfa0e915e9d66284d363f2f821b4
                                                                  • Instruction ID: 9bd7bb71392c3b9cdd9ee7d04d25db4ff23499f899160ff303da99b9cfa4ed3a
                                                                  • Opcode Fuzzy Hash: 2c503902c78c1526cebe13a3bafc0a4078f7bfa0e915e9d66284d363f2f821b4
                                                                  • Instruction Fuzzy Hash: D11190B19012A8BADB11D7E0CC48FCEBB7C6F08348F0405A9E548B7741DB749A088BA6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3EF295
                                                                    • Part of subcall function 6C3EF39C: __EH_prolog3_GS.LIBCMT ref: 6C3EF3A6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: Cause unknown: error caused by bad argument with value %1%$Error in function $Unknown function operating on type %1%
                                                                  • API String ID: 2427045233-2592140482
                                                                  • Opcode ID: 1d91ee1d7a20401f44cb4964c6f3cb5f3c5aa03ff5b1b243083c80afa8d516f1
                                                                  • Instruction ID: bd5f75c258350a65b7a94a87d0775c2d0453d031a55dc6683d96a5050d0503b0
                                                                  • Opcode Fuzzy Hash: 1d91ee1d7a20401f44cb4964c6f3cb5f3c5aa03ff5b1b243083c80afa8d516f1
                                                                  • Instruction Fuzzy Hash: 45116D36D01218EACF05DBE0D854EDEB7B89F28228F20411AD456B7A50DF309A0DCF62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • Cryptographic algorithms are disabled before the power-up self tests are performed., xrefs: 6C40C290
                                                                  • 2X@l, xrefs: 6C40C2C1
                                                                  • Cryptographic algorithms are disabled after a power-up self test failed., xrefs: 6C40C256
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: 2X@l$Cryptographic algorithms are disabled after a power-up self test failed.$Cryptographic algorithms are disabled before the power-up self tests are performed.
                                                                  • API String ID: 2427045233-483205406
                                                                  • Opcode ID: d8f63f8d0953679446ed1ddff76c5757eb263c88dd84a270e5f1074ae34d844d
                                                                  • Instruction ID: d4684551e5dc538b6542e153efe7b4a221efadcd664cbc00d9e1ad04f031dc76
                                                                  • Opcode Fuzzy Hash: d8f63f8d0953679446ed1ddff76c5757eb263c88dd84a270e5f1074ae34d844d
                                                                  • Instruction Fuzzy Hash: C0115E71901228AACB10EBA0C840FDD7B78AF1926CF04006AE444A7F40DB759A4DCBE2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C42128E
                                                                  • GetLastError.KERNEL32(00000010,00000080,6C421234,0000000F,BCryptOpenAlgorithmProvider,?,RNG,Microsoft Primitive Provider,00000000,00000044,6C421260,00000001,?,?,6C42147A,00000008), ref: 6C4212A6
                                                                    • Part of subcall function 6C40B184: __EH_prolog3_GS.LIBCMT ref: 6C40B18B
                                                                    • Part of subcall function 6C3E2E5F: __EH_prolog3.LIBCMT ref: 6C3E2E66
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$ErrorH_prolog3Last
                                                                  • String ID: operation failed with error $OS_Rng:
                                                                  • API String ID: 1247511005-700108173
                                                                  • Opcode ID: 6838abef1177f57c5aa05fad3e6a7da3eb3f07bf5f694efcbd43663c21a0b578
                                                                  • Instruction ID: 18796a8497ab9c29b87fd9a37d93a13c9d7fd54304e0b450679120a5e3e8f278
                                                                  • Opcode Fuzzy Hash: 6838abef1177f57c5aa05fad3e6a7da3eb3f07bf5f694efcbd43663c21a0b578
                                                                  • Instruction Fuzzy Hash: 38115171804278AADF15DBA0CD44FCEBF7C6F18208F10446AA585B7641DF754A4DCFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: (DIl$pRIl$RIl
                                                                  • API String ID: 431132790-3051331711
                                                                  • Opcode ID: 1b8e4abc7bf86181319dfb3d7292ec6a2aa95b533b5f2089fefd7878a8fcf376
                                                                  • Instruction ID: 5df6c79d93cd017b7571cfebe7130a4a6923b2bda36e8bf9270d623948620f85
                                                                  • Opcode Fuzzy Hash: 1b8e4abc7bf86181319dfb3d7292ec6a2aa95b533b5f2089fefd7878a8fcf376
                                                                  • Instruction Fuzzy Hash: AD213AB0601666EEC704CFA4C181FDCFB60BF15205F90865EC56827B50C770AA29DBE2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3Mtx_init_in_situMtx_unlock
                                                                  • String ID: tzNl
                                                                  • API String ID: 1360302138-3061926569
                                                                  • Opcode ID: 294c732f8b53769fbd7ccda844ca3c82f50c4288484a96725740b0e23802730f
                                                                  • Instruction ID: cbb81f6ecfc98d8bb24c35e15e3a76b1c390f1b51cec3aba0a85634cb99476da
                                                                  • Opcode Fuzzy Hash: 294c732f8b53769fbd7ccda844ca3c82f50c4288484a96725740b0e23802730f
                                                                  • Instruction Fuzzy Hash: 5901C431B4C1709BDB11DB2A8881F4D3364AB8E729F1A265DE4089BF83CF34990647C5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • DeleteCriticalSection.KERNEL32(?,9634BA50,$8Il,?,00000000,6C48AB06,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044), ref: 6C3F1D1D
                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,6C48AB06,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010), ref: 6C3F1D32
                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,6C48AB06,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010), ref: 6C3F1D45
                                                                    • Part of subcall function 6C3F1F8C: PostQueuedCompletionStatus.KERNEL32(?,00000001,00000001,00000001,?,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F), ref: 6C3F1FBA
                                                                    • Part of subcall function 6C3F1F8C: GetLastError.KERNEL32(?,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3F1FC4
                                                                    • Part of subcall function 6C3E2ACF: WaitForMultipleObjects.KERNEL32(00000002,6C3F1CA3,00000000,000000FF,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832), ref: 6C3E2AF8
                                                                    • Part of subcall function 6C3E2ACF: CloseHandle.KERNEL32(0000001E,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3E2B01
                                                                    • Part of subcall function 6C3E2ACF: TerminateThread.KERNEL32(00000006,00000000,?,6C3F1CA3,?,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832,?), ref: 6C3E2B1B
                                                                    • Part of subcall function 6C3F2A63: CloseHandle.KERNEL32(?,00000000,00000000,6C3F1C83,00000000,00000000,00000000,?,?,?,00000000,6C3F2640,00000044,6C40527F,00000010,6C405832), ref: 6C3F2A70
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$CompletionCriticalDeleteErrorLastMultipleObjectsPostQueuedSectionStatusTerminateThreadWait
                                                                  • String ID: $8Il
                                                                  • API String ID: 1875059124-1104382562
                                                                  • Opcode ID: 67eadc5b4c2600ac9057001816eb025383bc4e441ebe67963f42f57872bcf99d
                                                                  • Instruction ID: a5fdda100327afa028ebb000bc665eb5acda7ecd3955ff1711c6d3ff70d1effc
                                                                  • Opcode Fuzzy Hash: 67eadc5b4c2600ac9057001816eb025383bc4e441ebe67963f42f57872bcf99d
                                                                  • Instruction Fuzzy Hash: 40117076200641DBCB21EF14D945BEAB7F5FF45618F51092AD49283EA0CB76B809CF51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C42B74E
                                                                    • Part of subcall function 6C42B627: __EH_prolog3_GS.LIBCMT ref: 6C42B631
                                                                    • Part of subcall function 6C41FE03: __EH_prolog3_GS.LIBCMT ref: 6C41FE0D
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C42B80F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: BaseN_Decoder$DecodingLookupArray$Log2Base
                                                                  • API String ID: 2427045233-2220300394
                                                                  • Opcode ID: c9e4f495d1b68d12f4a7ddcb794765da19bb4f5d9e23edf9f72cc54987eb9e60
                                                                  • Instruction ID: 16a7d47115ed313501268d9861ba749a81fced6aff62d5a9ffcef626cb36870b
                                                                  • Opcode Fuzzy Hash: c9e4f495d1b68d12f4a7ddcb794765da19bb4f5d9e23edf9f72cc54987eb9e60
                                                                  • Instruction Fuzzy Hash: 9401B5B2E150119BDB44CF14CC91FAA3396ABD8339F184609D85ACBF85D73DD8088B95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: EMSA-PKCS1-v1_5$RSA$SHA-1
                                                                  • API String ID: 431132790-2435663846
                                                                  • Opcode ID: c08010ae1b9c7349607bcacf8da9e70a0bcea508b32c490441318ed79ace4658
                                                                  • Instruction ID: 5bcc455b87159a6dc4b2a1fc8deee4cce2e7b8bf77d3326e322e9cec28097efe
                                                                  • Opcode Fuzzy Hash: c08010ae1b9c7349607bcacf8da9e70a0bcea508b32c490441318ed79ace4658
                                                                  • Instruction Fuzzy Hash: B1115E78804268BACB05E7A0CD54FCE7B7C5F2820CF508456A486B7A61EF756B4D8F62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3E8257
                                                                    • Part of subcall function 6C40C21A: __EH_prolog3_GS.LIBCMT ref: 6C40C224
                                                                    • Part of subcall function 6C3E34D1: __EH_prolog3.LIBCMT ref: 6C3E34D8
                                                                    • Part of subcall function 6C3EC046: __EH_prolog3.LIBCMT ref: 6C3EC04D
                                                                    • Part of subcall function 6C420F1C: __EH_prolog3_GS.LIBCMT ref: 6C420F23
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_
                                                                  • String ID: (DIl$HMIl$InputBuffer
                                                                  • API String ID: 4240126716-1608217456
                                                                  • Opcode ID: 4c79712a13af9b7006987d49e150ea9b5e1479bc90c87f00adba7af60105f6a8
                                                                  • Instruction ID: bddd45999083c09a272b7d6b0057f27727d9728680df5fa1d3ab1fc7935aab45
                                                                  • Opcode Fuzzy Hash: 4c79712a13af9b7006987d49e150ea9b5e1479bc90c87f00adba7af60105f6a8
                                                                  • Instruction Fuzzy Hash: 521182B1A01215AEDB11DFA4C812FEEFBB4AF58318F40454DD45567FD0CB74560ACBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: MGF1$OAEP-$SHA-1
                                                                  • API String ID: 431132790-81113173
                                                                  • Opcode ID: 40d558a50d865d43ac405ce768d57e4e90dde64b1bb87ea2104d868b50103570
                                                                  • Instruction ID: 9c0377be72719e59a96758891a3f35afbf92e106ad7dedca38f198130c50b9b1
                                                                  • Opcode Fuzzy Hash: 40d558a50d865d43ac405ce768d57e4e90dde64b1bb87ea2104d868b50103570
                                                                  • Instruction Fuzzy Hash: 2B017C78800268BACB05D7A0CD50FDEBB7C5F2820CF104456A4467BA61EB756B0D8FA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C431FF5
                                                                  • QueryPerformanceCounter.KERNEL32(00000000,00000064,6C427D8E), ref: 6C432006
                                                                  • GetLastError.KERNEL32(0000000A), ref: 6C43201E
                                                                  Strings
                                                                  • Timer: QueryPerformanceCounter failed with error , xrefs: 6C432036
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CounterErrorH_prolog3_LastPerformanceQuery
                                                                  • String ID: Timer: QueryPerformanceCounter failed with error
                                                                  • API String ID: 73482181-4075696077
                                                                  • Opcode ID: ac825f781b577e5d99586a9fb9bb31cc81c32f0b65269e5f48a9acf2014cb786
                                                                  • Instruction ID: 82175cee3b948da9f96c70e61ddf36d912b5699387c27f96d2f44f5cbc5ec3bf
                                                                  • Opcode Fuzzy Hash: ac825f781b577e5d99586a9fb9bb31cc81c32f0b65269e5f48a9acf2014cb786
                                                                  • Instruction Fuzzy Hash: E5013171D40318ABEF10EBE0CC49FDEB77CAF14309F504159A614AB642DB799149CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C40E9FB
                                                                    • Part of subcall function 6C40C21A: __EH_prolog3_GS.LIBCMT ref: 6C40C224
                                                                    • Part of subcall function 6C3E3524: __EH_prolog3.LIBCMT ref: 6C3E352B
                                                                    • Part of subcall function 6C3EC046: __EH_prolog3.LIBCMT ref: 6C3EC04D
                                                                    • Part of subcall function 6C420F1C: __EH_prolog3_GS.LIBCMT ref: 6C420F23
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_
                                                                  • String ID: (DIl$HMIl$InputBuffer
                                                                  • API String ID: 4240126716-1608217456
                                                                  • Opcode ID: 6f805a3db982bfb548caa9f525caa34afb15fedbbad2aa01975f4ce58227a73f
                                                                  • Instruction ID: 2ffd253fd48dd14e4562099d125cdbb91980555322edbbad7b22153d87b86cdb
                                                                  • Opcode Fuzzy Hash: 6f805a3db982bfb548caa9f525caa34afb15fedbbad2aa01975f4ce58227a73f
                                                                  • Instruction Fuzzy Hash: 2B018175901318AEDB11DFA4C842EEEFB78AF58268F00454DA49567B90CB759B088BA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3E1D87
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C3E1D94
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 6C3E1DD1
                                                                    • Part of subcall function 6C406A97: _Yarn.LIBCPMT ref: 6C406AB6
                                                                    • Part of subcall function 6C406A97: _Yarn.LIBCPMT ref: 6C406ADA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Yarnstd::_$H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_
                                                                  • String ID: bad locale name
                                                                  • API String ID: 482894088-1405518554
                                                                  • Opcode ID: 80d953112c5dd847b62097ce36402827db6654e4d8f29b76d1d5980b51f3d3e1
                                                                  • Instruction ID: b73f574de98e88b52650e5eb3850e4dbbeef2fa5370d67bb7bd42e28836bdd45
                                                                  • Opcode Fuzzy Hash: 80d953112c5dd847b62097ce36402827db6654e4d8f29b76d1d5980b51f3d3e1
                                                                  • Instruction Fuzzy Hash: FC0144719457549EC721CF6A848098AFBE07F19204750896FD48ED3F01D730E544CBA9
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C42E20A
                                                                    • Part of subcall function 6C3F053D: __EH_prolog3.LIBCMT ref: 6C3F0544
                                                                    • Part of subcall function 6C3F057F: __EH_prolog3_GS.LIBCMT ref: 6C3F0586
                                                                    • Part of subcall function 6C42B747: __EH_prolog3_GS.LIBCMT ref: 6C42B74E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3H_prolog3_
                                                                  • String ID: DecodingLookupArray$Log2Base$VIl
                                                                  • API String ID: 3355343447-3285489691
                                                                  • Opcode ID: e41b5e62ba7ab1ff9e02727920c1a92464768c70085be91fb378f2e65f9ab14e
                                                                  • Instruction ID: 74889344893ba284ba5546d94bc06982e7fc49e03d05cd493ad928e85230a28e
                                                                  • Opcode Fuzzy Hash: e41b5e62ba7ab1ff9e02727920c1a92464768c70085be91fb378f2e65f9ab14e
                                                                  • Instruction Fuzzy Hash: B6016DB5D0126CAADF05CFA4C846FEEBBB4AB58314F000519D405B7B80DBB45A08CFB6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3E3431
                                                                    • Part of subcall function 6C45E1AA: KiUserExceptionDispatcher.NTDLL(E06D7363,00000001,00000003,6C3E165C,00000000,6C3E2DF5,?,6C3E165C,00000008,6C4DC3E0,00000008), ref: 6C45E20A
                                                                  • __EH_prolog3.LIBCMT ref: 6C3E3469
                                                                  Strings
                                                                  • PK_MessageAccumulator: TruncatedFinal() should not be called, xrefs: 6C3E346E
                                                                  • PK_MessageAccumulator: DigestSize() should not be called, xrefs: 6C3E3436
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$DispatcherExceptionUser
                                                                  • String ID: PK_MessageAccumulator: DigestSize() should not be called$PK_MessageAccumulator: TruncatedFinal() should not be called
                                                                  • API String ID: 3933909293-1268710280
                                                                  • Opcode ID: b3bbcbcef03f3dfc76f76f7f73caa1888ddd95bc7c83b2d447243951ef0b7950
                                                                  • Instruction ID: 8c8643f608b9db8043619102c5ba843b1402b972e61af93e80f046ed8cf19ee8
                                                                  • Opcode Fuzzy Hash: b3bbcbcef03f3dfc76f76f7f73caa1888ddd95bc7c83b2d447243951ef0b7950
                                                                  • Instruction Fuzzy Hash: D6F01D71D1110CABDB00EBD0C954FEDB3B9AF18209F604496E211B7D90DB79AE0DCBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,9634BA50,00000000,00000000,6C48B610,000000FF,?,6C3F7190), ref: 6C40630C
                                                                  • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 6C406318
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: RtlGetVersion$ntdll.dll
                                                                  • API String ID: 1646373207-1489217083
                                                                  • Opcode ID: 64d573094c25024f8ce80569e28a1376acc2ca1215fff5186f39288d02a37710
                                                                  • Instruction ID: dd589eb6d31cc910dd3a2434fb24cfceeb8a937369362b59c6c08bd058d4f653
                                                                  • Opcode Fuzzy Hash: 64d573094c25024f8ce80569e28a1376acc2ca1215fff5186f39288d02a37710
                                                                  • Instruction Fuzzy Hash: B0E09276604594BFCB10EF94CC0AF5A77BCF70A610F000A2AF912E3B40EB35A9008791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3F2416
                                                                  • GetProcessHeap.KERNEL32(00000000,0000001E,0000000C,6C3F319A,00000044,0000000C,6C3F2720,00000044,6C40527F,00000010,6C405832,?), ref: 6C3F2420
                                                                  • HeapAlloc.KERNEL32(00000000), ref: 6C3F2427
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$AllocH_prolog3Process
                                                                  • String ID: ))?l
                                                                  • API String ID: 3174185902-3610789256
                                                                  • Opcode ID: 5aa3dabb180e0614baa04f9426b8c2c22f5597e408d16573029b61fc109e4b83
                                                                  • Instruction ID: f4c6f039f97d4d9bb823b892a9f05d4aaac2d4b97df65e47a7bc56247f401dd9
                                                                  • Opcode Fuzzy Hash: 5aa3dabb180e0614baa04f9426b8c2c22f5597e408d16573029b61fc109e4b83
                                                                  • Instruction Fuzzy Hash: 0CD082B1601224AAEF10EFA0880DF9C36386B6421AF400848A69886980CB22C4098A62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(KERNEL32.DLL,SetWaitableTimerEx,6C409320,00000000,?,00000000,00000000,00000000,00000000,00000020,?,1A85EC53), ref: 6C408B00
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 6C408B07
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: KERNEL32.DLL$SetWaitableTimerEx
                                                                  • API String ID: 1646373207-2877992516
                                                                  • Opcode ID: 8db9bfed26ecfff91ba4f63eb67641ad0c0269c4a94ae4ba222c7828486f6f90
                                                                  • Instruction ID: 12fab6869a7f5e0a4178e1834e1ccf10a31861114b33569b35e3c104b601ccc2
                                                                  • Opcode Fuzzy Hash: 8db9bfed26ecfff91ba4f63eb67641ad0c0269c4a94ae4ba222c7828486f6f90
                                                                  • Instruction Fuzzy Hash: BAD0C9B07011249B8F44EF7A881DF157BF8A64B6027114539B60AD2B02DB24D901CF01
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _strrchr
                                                                  • String ID:
                                                                  • API String ID: 3213747228-0
                                                                  • Opcode ID: 7bf2dfc772259a152305659183d048eb44d6cd1a624ac17f33ef4d8bd0a42ea9
                                                                  • Instruction ID: be4766d2c42bab18e96dc876c9a1f81dc3fa290b6e32acb45e5d23f04f43e8a8
                                                                  • Opcode Fuzzy Hash: 7bf2dfc772259a152305659183d048eb44d6cd1a624ac17f33ef4d8bd0a42ea9
                                                                  • Instruction Fuzzy Hash: 56B13871D052859FDB21CF28C880FEEBBF5EF45358F1541A9E844ABB41D6388906CBB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __WSAFDIsSet.WS2_32(000000FF,?), ref: 6C44A8B8
                                                                  • __WSAFDIsSet.WS2_32(000000FF,?), ref: 6C44A8F0
                                                                  • __WSAFDIsSet.WS2_32(000000FF,?), ref: 6C44A90E
                                                                  • WSASetLastError.WS2_32(00002726), ref: 6C44A962
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1452528299-0
                                                                  • Opcode ID: af09c4b411efda71fdac451f34d1498b7b778a3edc158668b0920f3ba08ea30f
                                                                  • Instruction ID: 20dd83e8a82981f2001e96af090819a504a9750083cd06623c169905b9adf182
                                                                  • Opcode Fuzzy Hash: af09c4b411efda71fdac451f34d1498b7b778a3edc158668b0920f3ba08ea30f
                                                                  • Instruction Fuzzy Hash: 30715F3560A3458BF735CF198480EAAB2F9EF88715F30893DE895C2690E775C5428792
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AdjustPointer
                                                                  • String ID:
                                                                  • API String ID: 1740715915-0
                                                                  • Opcode ID: db8ef44a9226cf6af09bc5c7bef159fcbcf337a8bd8e8357752cf57241e2e9d9
                                                                  • Instruction ID: d03e5f190baacb2ffc40520ceaabd3cf4015873984d8c01ab7472bcf69409935
                                                                  • Opcode Fuzzy Hash: db8ef44a9226cf6af09bc5c7bef159fcbcf337a8bd8e8357752cf57241e2e9d9
                                                                  • Instruction Fuzzy Hash: D351E4726057869FEB25CF16D880FAA73A4EF4431AF20452DDC1597F98D731E881CB94
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: EqualOffsetTypeids
                                                                  • String ID:
                                                                  • API String ID: 1707706676-0
                                                                  • Opcode ID: 7eba31bc2cdc899ce0d39c1d43e6a64f477002fbbb014f00cff841445868ded1
                                                                  • Instruction ID: 5fe07260a397d9ed1c0e2cec38e6119e0d237fce58ba68ccc677e083e6761835
                                                                  • Opcode Fuzzy Hash: 7eba31bc2cdc899ce0d39c1d43e6a64f477002fbbb014f00cff841445868ded1
                                                                  • Instruction Fuzzy Hash: 7451CD359062098FEB06CF68C480EDEBBF5FF05399F5005A9DC50A7750D332AA15CB92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c8ea5557a13386dfa324cf61dd1a2820da5e42b6dd3871811d6631c79094b367
                                                                  • Instruction ID: 533465e8db8fc2b1c4145554a5f3d2b8d859e8bbe56e68851fba81aeebfc0976
                                                                  • Opcode Fuzzy Hash: c8ea5557a13386dfa324cf61dd1a2820da5e42b6dd3871811d6631c79094b367
                                                                  • Instruction Fuzzy Hash: 5941E9B5A01754AFD724DF78C841FDABBA9EB84714F10852EE005DBF80D376A5458BD0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • _free.LIBCMT ref: 6C483CBA
                                                                  • _free.LIBCMT ref: 6C483CE3
                                                                  • SetEndOfFile.KERNEL32(00000000,6C4783DA,00000000,?,?,?,?,?,?,?,?,6C4783DA,?,00000000), ref: 6C483D15
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,6C4783DA,?,00000000), ref: 6C483D31
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFileLast
                                                                  • String ID:
                                                                  • API String ID: 1547350101-0
                                                                  • Opcode ID: e3da0217abf27adf2543aaaaebb676b017e556db25c652bff40dab563fc1001c
                                                                  • Instruction ID: dd83a90b5dccb28d18882208ec4e0df1d141e9ddb09e6524d0d6cdac92239967
                                                                  • Opcode Fuzzy Hash: e3da0217abf27adf2543aaaaebb676b017e556db25c652bff40dab563fc1001c
                                                                  • Instruction Fuzzy Hash: 04410477A426009BDB11DFA98C41FCD3BB5EF45329F240519F924EBB90EB34C84947A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C46B7CE: _free.LIBCMT ref: 6C46B7DC
                                                                    • Part of subcall function 6C481F5F: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,6C47A6A9,0000FDE9,00000000,?,?,?,6C47A422,0000FDE9,00000000,?), ref: 6C48200B
                                                                  • GetLastError.KERNEL32 ref: 6C482640
                                                                  • __dosmaperr.LIBCMT ref: 6C482647
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 6C482686
                                                                  • __dosmaperr.LIBCMT ref: 6C48268D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                                  • String ID:
                                                                  • API String ID: 167067550-0
                                                                  • Opcode ID: 940c5b67d6b9746ab352fc4be7e9cac58715f8a2fe1a1c3acd89d1375da94b38
                                                                  • Instruction ID: 10591a76f2ab14b873cbb320107c6008ecb46a9216d9358a78677eac3a4cb91b
                                                                  • Opcode Fuzzy Hash: 940c5b67d6b9746ab352fc4be7e9cac58715f8a2fe1a1c3acd89d1375da94b38
                                                                  • Instruction Fuzzy Hash: 0021C4B1605616BF9721DF66C884D9AB7ACFF00369704461AE925A7F45EF30EC6087D0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: String$AllocFree
                                                                  • String ID:
                                                                  • API String ID: 344208780-0
                                                                  • Opcode ID: 0d8f5730de88aff3039b0231c6f3819392525569a696be458e7671d43b5935dd
                                                                  • Instruction ID: 29f31000950a545dc9af5ac026e144ff4b898dace6598161cfb32ec3f63e3145
                                                                  • Opcode Fuzzy Hash: 0d8f5730de88aff3039b0231c6f3819392525569a696be458e7671d43b5935dd
                                                                  • Instruction Fuzzy Hash: DE21E630605307CBD714DE68C84875A77A9FF44318F208E29F471D6AA4EB72D81E8F55
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9bb271aed9e7c7e92a8884ab18579bd4f98f4e55404ec86de4f470a882b3dd42
                                                                  • Instruction ID: 8502845a60926fffc8adc7e49dc9b980027b76cb124202a5d61f4f16c5f35b09
                                                                  • Opcode Fuzzy Hash: 9bb271aed9e7c7e92a8884ab18579bd4f98f4e55404ec86de4f470a882b3dd42
                                                                  • Instruction Fuzzy Hash: 7B21B0B1604219AF9720DFA68DA1DEA776CEF0136D7054619E92CE7A50EB30EC5087F0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C408E86
                                                                  • CloseHandle.KERNEL32(?), ref: 6C408EF1
                                                                    • Part of subcall function 6C409095: ResetEvent.KERNEL32(00000000,9634BA50,?,?,C15730E2,6C48AB06,000000FF,?,6C408EC4,?,C15730E2), ref: 6C4090F0
                                                                  • CloseHandle.KERNEL32(?), ref: 6C408F35
                                                                  • WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000), ref: 6C408F4D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$EventH_prolog3_catch_ObjectResetSingleWait
                                                                  • String ID:
                                                                  • API String ID: 3878641272-0
                                                                  • Opcode ID: 7c8eb286ebaa5d614b38fac64b5e96e201536ccebdb1cefd0a682b2826376257
                                                                  • Instruction ID: 73a9591c3ae1a49e4ef10fd3014fa5971f2dc34184773c06b673cc7a91cabd9c
                                                                  • Opcode Fuzzy Hash: 7c8eb286ebaa5d614b38fac64b5e96e201536ccebdb1cefd0a682b2826376257
                                                                  • Instruction Fuzzy Hash: 96214F70E493189FDF10CFA5CA44E9DBBB9AF15325F20452EE428EBB81C7319945CB94
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000006,00000000,0000000A,6C46898C,00000000,00000000,00000006,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B171
                                                                  • _free.LIBCMT ref: 6C47B1CE
                                                                  • _free.LIBCMT ref: 6C47B204
                                                                  • SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C47B20F
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast_free
                                                                  • String ID:
                                                                  • API String ID: 2283115069-0
                                                                  • Opcode ID: 04e0d6163bca05d41d1b0fc217ad3a41a0def1a1e1643844a3a59b90ca8e9d54
                                                                  • Instruction ID: 54167d0c539ccb7ae45a1f4174160e5a275b295245762ab961bda2c2d58401b9
                                                                  • Opcode Fuzzy Hash: 04e0d6163bca05d41d1b0fc217ad3a41a0def1a1e1643844a3a59b90ca8e9d54
                                                                  • Instruction Fuzzy Hash: 3111C6727056457BDA31F9B94D84FDB227ADBC63BEB290228F12496FE4DF21C80941B0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLastError.KERNEL32(7FFFFFC4,7FFFFFC4,7FFFFFC6,6C46A39E,6C47AB40,7FFFFFC0,?,6C45D730,7FFFFFC6,7FFFFFC0,7FFFFFC0,?,?,6C3E1573,6C3E2DD3,7FFFFFC4), ref: 6C47B2C8
                                                                  • _free.LIBCMT ref: 6C47B325
                                                                  • _free.LIBCMT ref: 6C47B35B
                                                                  • SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6C45D730,7FFFFFC6,7FFFFFC0,7FFFFFC0,?,?,6C3E1573,6C3E2DD3,7FFFFFC4,6C3E2DD3,6C3E2DD3), ref: 6C47B366
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast_free
                                                                  • String ID:
                                                                  • API String ID: 2283115069-0
                                                                  • Opcode ID: 0ff67059348b5a56ca3ca3e29d6d47211b8dd4fe5703e63b533331a61c082098
                                                                  • Instruction ID: 4a1b8c14e684ad6eb7655d3e349310cdf531385227bb9ab550a1dd9f04a5c54e
                                                                  • Opcode Fuzzy Hash: 0ff67059348b5a56ca3ca3e29d6d47211b8dd4fe5703e63b533331a61c082098
                                                                  • Instruction Fuzzy Hash: 5011A9723555006BDB31F9B94D88FDB227AABC67BEB290229F12492FE0DF21C80541B0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetFullPathNameW.KERNEL32(?,00000000,?,00000000,6C47F37B,00000000,?,6C487C7A,00000000,00000000,6C47F37B,?,?,00000000,00000000,00000001), ref: 6C47F295
                                                                  • GetLastError.KERNEL32(?,6C487C7A,00000000,00000000,6C47F37B,?,?,00000000,00000000,00000001,00000000,00000000,?,6C47F37B,00000000,00000104), ref: 6C47F29F
                                                                  • __dosmaperr.LIBCMT ref: 6C47F2A6
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFullLastNamePath__dosmaperr
                                                                  • String ID:
                                                                  • API String ID: 2398240785-0
                                                                  • Opcode ID: e79ac5181d416ff40cb1ca63c915f6c267bbefab565c22c89d64cda188767b7b
                                                                  • Instruction ID: 7bc4cef1a3c9225e38d3760cbcbe76422e5ff9e7fc4d56971c7df6dba501f736
                                                                  • Opcode Fuzzy Hash: e79ac5181d416ff40cb1ca63c915f6c267bbefab565c22c89d64cda188767b7b
                                                                  • Instruction Fuzzy Hash: ECF06236601525BBAB20DFA6C808DCAFF79FF553653108515E529C7D10DB32D862C7E0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetFullPathNameW.KERNEL32(?,00000000,?,00000000,6C47F37B,00000000,?,6C487CEF,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 6C47F22C
                                                                  • GetLastError.KERNEL32(?,6C487CEF,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,6C47F37B,00000000,00000104,?), ref: 6C47F236
                                                                  • __dosmaperr.LIBCMT ref: 6C47F23D
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFullLastNamePath__dosmaperr
                                                                  • String ID:
                                                                  • API String ID: 2398240785-0
                                                                  • Opcode ID: 2b91fef40f297653947e8204fee571953cd743a23ffcb74bf69e3a8c7b8af33e
                                                                  • Instruction ID: f9bcc54e5ccad860cf0eb55ce1e06f2a94188c679fdd4437e0566ba476bf14ca
                                                                  • Opcode Fuzzy Hash: 2b91fef40f297653947e8204fee571953cd743a23ffcb74bf69e3a8c7b8af33e
                                                                  • Instruction Fuzzy Hash: FAF0FF35605525BB9E209FA6C808C8ABF7DFF456653118515E518C7A20DB32D96287E0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3F1A8C
                                                                  • SetEvent.KERNEL32(?,00000000), ref: 6C3F1A9E
                                                                  • SetEvent.KERNEL32(?), ref: 6C3F1AB7
                                                                  • SleepEx.KERNEL32(000000FF,00000001), ref: 6C3F1AC1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Event$H_prolog3Sleep
                                                                  • String ID: $8Il$thread$thread.entry_event$thread.exit_event
                                                                  • API String ID: 1172963375-2471605969
                                                                  • Opcode ID: bb5b237e82f8870e393906b71534fd6ccc414f3213720f159491d7155c3b7ca8
                                                                  • Instruction ID: 733f7da8bb8dac04b516244ad885679d4f1bfa4cc6de871cc90e848c746ea919
                                                                  • Opcode Fuzzy Hash: bb5b237e82f8870e393906b71534fd6ccc414f3213720f159491d7155c3b7ca8
                                                                  • Instruction Fuzzy Hash: 36F0F835300220AFCF00EF60C89DF987B71AF5A315F0081A4AA099F291CB749844CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C42CFD1
                                                                    • Part of subcall function 6C42C58A: __EH_prolog3.LIBCMT ref: 6C42C591
                                                                    • Part of subcall function 6C42C52C: __EH_prolog3.LIBCMT ref: 6C42C533
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: @$@
                                                                  • API String ID: 431132790-149943524
                                                                  • Opcode ID: af4a2cb1a46d65168c189027d501912c390ca9f1456dc5150d44b855a45041b5
                                                                  • Instruction ID: 79630ff9d709d4d34461227577fd6f775619b8f1e6172d1ec63d4d0fd5da4e1b
                                                                  • Opcode Fuzzy Hash: af4a2cb1a46d65168c189027d501912c390ca9f1456dc5150d44b855a45041b5
                                                                  • Instruction Fuzzy Hash: 8BC13971A002199FDF04DFA8C881EEEBBB5BF48314F14455DE815A7781CB39AE05CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WSAIoctl.WS2_32(?,4004747B,00000000,00000000,?,00000004,?,00000000,00000000), ref: 6C449C1E
                                                                  • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 6C449C3A
                                                                  Strings
                                                                  • Failed to alloc scratch buffer!, xrefs: 6C449B2B
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Ioctlsetsockopt
                                                                  • String ID: Failed to alloc scratch buffer!
                                                                  • API String ID: 1903391676-1446904845
                                                                  • Opcode ID: 85626fefef2c15e92c73988f4b70795f4a86c42e2bcbf83687fb055bbbc0e5e1
                                                                  • Instruction ID: e58d438e9fcb870fdaf082e9cbceb778f5a1ef9f505ddc9f1f85aa76c05a771f
                                                                  • Opcode Fuzzy Hash: 85626fefef2c15e92c73988f4b70795f4a86c42e2bcbf83687fb055bbbc0e5e1
                                                                  • Instruction Fuzzy Hash: 02B1B1702097409FF710CF29C980F9777E9FF95319F28896DF8998A642D732E8059B62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3E564B
                                                                    • Part of subcall function 6C3F7471: __EH_prolog3_GS_align.LIBCMT ref: 6C3F747D
                                                                  • __EH_prolog3_GS_align.LIBCMT ref: 6C3E57E0
                                                                    • Part of subcall function 6C3E7DFC: __EH_prolog3.LIBCMT ref: 6C3E7E03
                                                                    • Part of subcall function 6C3E2153: __EH_prolog3.LIBCMT ref: 6C3E21C4
                                                                    • Part of subcall function 6C3E2153: std::locale::_Init.LIBCPMT ref: 6C3E220E
                                                                    • Part of subcall function 6C41F7A5: __EH_prolog3.LIBCMT ref: 6C41F7AC
                                                                    • Part of subcall function 6C3E3833: __EH_prolog3.LIBCMT ref: 6C3E383A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_$S_align$Initstd::locale::_
                                                                  • String ID: (DIl
                                                                  • API String ID: 1548379353-1458480366
                                                                  • Opcode ID: 50cdc1f22c99d0cd2d3ca831506749e4cb688513aad4eb0e9f716d0ce0f3f003
                                                                  • Instruction ID: 9ba3a4fd9118b1f3fac3644a54163535612d1c7fc288a7a6cc90431ae6ba2f92
                                                                  • Opcode Fuzzy Hash: 50cdc1f22c99d0cd2d3ca831506749e4cb688513aad4eb0e9f716d0ce0f3f003
                                                                  • Instruction Fuzzy Hash: 16B17B71D002299FDB14DF64CC80FDDBB75AF18308F10819AE549A7791DB71AA89CFA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3FED53
                                                                    • Part of subcall function 6C3F7471: __EH_prolog3_GS_align.LIBCMT ref: 6C3F747D
                                                                  • __EH_prolog3_GS_align.LIBCMT ref: 6C3FEEDF
                                                                    • Part of subcall function 6C3E7DFC: __EH_prolog3.LIBCMT ref: 6C3E7E03
                                                                    • Part of subcall function 6C3E2153: __EH_prolog3.LIBCMT ref: 6C3E21C4
                                                                    • Part of subcall function 6C3E2153: std::locale::_Init.LIBCPMT ref: 6C3E220E
                                                                    • Part of subcall function 6C4064DC: __EH_prolog3_GS.LIBCMT ref: 6C4064E6
                                                                    • Part of subcall function 6C41F7A5: __EH_prolog3.LIBCMT ref: 6C41F7AC
                                                                    • Part of subcall function 6C3E3833: __EH_prolog3.LIBCMT ref: 6C3E383A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3H_prolog3_$S_align$Initstd::locale::_
                                                                  • String ID: (DIl
                                                                  • API String ID: 1891993107-1458480366
                                                                  • Opcode ID: 0561cbb1460523cb9e119dfff7b06cf1288806be438a1d450b32c0da57c3bed7
                                                                  • Instruction ID: 62859b5a6d32a6dfbc61eb584e88f5ae64a364ddd06320f84891dccb543ff7ba
                                                                  • Opcode Fuzzy Hash: 0561cbb1460523cb9e119dfff7b06cf1288806be438a1d450b32c0da57c3bed7
                                                                  • Instruction Fuzzy Hash: 63B18B71D002299FDB14CF64CC81FDDBBB5AF18308F10809AE549A7790DB71AA89CF92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ;sha256//$sha256//
                                                                  • API String ID: 0-1817496432
                                                                  • Opcode ID: 72b22f5d05f5eea5ab5358f13ae39442af2f524030d292152ad94b70b460501b
                                                                  • Instruction ID: 8d93847b2c6c8288ec762eab545f7f833650a77a313c5b8ae7b8e2f9b19de1b7
                                                                  • Opcode Fuzzy Hash: 72b22f5d05f5eea5ab5358f13ae39442af2f524030d292152ad94b70b460501b
                                                                  • Instruction Fuzzy Hash: 9761173264C3116FEB00EAA6CC88F5B77F8DFD9719F14052DF84892A42FB65D50486A2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C482E1B: GetOEMCP.KERNEL32(00000000,6C48308C,?,00000000,r5Gl,6C473572,00000000,00000000,?), ref: 6C482E46
                                                                  • IsValidCodePage.KERNEL32(-00000030,00000000,?,00000000,?,r5Gl,6C4830D3,00000000,00000000,?,?,00000000,?,?,?,6C473572), ref: 6C4832DE
                                                                  • GetCPInfo.KERNEL32(00000000,6C4830D3,?,r5Gl,6C4830D3,00000000,00000000,?,?,00000000,?,?,?,6C473572,00000000,00000000), ref: 6C483320
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CodeInfoPageValid
                                                                  • String ID: r5Gl
                                                                  • API String ID: 546120528-971924673
                                                                  • Opcode ID: 5b6320cd9a4c0d18861fbe3462dd632298a0f232e0ef6082c4d9328249c6bb10
                                                                  • Instruction ID: 3c26522753dc87311b491baa774c2ee5c5206f73230b00405c6e86393c991151
                                                                  • Opcode Fuzzy Hash: 5b6320cd9a4c0d18861fbe3462dd632298a0f232e0ef6082c4d9328249c6bb10
                                                                  • Instruction Fuzzy Hash: A1511270A066059FEB21CF3AC480FAABBF4EF41708F14446ED19687A51EB74E546CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  • select/poll on SSL/TLS socket, errno: %d, xrefs: 6C44DBD1
                                                                  • SSL/TLS connection timeout, xrefs: 6C44DBE3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                                                  • API String ID: 0-3791222319
                                                                  • Opcode ID: 978ef80514239db9bdbf46430c178a3d3b151c3a13147fd792b5fb7d34dfd324
                                                                  • Instruction ID: 71c7c5350da75ede27f391c78f870b8a91836108a38ab291d0a9a549d558865a
                                                                  • Opcode Fuzzy Hash: 978ef80514239db9bdbf46430c178a3d3b151c3a13147fd792b5fb7d34dfd324
                                                                  • Instruction Fuzzy Hash: 3151DF71509382ABFB14CE25CC41F5BBBE4EB8671AF348A2DF89992B41D331E445C692
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C43F790
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6C43F7C3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                  • String ID: Connection time-out
                                                                  • API String ID: 885266447-165637984
                                                                  • Opcode ID: 3f749215e536443036349f008360f993845297dc3075807b1bc9aa07038ad4e5
                                                                  • Instruction ID: f54c19e67fd90c9761aac71803cc1eb78afd3e4918e71a9b038f9586580d01c4
                                                                  • Opcode Fuzzy Hash: 3f749215e536443036349f008360f993845297dc3075807b1bc9aa07038ad4e5
                                                                  • Instruction Fuzzy Hash: 4F41FF70A09351AFE718CF5AC889E5B77E4EBC8714F20497EF8588B781E770D8058BA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __fprintf_l
                                                                  • String ID: :%d$Failed to send SOCKS5 connect request.
                                                                  • API String ID: 3906573944-3897769203
                                                                  • Opcode ID: 118bc095d804c882f10290b3bb8c4537cb3fb27e3f60420aa5507b0585ecd0cf
                                                                  • Instruction ID: daec9cbf33a25e220eda35f325ad83dff6fa022f3bcce036532aa65aeac69ef1
                                                                  • Opcode Fuzzy Hash: 118bc095d804c882f10290b3bb8c4537cb3fb27e3f60420aa5507b0585ecd0cf
                                                                  • Instruction Fuzzy Hash: 4341F731508340DFF709DF68C841EAABBE4FF85308F28C56DE5998B742DB65D1098762
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C3FE9BF: SHGetFolderPathW.SHELL32(00000000,00008023,00000000,00000000,00000000,9634BA50,00000000,00000000,00000000,?,?,?,?,0000009C,6C48D9EF,000000FF), ref: 6C3FEA04
                                                                    • Part of subcall function 6C3FE9BF: PathAppendW.SHLWAPI(00000000,DIBsection,?,?,?,?,0000009C,6C48D9EF,000000FF,?,6C3FFC77,9634BA50,00000000,00000000,00000000), ref: 6C3FEA1A
                                                                    • Part of subcall function 6C3FE9BF: PathAppendW.SHLWAPI(00000000,0000000F,?,?,?,?,0000009C,6C48D9EF,000000FF,?,6C3FFC77,9634BA50,00000000,00000000,00000000), ref: 6C3FEA23
                                                                  • DeleteFileW.KERNEL32(00000000,9634BA50,?,?,00000001), ref: 6C400562
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,000000FF,?,?,?,?,?,00000001), ref: 6C400670
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Path$AppendFile$AttributesDeleteFolder
                                                                  • String ID: TAVFV1
                                                                  • API String ID: 641179217-1677771103
                                                                  • Opcode ID: d6b7ca94b69d0bc536faaf3826b2e71f997548e75003706abd8a0f5ff7a653c0
                                                                  • Instruction ID: ca17fddf30d35ff4a84fc4c18005044cf63eb50d3472b3daf0c3bf4d79d740a2
                                                                  • Opcode Fuzzy Hash: d6b7ca94b69d0bc536faaf3826b2e71f997548e75003706abd8a0f5ff7a653c0
                                                                  • Instruction Fuzzy Hash: DB41D271901265AEEB24DF24CC40FD9B775FF05318F0082AAE01963A80DF356A8DCFA6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: C:\Program Files (x86)\Letasoft Sound Booster\SoundBoosterTaskHost.exe
                                                                  • API String ID: 0-3748090899
                                                                  • Opcode ID: 521cdbc97999093d8b5bae48303ec73f8a7453a75c94f7a99fba49e080e675d9
                                                                  • Instruction ID: 7527422bfe40e5c89c279c68f52a6cbd747a9521094488666eeb8041c8fa46e6
                                                                  • Opcode Fuzzy Hash: 521cdbc97999093d8b5bae48303ec73f8a7453a75c94f7a99fba49e080e675d9
                                                                  • Instruction Fuzzy Hash: E7418071E00214AFCB21DB9A8C84DEEBBF8EF89754F11416AE514D7B40D7708A45CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: : Missing required parameter '$H;Nl
                                                                  • API String ID: 2427045233-10712448
                                                                  • Opcode ID: 9d6dac94702ba33b098a2f465334f67fa72640951a21dc0206a5f351fddee5ad
                                                                  • Instruction ID: 855e6dead8e4ef8a420f714c8e71d7d3254a36a3fafa4e7f4134498a1a80cf8c
                                                                  • Opcode Fuzzy Hash: 9d6dac94702ba33b098a2f465334f67fa72640951a21dc0206a5f351fddee5ad
                                                                  • Instruction Fuzzy Hash: 6341F770604354ABCF11CF60C894FEA7B76AF4530CF044559E8965BF41DB31EA48CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • 0123456789abcdefABCDEF:., xrefs: 6C450E14
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _strcspn_strspn
                                                                  • String ID: 0123456789abcdefABCDEF:.
                                                                  • API String ID: 2394370008-446397347
                                                                  • Opcode ID: 7e205608bbee36aeaf611b4df14032b85861a7878e6f33e06c8f4fae858e5879
                                                                  • Instruction ID: 96620d8b4ccb911ba69b6c4bf7e1fb6ad44ecb14e73aec27fa46767f779979f5
                                                                  • Opcode Fuzzy Hash: 7e205608bbee36aeaf611b4df14032b85861a7878e6f33e06c8f4fae858e5879
                                                                  • Instruction Fuzzy Hash: D0314739A0C7D05EE731CE299880F9ABFE49F4770DFB4094EE89197E41E721941987A2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C482E1B: GetOEMCP.KERNEL32(00000000,6C48308C,?,00000000,r5Gl,6C473572,00000000,00000000,?), ref: 6C482E46
                                                                  • _free.LIBCMT ref: 6C4830E9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID: r5Gl
                                                                  • API String ID: 269201875-971924673
                                                                  • Opcode ID: 9c642df7e64c70d6c942db043019aeeed75a1cf1f441f7247aeae4a20f149188
                                                                  • Instruction ID: 0b0f26be8bd1c954fe3a1f69cc9478b2a78784760addd902f3e8b10880504a0a
                                                                  • Opcode Fuzzy Hash: 9c642df7e64c70d6c942db043019aeeed75a1cf1f441f7247aeae4a20f149188
                                                                  • Instruction Fuzzy Hash: D331DE72905209AFCB01DFA8D880FCE77F4EF45319F15416AE8119B7A0EB32D955CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C3F0E62
                                                                  • DeleteFileW.KERNEL32(00000000,000000C4,6C3E5438,00000000,?,00000000,000000FF,?,?,00000000), ref: 6C3F0E85
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteFileH_prolog3_catch_
                                                                  • String ID: TAAFV1
                                                                  • API String ID: 1778024026-2848894585
                                                                  • Opcode ID: 80e9677c5c8b1058ddc1455183e3cf93298bf10a943e6fa09c3a6ba92c7b8e48
                                                                  • Instruction ID: f920867fcbeb650bd8cec73c3d09416f0aa8d12f945a7b7232505a1039948087
                                                                  • Opcode Fuzzy Hash: 80e9677c5c8b1058ddc1455183e3cf93298bf10a943e6fa09c3a6ba92c7b8e48
                                                                  • Instruction Fuzzy Hash: 5231A671801215EBEB35DF14DD40FDAB7B1AF14208F104A9DE4AE23A90DB32AA4DDF61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __fprintf_l
                                                                  • String ID: :%d$Failed to send SOCKS5 connect request.
                                                                  • API String ID: 3906573944-3897769203
                                                                  • Opcode ID: 8c5cf09d3c3b3487bd04c5d5764d2c4c4fef9792038bf6ea30488a5a1a4572fa
                                                                  • Instruction ID: ab9948050477603cefb167899818978dd0cccd5dc4a0639cf8b11964fd807bb9
                                                                  • Opcode Fuzzy Hash: 8c5cf09d3c3b3487bd04c5d5764d2c4c4fef9792038bf6ea30488a5a1a4572fa
                                                                  • Instruction Fuzzy Hash: E7312231508340EFE705EFA8C881E6ABFA8FF46308F28C85DE4958B792D765D409C762
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • Replicator::operator[].LIBVCRUNTIME ref: 6C462688
                                                                  • DName::operator=.LIBVCRUNTIME ref: 6C46271D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Name::operator=Replicator::operator[]
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 3211817929-2525777580
                                                                  • Opcode ID: 0098044e5c66d60b5892b6acc7226e044631c341dcde07c65ae50cc3b75d3e07
                                                                  • Instruction ID: 3d5d5d57887ec6d41b55f3087d159a3109a35238eac6f5e790804184752f9b2b
                                                                  • Opcode Fuzzy Hash: 0098044e5c66d60b5892b6acc7226e044631c341dcde07c65ae50cc3b75d3e07
                                                                  • Instruction Fuzzy Hash: B2310571B01244AFDF21DAAAC458FAA77BAEB4631BF14041ED19287F8ACF70D845C791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: NameName::shared_ptr
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 2125921051-2525777580
                                                                  • Opcode ID: 522641e5eb1824592fed509570bf6c9f81bc2778d90686f8588d0a46cdf58348
                                                                  • Instruction ID: aacb032cadbdb40901c50dc702307cdce8d4726884b6fefa8764f247f32204e5
                                                                  • Opcode Fuzzy Hash: 522641e5eb1824592fed509570bf6c9f81bc2778d90686f8588d0a46cdf58348
                                                                  • Instruction Fuzzy Hash: 9621E471745A869BDB08EE3EC4A5FAC3BB4AB4170AF35C14DA1935BFCCD672864C8601
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C3F1227
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_catch_
                                                                  • String ID: File header is incorrect.$TAPFV1
                                                                  • API String ID: 1329019490-502112909
                                                                  • Opcode ID: acdde0ed96b67fca784e553dd05030357292116d76910e829b06c04912e1046e
                                                                  • Instruction ID: 20d55a3d508cca9f0410430633fb4b18e294a16930c49757191fe902eaab968e
                                                                  • Opcode Fuzzy Hash: acdde0ed96b67fca784e553dd05030357292116d76910e829b06c04912e1046e
                                                                  • Instruction Fuzzy Hash: 363171B1800214ABDB24DB94D990FEDB7B8AF14208F5048DBD16967E50EB71EA4FCF61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_catch_GS.LIBCMT ref: 6C3F10C0
                                                                  • DeleteFileW.KERNEL32(00000000,00000174,6C3EFB95,?,?,?,?,?,00000022,0000000C,6C403897,00000000,?,00000000), ref: 6C3F10ED
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteFileH_prolog3_catch_
                                                                  • String ID: TAPFV1
                                                                  • API String ID: 1778024026-1097571971
                                                                  • Opcode ID: 1f80dbe06bcd025d40966f66d8ece9b950498d2cfe228256d9dccc42b63aa59b
                                                                  • Instruction ID: d87727e689626c479271ae67872fbab443bf34e9f6c7fdd93d8b116b92a51406
                                                                  • Opcode Fuzzy Hash: 1f80dbe06bcd025d40966f66d8ece9b950498d2cfe228256d9dccc42b63aa59b
                                                                  • Instruction Fuzzy Hash: 0C31D171844121AFDB58DF24D888FD9B774AF19318F90429EE01D67B81DF329A8ACF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • CFB_Mode: invalid feedback size, xrefs: 6C42852C
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3__memcpy_s
                                                                  • String ID: CFB_Mode: invalid feedback size
                                                                  • API String ID: 1837224285-1731783136
                                                                  • Opcode ID: 219d0cef40fb8d9c9ed234d902c8478e911ccdbd0591d5c1d0732bc9588dfdd4
                                                                  • Instruction ID: af1bf2ad9eb36995f716d6152ae278feeec15f77f962d6300e9d07eed4c48441
                                                                  • Opcode Fuzzy Hash: 219d0cef40fb8d9c9ed234d902c8478e911ccdbd0591d5c1d0732bc9588dfdd4
                                                                  • Instruction Fuzzy Hash: 9021AF726002009BEB21DFA9CC41EAEB7B5AF88318F04091EE54197F14DB75E8488BA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RaiseException.KERNEL32(?,?,?,?,$8Il,?), ref: 6C407E73
                                                                    • Part of subcall function 6C45E1AA: KiUserExceptionDispatcher.NTDLL(E06D7363,00000001,00000003,6C3E165C,00000000,6C3E2DF5,?,6C3E165C,00000008,6C4DC3E0,00000008), ref: 6C45E20A
                                                                    • Part of subcall function 6C47129A: IsProcessorFeaturePresent.KERNEL32(00000017,6C47B228,?,6C473572,00000000,00000000,?,00000000,00000006), ref: 6C4712B6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Exception$DispatcherFeaturePresentProcessorRaiseUser
                                                                  • String ID: $8Il$csm
                                                                  • API String ID: 3584082860-1695330492
                                                                  • Opcode ID: 709a3bd8ef45e9465138950a370fcf5ef5788ffd9f0f4c3cfed8068f7c61b50e
                                                                  • Instruction ID: 77ffe3f6659fe200c9f92c07d80b333e7819abd8d609349f68541da2d6f7ed6d
                                                                  • Opcode Fuzzy Hash: 709a3bd8ef45e9465138950a370fcf5ef5788ffd9f0f4c3cfed8068f7c61b50e
                                                                  • Instruction Fuzzy Hash: C021A132E462189BCF24DF95D840EEDB3B4EF04719F544429D919ABB50DB30AD49CBC2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C405CD9
                                                                    • Part of subcall function 6C405C3E: __EH_prolog3.LIBCMT ref: 6C405C45
                                                                    • Part of subcall function 6C405BB7: __EH_prolog3.LIBCMT ref: 6C405BBE
                                                                    • Part of subcall function 6C41F7A5: __EH_prolog3.LIBCMT ref: 6C41F7AC
                                                                    • Part of subcall function 6C406218: __EH_prolog3_GS.LIBCMT ref: 6C40621F
                                                                    • Part of subcall function 6C3F057F: __EH_prolog3_GS.LIBCMT ref: 6C3F0586
                                                                    • Part of subcall function 6C42E282: __EH_prolog3.LIBCMT ref: 6C42E289
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3$H_prolog3_
                                                                  • String ID: InsertLineBreaks$MaxLineLength
                                                                  • API String ID: 4240126716-2623338751
                                                                  • Opcode ID: 5521b30547bd40dba92ae9ea4d4b99a2955d71ec8f0d40944fe0082f50418d8f
                                                                  • Instruction ID: 521e222af5f36ec5c2bb57cb2e7b854cf7b39cb8e8bfcdd1aa252ee878658b10
                                                                  • Opcode Fuzzy Hash: 5521b30547bd40dba92ae9ea4d4b99a2955d71ec8f0d40944fe0082f50418d8f
                                                                  • Instruction Fuzzy Hash: AE21FCB1A05218AEE704DBA49846FFEBAB89F48318F10405DE109B77C1DBB45A098BF5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C46129E: pDNameNode::pDNameNode.LIBCMT ref: 6C4612C4
                                                                  • DName::DName.LIBVCRUNTIME ref: 6C4638AC
                                                                  • DName::operator+.LIBCMT ref: 6C4638BA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Name$Name::Name::operator+NodeNode::p
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 3257498322-2525777580
                                                                  • Opcode ID: 8bc6552ad393c9c8e2fff803d46b36c8d017c67cb765108038977e096a0923ca
                                                                  • Instruction ID: aef1fb0252706a9174518079e03cf292b8318f51841e8e3e5dc01dfb0e10b64c
                                                                  • Opcode Fuzzy Hash: 8bc6552ad393c9c8e2fff803d46b36c8d017c67cb765108038977e096a0923ca
                                                                  • Instruction Fuzzy Hash: 8A214AB5900249AFDF04DF96C851FEE7BB8FB05304F00815EE912A7B59EB709649CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___from_strstr_to_strchr.LIBCMT ref: 6C452362
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___from_strstr_to_strchr
                                                                  • String ID: 0123456789$0123456789abcdefABCDEF:.
                                                                  • API String ID: 601868998-2196528912
                                                                  • Opcode ID: 21c5e3e49d33a1ac7485dab3b38d9080e647b0eb64405cd159378473384451cb
                                                                  • Instruction ID: 624eea1eff14a840969e5954ec24fd73239e010bbe3b26fbaa46837344539a01
                                                                  • Opcode Fuzzy Hash: 21c5e3e49d33a1ac7485dab3b38d9080e647b0eb64405cd159378473384451cb
                                                                  • Instruction Fuzzy Hash: EC11382220D3926AE729CD7984C4E5BBBD8EF9215AF54053FE8D5CBB01CF60C4688241
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: NameName::Name::operator+
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 2649573449-2525777580
                                                                  • Opcode ID: 4822f6e6e44e2ca13c503ff6b3a8ae525371fd035f61026a4f4ed0592a1290e4
                                                                  • Instruction ID: 8812a3301b3781622b9045dca3fa4101eb0a47cccbbce90aef95e27e7ed68e36
                                                                  • Opcode Fuzzy Hash: 4822f6e6e44e2ca13c503ff6b3a8ae525371fd035f61026a4f4ed0592a1290e4
                                                                  • Instruction Fuzzy Hash: B1219DB1A04258AFDB04DBA9D844EED7FB9AF49708F05008DE5059BB85DB70AA48CBD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • PathAppendW.SHLWAPI(00000000,?,?,?,?,?), ref: 6C3F0886
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: AppendPath
                                                                  • String ID: .act$.pkey
                                                                  • API String ID: 3286331749-1130863088
                                                                  • Opcode ID: 60a826304ed35d8a7255883d3ef7c1561fa63ad80a71e20d9a647198a39cbb2a
                                                                  • Instruction ID: c127ddb31d93f47fefa3734c51be0a785567091a5d385e68404667c2856d9b3f
                                                                  • Opcode Fuzzy Hash: 60a826304ed35d8a7255883d3ef7c1561fa63ad80a71e20d9a647198a39cbb2a
                                                                  • Instruction Fuzzy Hash: 58112B366000046BD7189B5DCC85DBBB7A9DB95308B99896DEA1587A05FB23DC07CBE0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastsend
                                                                  • String ID: Send failure: %s
                                                                  • API String ID: 1802528911-857917747
                                                                  • Opcode ID: 2020efc79521475c4f1fdcc064c28bc44da1d7aff3bce333deb1939a8e7d7cf2
                                                                  • Instruction ID: b709b16f654ee5046e19ddc72f35221b5ae9fb02b0a4f8612a72689fd3247b89
                                                                  • Opcode Fuzzy Hash: 2020efc79521475c4f1fdcc064c28bc44da1d7aff3bce333deb1939a8e7d7cf2
                                                                  • Instruction Fuzzy Hash: 251193715052109FE730EF29DC45FEAB3ECABCD324F04065DE99C87681DB7498548BA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: NameName::Name::operator+
                                                                  • String ID: j;NlQ;Nl
                                                                  • API String ID: 2649573449-2525777580
                                                                  • Opcode ID: 6760bdc79cb19749aba6069b829df6b91c273972905e3257ec83b5563b052126
                                                                  • Instruction ID: 7753663cf91db7e6af4ed84a43439221d0e0de131186cfe69a84d6a99c3c5998
                                                                  • Opcode Fuzzy Hash: 6760bdc79cb19749aba6069b829df6b91c273972905e3257ec83b5563b052126
                                                                  • Instruction Fuzzy Hash: D111E271A04208AFDF04DFA9C849FEC3BB1BB45308F054189E0069BBC6DB74EA48CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • : missing required parameter ', xrefs: 6C42B5D4
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: : missing required parameter '
                                                                  • API String ID: 2427045233-3853945970
                                                                  • Opcode ID: 80d2acffaacc02107a6f5635eba7c25d6b357b8bfb0759e50a4fcf82e302ecb6
                                                                  • Instruction ID: dee82175dcea029c67578532ddf10a923e1e12bf656b7e3c056a7ed5ae8e0a27
                                                                  • Opcode Fuzzy Hash: 80d2acffaacc02107a6f5635eba7c25d6b357b8bfb0759e50a4fcf82e302ecb6
                                                                  • Instruction Fuzzy Hash: C8115175501258ABDF01DFA0CC44FDEBB68AF5921CF108545F8496BB01CB35EA498BA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastrecv
                                                                  • String ID: Recv failure: %s
                                                                  • API String ID: 2514157807-4276829032
                                                                  • Opcode ID: 29bb412314aa09ba5a2b5da503ae49325cfaa8ec3bf605326decf0852474b780
                                                                  • Instruction ID: ec8798bfe6baf0eab68ae9f584334ea62b8ae969133429ecfb6dd4152e0bea68
                                                                  • Opcode Fuzzy Hash: 29bb412314aa09ba5a2b5da503ae49325cfaa8ec3bf605326decf0852474b780
                                                                  • Instruction Fuzzy Hash: FB118E75604350ABE730EF29C845FDA77F8EBCE324F40095DEA8887681EB7564548B92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __floor_pentium4
                                                                  • String ID: d>l
                                                                  • API String ID: 4168288129-3412665808
                                                                  • Opcode ID: b4b2e4f675f4f3ed9eebd40a9e30dae91c41571e58e59b514b3ddd6141032537
                                                                  • Instruction ID: 140726c658ba42d68b42dab7c738c90c98022de3e496fae866edb66e806e1f63
                                                                  • Opcode Fuzzy Hash: b4b2e4f675f4f3ed9eebd40a9e30dae91c41571e58e59b514b3ddd6141032537
                                                                  • Instruction Fuzzy Hash: 08117532D04E1CD5CB07FE74A4215DAA77CBF1E394B108787D88636851EF7286828754
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: false$true
                                                                  • API String ID: 431132790-2658103896
                                                                  • Opcode ID: 6c36a240f3eb70e5374833e60d5384b0aafb40982072821677e078838d7dcae3
                                                                  • Instruction ID: 62f07f49ad41d7b5bec74bcddfe138b9534bb113b8c9aefb82ef303f2e4a1c9f
                                                                  • Opcode Fuzzy Hash: 6c36a240f3eb70e5374833e60d5384b0aafb40982072821677e078838d7dcae3
                                                                  • Instruction Fuzzy Hash: 52118EB5905754AED711DFB4C840F9ABBF46B09204F00891BE5A98BB51EB30E508CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3FE804
                                                                    • Part of subcall function 6C3E8250: __EH_prolog3.LIBCMT ref: 6C3E8257
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: (DIl$InputBuffer
                                                                  • API String ID: 431132790-1101714749
                                                                  • Opcode ID: 17423b6a3fa8575d335e44bf704771097b5444ab03afa9f142573bfb839cc442
                                                                  • Instruction ID: 7b96f44cfa77f0d00219b5e1f76197f9d182c3a01a0ceed2ac34301522501131
                                                                  • Opcode Fuzzy Hash: 17423b6a3fa8575d335e44bf704771097b5444ab03afa9f142573bfb839cc442
                                                                  • Instruction Fuzzy Hash: FF214D70E01218AFDB05CFA8C845EEEBBB4AF58314F00855AE055A77A1D7719A45CF92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • getsockopt.WS2_32(00004020,0000FFFF,00001001,00000000,00000004), ref: 6C43FF1C
                                                                  • setsockopt.WS2_32(00004020,0000FFFF,00001001,00004020,00000004), ref: 6C43FF39
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: getsockoptsetsockopt
                                                                  • String ID: @
                                                                  • API String ID: 194641219-2726393805
                                                                  • Opcode ID: 737ed0bb3933fede2a6fae276dc869f55fc7a7979b9d5bba84144556cd19c943
                                                                  • Instruction ID: 5b334085f644ca539c34278a7b6346c5227790c8201f6b334514623280e3b0c4
                                                                  • Opcode Fuzzy Hash: 737ed0bb3933fede2a6fae276dc869f55fc7a7979b9d5bba84144556cd19c943
                                                                  • Instruction Fuzzy Hash: 2B0196B1A05129BBFB10DE56CC49FDE7B7CEB0A359F1040A2FD09E6285D3709A04CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C420F23
                                                                    • Part of subcall function 6C3E34D1: __EH_prolog3.LIBCMT ref: 6C3E34D8
                                                                  Strings
                                                                  • InputBuffer, xrefs: 6C420F44
                                                                  • StringStore: missing InputBuffer argument, xrefs: 6C420F81
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3H_prolog3_
                                                                  • String ID: InputBuffer$StringStore: missing InputBuffer argument
                                                                  • API String ID: 3355343447-2380213735
                                                                  • Opcode ID: 39b75185a80a2f030717944b2e9b8fc34e876563f9b18e604dfe3e5a521dc23b
                                                                  • Instruction ID: e6e079ebba7535cd576bbfaeb1e099153fde50c249fe561e25338a368f9b96fb
                                                                  • Opcode Fuzzy Hash: 39b75185a80a2f030717944b2e9b8fc34e876563f9b18e604dfe3e5a521dc23b
                                                                  • Instruction Fuzzy Hash: A5113D70A002589FCF04DFA0C894EDDBBB8BF48304F104569E449ABB50DB70A908CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3_GS.LIBCMT ref: 6C3EF977
                                                                    • Part of subcall function 6C3F053D: __EH_prolog3.LIBCMT ref: 6C3F0544
                                                                    • Part of subcall function 6C3F057F: __EH_prolog3_GS.LIBCMT ref: 6C3F0586
                                                                    • Part of subcall function 6C42B747: __EH_prolog3_GS.LIBCMT ref: 6C42B74E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_$H_prolog3
                                                                  • String ID: DecodingLookupArray$Log2Base
                                                                  • API String ID: 3952504126-3088352070
                                                                  • Opcode ID: ee5580bd3e719240c579649a32c44c4f7ab3182ce78bd5b36d2dac7445a8aa04
                                                                  • Instruction ID: 855373d2f92ec061908c54ebf275b84e666173ab595f7287baf143a8b75f8d83
                                                                  • Opcode Fuzzy Hash: ee5580bd3e719240c579649a32c44c4f7ab3182ce78bd5b36d2dac7445a8aa04
                                                                  • Instruction Fuzzy Hash: 2B112EB1901249AECB00DFA9C581EEEFBB5BF58214B54415EE05897B40C7719A25CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • FilterWithBufferedInput: invalid buffer size, xrefs: 6C41F652
                                                                  • WIl, xrefs: 6C41F60B
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: FilterWithBufferedInput: invalid buffer size$WIl
                                                                  • API String ID: 2427045233-3565543178
                                                                  • Opcode ID: 4b1ffd8a20f82f26e71768e25d4dd52fc0cba7ce4d4bb6d1904717234540c7b1
                                                                  • Instruction ID: 8d2a1711c9aabf23356188e26872ac677549ef92067e1d38dfc39b470464823e
                                                                  • Opcode Fuzzy Hash: 4b1ffd8a20f82f26e71768e25d4dd52fc0cba7ce4d4bb6d1904717234540c7b1
                                                                  • Instruction Fuzzy Hash: 291138708017588FCB20DFA4C400E99BBF0AF08324B10865EE0996BBA0D731A54ACF54
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3E383A
                                                                    • Part of subcall function 6C3E8250: __EH_prolog3.LIBCMT ref: 6C3E8257
                                                                    • Part of subcall function 6C3E3524: __EH_prolog3.LIBCMT ref: 6C3E352B
                                                                    • Part of subcall function 6C3EC046: __EH_prolog3.LIBCMT ref: 6C3EC04D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: (DIl$InputBuffer
                                                                  • API String ID: 431132790-1101714749
                                                                  • Opcode ID: e7c81f03a64cf6071ffba0af2865df093e08b110e9c174bce9cce3e3e477af4c
                                                                  • Instruction ID: 03f3c09944a75e60b600c3209b829630470e4b2011d12b263148e3589f434a39
                                                                  • Opcode Fuzzy Hash: e7c81f03a64cf6071ffba0af2865df093e08b110e9c174bce9cce3e3e477af4c
                                                                  • Instruction Fuzzy Hash: 6F015275A01219EBDB11DF94C806FEEBBB4AF58318F00444AE48567791CB759644CFA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: __fprintf_l
                                                                  • String ID: %02x:$TUUU
                                                                  • API String ID: 3906573944-534085559
                                                                  • Opcode ID: 3602648356ca701ca84e6b1f62839557d89cbcd6ef5155c19f12fdbf13cc6206
                                                                  • Instruction ID: a39132472d121aa086295b2d41e7e2131b0e2f7e69b07049689ebb592694df21
                                                                  • Opcode Fuzzy Hash: 3602648356ca701ca84e6b1f62839557d89cbcd6ef5155c19f12fdbf13cc6206
                                                                  • Instruction Fuzzy Hash: F2F02722A082121BE611D96D9C80D1BFFE8EBC4164F750816F8A4E7A04D560D8410662
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3E359F
                                                                    • Part of subcall function 6C3E2E5F: __EH_prolog3.LIBCMT ref: 6C3E2E66
                                                                  Strings
                                                                  • AlgorithmParametersBase: parameter ", xrefs: 6C3E35A9
                                                                  • " not used, xrefs: 6C3E35C7
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: " not used$AlgorithmParametersBase: parameter "
                                                                  • API String ID: 431132790-612349224
                                                                  • Opcode ID: fa1834e0a55415c3b8dc1aeb1155861b9a562c836e7ffcb4f54c94f75f1537c9
                                                                  • Instruction ID: f62f557750591ee5106a4e3b292c356b2e8c99d27be36ae9b1c61dc64f506bb1
                                                                  • Opcode Fuzzy Hash: fa1834e0a55415c3b8dc1aeb1155861b9a562c836e7ffcb4f54c94f75f1537c9
                                                                  • Instruction Fuzzy Hash: 2AF0A475900278AACF05DBA0CC00FDDBB786F18318F00005AE041BBA91DBB55A4E8FA6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: 9Il$X8Il
                                                                  • API String ID: 431132790-635494990
                                                                  • Opcode ID: a267189ec91d845feca073dad67530a37d5bb14fca21582bee58200804db9cf9
                                                                  • Instruction ID: 18e1036d45544e5f5d6743bee83c4861c447b590787cc04e25a48e858ca6d995
                                                                  • Opcode Fuzzy Hash: a267189ec91d845feca073dad67530a37d5bb14fca21582bee58200804db9cf9
                                                                  • Instruction Fuzzy Hash: 6E01E275600728DBCB10CF55C506FAABBF0BB49328F10864EE4895BB61DB71EA46CF84
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: 9Il$X8Il
                                                                  • API String ID: 431132790-635494990
                                                                  • Opcode ID: bdfc43981925f120d04f4b8e64f2ffd096b608c4bb08cbbe58469853617c0656
                                                                  • Instruction ID: f4f8455a1f0f5f024217dab8f9483d40602111fd28dd47f315614f2b9069b848
                                                                  • Opcode Fuzzy Hash: bdfc43981925f120d04f4b8e64f2ffd096b608c4bb08cbbe58469853617c0656
                                                                  • Instruction Fuzzy Hash: 08010475A007289BCB10CF55C506FAABBF0BF49328F10854EE4895BB61DB71EA46CF84
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • OutputBuffer, xrefs: 6C420129
                                                                  • ArraySink: missing OutputBuffer argument, xrefs: 6C420149
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: ArraySink: missing OutputBuffer argument$OutputBuffer
                                                                  • API String ID: 2427045233-3781944848
                                                                  • Opcode ID: ac5be14b310e50226804d3c1319840e2a2ddc368c177ad4726adf23f15795d72
                                                                  • Instruction ID: 0eb23182810ee55e4d3c888b671bd706029ffb312a23cc817a309fcacbbf4cfd
                                                                  • Opcode Fuzzy Hash: ac5be14b310e50226804d3c1319840e2a2ddc368c177ad4726adf23f15795d72
                                                                  • Instruction Fuzzy Hash: 80013C719002989FCB10DFE4C844FEDBBB4AF5831AF104959A049AFA44DB79A90CCB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 6C406BBC
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 6C406BFA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_
                                                                  • String ID: 2X@l
                                                                  • API String ID: 593203224-2914316872
                                                                  • Opcode ID: 0b77829f5ae1b902cd39cae9ffec55de2f39a7d175c6d183d509a66f3b4be8a7
                                                                  • Instruction ID: de83424878c3a4ab186ba3019f72a8d68c551a6ef56c044c73356d0744364357
                                                                  • Opcode Fuzzy Hash: 0b77829f5ae1b902cd39cae9ffec55de2f39a7d175c6d183d509a66f3b4be8a7
                                                                  • Instruction Fuzzy Hash: 1AF0BEB2B001149ACB40DB19C440EDD7EF5EB8A769B2645B8890BDB301E631A982C3C0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 2X@l$string too long
                                                                  • API String ID: 0-3090796701
                                                                  • Opcode ID: fb1fbaf51b30744bae2ec43f221f47f0700f685d153b4349c4422b1191a70155
                                                                  • Instruction ID: 85b5cc37da33396ac77ce022e5de590d716e33d72f597d7e134b1d281f8ec2f2
                                                                  • Opcode Fuzzy Hash: fb1fbaf51b30744bae2ec43f221f47f0700f685d153b4349c4422b1191a70155
                                                                  • Instruction Fuzzy Hash: 6CF0BE3420020AAF8B09CF5CC840CEA7777FB89318710869DF8258FA51C732E981CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: $iNl$(iNl
                                                                  • API String ID: 431132790-2710375638
                                                                  • Opcode ID: 5df19accfc045c371fdb77ed26e4c75e0fd0c8d746d787a831343ccbf0634004
                                                                  • Instruction ID: cc3ef0ce683de99b004c6062761654d7c39199caa919389285198fab1652e354
                                                                  • Opcode Fuzzy Hash: 5df19accfc045c371fdb77ed26e4c75e0fd0c8d746d787a831343ccbf0634004
                                                                  • Instruction Fuzzy Hash: 22F02431742024DBCA10EB54D441F983BB1AB8E73EF16105CD1088BFC2CF35980A8685
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: NameName::
                                                                  • String ID: ??_C$j;NlQ;Nl
                                                                  • API String ID: 1333004437-4223140038
                                                                  • Opcode ID: 8ca1ba34ccb9855a570839ab2a395775648b44c11d1fd0a56562cf12cd571177
                                                                  • Instruction ID: 4afb60db2df6007469a9b65044b43a0a8e3a556cfec5c759a585feac579de3ca
                                                                  • Opcode Fuzzy Hash: 8ca1ba34ccb9855a570839ab2a395775648b44c11d1fd0a56562cf12cd571177
                                                                  • Instruction Fuzzy Hash: 62F058B1A08244AFEB11DF59D805F953BB9AB01329F468054F9084FA87D7B2D954CAD2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetOEMCP.KERNEL32(00000000,6C48308C,?,00000000,r5Gl,6C473572,00000000,00000000,?), ref: 6C482E46
                                                                  • GetACP.KERNEL32(00000000,6C48308C,?,00000000,r5Gl,6C473572,00000000,00000000,?), ref: 6C482E5D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r5Gl
                                                                  • API String ID: 0-971924673
                                                                  • Opcode ID: 1735ad205ee391530ad3b6dfcb8c6fddf15111443ba874360654b66699ac7be8
                                                                  • Instruction ID: 15fe609bf86c78c31775f7fdf627ba8bcc2aa1b019882972693fdb65bc79c8a6
                                                                  • Opcode Fuzzy Hash: 1735ad205ee391530ad3b6dfcb8c6fddf15111443ba874360654b66699ac7be8
                                                                  • Instruction Fuzzy Hash: 77F04F30A06504DFDB60EF69C94CF697770EB06339F540346E1248AAD2CBB19585CB55
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 6C3EE543
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_destroy
                                                                  • String ID: P8Il$$Il
                                                                  • API String ID: 4194217158-1727800565
                                                                  • Opcode ID: 24dad85ea4ac44a7b199ee7e5b34d0f37ca21ecd828501d73f261e219dc00922
                                                                  • Instruction ID: e7500a26ff9199306a7a665f3ab8421729541db3296c89c6ecf11334b7a7a771
                                                                  • Opcode Fuzzy Hash: 24dad85ea4ac44a7b199ee7e5b34d0f37ca21ecd828501d73f261e219dc00922
                                                                  • Instruction Fuzzy Hash: 56F030B29046549FC724DF14D942F85BBF8EB05724F10495E945693E90DB74A504CA80
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • ___std_exception_destroy.LIBVCRUNTIME ref: 6C3EF51C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: ___std_exception_destroy
                                                                  • String ID: P8Il$$Il
                                                                  • API String ID: 4194217158-1727800565
                                                                  • Opcode ID: 9b69ea836d597a47044cb41780fff562b92e2f4590c961325664ddfaa70ce6e1
                                                                  • Instruction ID: 73bf5f20876b6ada71cab09c77f1e8639631c881307586ced9b43231f116cb0d
                                                                  • Opcode Fuzzy Hash: 9b69ea836d597a47044cb41780fff562b92e2f4590c961325664ddfaa70ce6e1
                                                                  • Instruction Fuzzy Hash: DDF030B29046549FC724DF14D942F85BBF8EB05B24F004A5E945693E90DB74A504CA50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • StringSink: OutputStringPointer not specified, xrefs: 6C3E83BB
                                                                  • OutputStringPointer, xrefs: 6C3E83A3
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: OutputStringPointer$StringSink: OutputStringPointer not specified
                                                                  • API String ID: 431132790-1331214609
                                                                  • Opcode ID: 67aadce017d9efa1af74065915072850c714af91bbcff0186f7acdb61da73a71
                                                                  • Instruction ID: 496b5eb43f05a1d15381de82d3152d30b440d20275b7295609a0fb7f3d82678f
                                                                  • Opcode Fuzzy Hash: 67aadce017d9efa1af74065915072850c714af91bbcff0186f7acdb61da73a71
                                                                  • Instruction Fuzzy Hash: 64F08C75A00168ABCF00DF90C850FEDB379AF5821CF50449AA215BBA90CF35FE09CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • boost unique_lock has no mutex, xrefs: 6C40957C
                                                                  • boost unique_lock owns already the mutex, xrefs: 6C409555
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3_
                                                                  • String ID: boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                  • API String ID: 2427045233-3352860666
                                                                  • Opcode ID: cb7afee7496c55e79074873e51d1b28df6dbff502c77aa2791d1c83d95a063aa
                                                                  • Instruction ID: f42ba2bc133cec34b7e95f5ba5fe56b9947a502108507795b7f3bd77627f82d3
                                                                  • Opcode Fuzzy Hash: cb7afee7496c55e79074873e51d1b28df6dbff502c77aa2791d1c83d95a063aa
                                                                  • Instruction Fuzzy Hash: F2F05530B8225096EB10CBA0CC08FEDBA602F5070DF50482DA9592BFC0CBB6894DCB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: AES$CFB
                                                                  • API String ID: 431132790-1011567800
                                                                  • Opcode ID: 24792499c367fa0842b36e9be05a2c09f4b23ae7b4a10b6645c1d8851443e2fa
                                                                  • Instruction ID: 666310d01ec09035d8434cdf4be959b05365a69fadb007dffb2876b652547a1b
                                                                  • Opcode Fuzzy Hash: 24792499c367fa0842b36e9be05a2c09f4b23ae7b4a10b6645c1d8851443e2fa
                                                                  • Instruction Fuzzy Hash: E2F0A035900228BACB05EF90CD50EDD77785F28208F404066E04176A61DB72AF1ECFA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: 9Il$X8Il
                                                                  • API String ID: 431132790-635494990
                                                                  • Opcode ID: 691bdc5a712654ba459e325d0098d3a466b733c9017741c5390f5be8f3899361
                                                                  • Instruction ID: 27ee1c8093f59efafbfb1fee92be744c9a091718e399297c08585c6ddc676d82
                                                                  • Opcode Fuzzy Hash: 691bdc5a712654ba459e325d0098d3a466b733c9017741c5390f5be8f3899361
                                                                  • Instruction Fuzzy Hash: 4CF014756007249BCB20CF54C102FAABBF0BB09319F00864CE0895BB61C775EA08CF85
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: AES$CBC
                                                                  • API String ID: 431132790-790673706
                                                                  • Opcode ID: 4182b033dac9eec17e17b2ae2e8f11d8e30538f8bb0a913a94d330fce39a6a40
                                                                  • Instruction ID: 86110f270e74956c35e5de35643e90e95d4dc2db25f30a9f6ecad1370de90c10
                                                                  • Opcode Fuzzy Hash: 4182b033dac9eec17e17b2ae2e8f11d8e30538f8bb0a913a94d330fce39a6a40
                                                                  • Instruction Fuzzy Hash: 74F08C35900228BACB05EF90C990EDD77785F28208F404066A04176A61DB72AB1ACFA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • std::_Xinvalid_argument.LIBCPMT ref: 6C3E1749
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: Xinvalid_argumentstd::_
                                                                  • String ID: 2X@l$string too long
                                                                  • API String ID: 909987262-3090796701
                                                                  • Opcode ID: 8f525ac05557dc5c0f53f75356c846d9ff3cf6b71472a14cbf155389dead965d
                                                                  • Instruction ID: b3e89bc3784d410d3e5affafdc1aca289dfe797f4ad3b84de581e2be89dc04eb
                                                                  • Opcode Fuzzy Hash: 8f525ac05557dc5c0f53f75356c846d9ff3cf6b71472a14cbf155389dead965d
                                                                  • Instruction Fuzzy Hash: 40E0ED34210208EFDB08CF99D850DE6376AEB48754B00055DB92A4B5A1D771E954CB92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • __EH_prolog3.LIBCMT ref: 6C3ED2A6
                                                                    • Part of subcall function 6C3ECFD7: __EH_prolog3.LIBCMT ref: 6C3ECFDE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog3
                                                                  • String ID: P8Il$x8Il
                                                                  • API String ID: 431132790-3118173755
                                                                  • Opcode ID: a2be2c9d0c3a39082f4be451824b5b2e67798105cabb5fa8973e1774ec501b7d
                                                                  • Instruction ID: bd76646fad3fe53536a96a0a2403e9e80d79f068946fb9ddb3cebb498d3bde38
                                                                  • Opcode Fuzzy Hash: a2be2c9d0c3a39082f4be451824b5b2e67798105cabb5fa8973e1774ec501b7d
                                                                  • Instruction Fuzzy Hash: EAF0DAF1901622AFC300DF5A8582F88FFA0BF55314790512E911D9BE60C770E525CF80
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 6C3F5622: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,?,8007000E,?,6C4DCD94,8007000E,?,6C3F5677,8007000E), ref: 6C3F5628
                                                                    • Part of subcall function 6C3F5622: GetLastError.KERNEL32(?,00000000,00000000,?,8007000E,?,6C4DCD94,8007000E,?,6C3F5677,8007000E), ref: 6C3F5632
                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,6C3E13E1), ref: 6C45D2DA
                                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,6C3E13E1), ref: 6C45D2E9
                                                                  Strings
                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 6C45D2E4
                                                                  Memory Dump Source
                                                                  • Source File: 0000000F.00000002.2048682677.000000006C3E1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 6C3E0000, based on PE: true
                                                                  • Associated: 0000000F.00000002.2048663537.000000006C3E0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048752619.000000006C492000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048799662.000000006C4DF000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048824759.000000006C4E0000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048845431.000000006C4E3000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048866658.000000006C4E4000.00000008.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E6000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048887132.000000006C4E8000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                                  • Associated: 0000000F.00000002.2048928389.000000006C4E9000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_15_2_6c3e0000_SoundBoosterTaskHost.jbxd
                                                                  Similarity
                                                                  • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                  • API String ID: 3511171328-631824599
                                                                  • Opcode ID: 61f73b044c9be41563ab06d3c7be7992037883fdbe124e7c09e161fe994e8271
                                                                  • Instruction ID: 1a15cffb1316e3f1481cda93553619418befc0108b27be0701035d718c15a439
                                                                  • Opcode Fuzzy Hash: 61f73b044c9be41563ab06d3c7be7992037883fdbe124e7c09e161fe994e8271
                                                                  • Instruction Fuzzy Hash: C3E092702043618BD720EF68D204F427BF0AF05719F008D1EE4A6C2B00EB74D548CFA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%