Loading ...

Play interactive tourEdit tour

Analysis Report logman.exe

Overview

General Information

Sample Name:logman.exe
Analysis ID:319946
MD5:ca042c9a80d01c409c740d0437942b4e
SHA1:715146caa48d94a6ae2f6f0b2d5268296d51773e
SHA256:cdaa7d2fd4328877fcab873cfa85b6b46b0a1afa6cc39017ced21dcfb139bba7

Detection

Score:23
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Binary contains a suspicious time stamp
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

Startup

  • System is w10x64
  • logman.exe (PID: 4828 cmdline: 'C:\Users\user\Desktop\logman.exe' MD5: CA042C9A80D01C409C740D0437942B4E)
    • conhost.exe (PID: 6468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3E5EC _wsplitpath_s,FindFirstFileW,_wmakepath_s,memmove,FindNextFileW,wcschr,wcschr,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,memmove,FindClose,0_2_00007FF665A3E5EC
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3E5EC _wsplitpath_s,FindFirstFileW,_wmakepath_s,memmove,FindNextFileW,wcschr,wcschr,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,memmove,FindClose,0_2_00007FF665A3E5EC
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A404BC0_2_00007FF665A404BC
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A34EA80_2_00007FF665A34EA8
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3A2D40_2_00007FF665A3A2D4
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3B5300_2_00007FF665A3B530
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3D1300_2_00007FF665A3D130
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3B03C0_2_00007FF665A3B03C
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A35C2C0_2_00007FF665A35C2C
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A37C0C0_2_00007FF665A37C0C
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3D5440_2_00007FF665A3D544
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A33F880_2_00007FF665A33F88
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A36B8C0_2_00007FF665A36B8C
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3D3840_2_00007FF665A3D384
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A404BC0_2_00007FF665A404BC
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A34EA80_2_00007FF665A34EA8
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3A2D40_2_00007FF665A3A2D4
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3B5300_2_00007FF665A3B530
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3D1300_2_00007FF665A3D130
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3B03C0_2_00007FF665A3B03C
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A35C2C0_2_00007FF665A35C2C
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A37C0C0_2_00007FF665A37C0C
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3D5440_2_00007FF665A3D544
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A33F880_2_00007FF665A33F88
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A36B8C0_2_00007FF665A36B8C
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3D3840_2_00007FF665A3D384
Source: logman.exeBinary or memory string: OriginalFilename vs logman.exe
Source: logman.exe, 00000000.00000002.666277863.00000207768A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs logman.exe
Source: logman.exe, 00000000.00000000.664776601.00007FF665A42000.00000002.00020000.sdmpBinary or memory string: \VarFileInfo\TranslationProductVersion\StringFileInfo\%04x%04x\%sOriginalFilename vs logman.exe
Source: logman.exeBinary or memory string: \VarFileInfo\TranslationProductVersion\StringFileInfo\%04x%04x\%sOriginalFilename vs logman.exe
Source: logman.exeBinary or memory string: OriginalFilename vs logman.exe
Source: logman.exe, 00000000.00000002.666277863.00000207768A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs logman.exe
Source: logman.exe, 00000000.00000000.664776601.00007FF665A42000.00000002.00020000.sdmpBinary or memory string: \VarFileInfo\TranslationProductVersion\StringFileInfo\%04x%04x\%sOriginalFilename vs logman.exe
Source: logman.exeBinary or memory string: \VarFileInfo\TranslationProductVersion\StringFileInfo\%04x%04x\%sOriginalFilename vs logman.exe
Source: classification engineClassification label: sus23.winEXE@2/0@0/0
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3C270 LoadLibraryW,GetLastError,FormatMessageW,FormatMessageW,FreeLibrary,LocalFree,0_2_00007FF665A3C270
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3C270 LoadLibraryW,GetLastError,FormatMessageW,FormatMessageW,FreeLibrary,LocalFree,0_2_00007FF665A3C270
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A34EA8 VariantInit,HeapSetInformation,CoInitializeEx,SysAllocString,_wcsicmp,_wcsicmp,_wcsicmp,GetUserNameExW,GetLastError,LoadStringW,CoCreateInstance,VariantClear,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,SysFreeString,SysFreeString,SysFreeString,CoUninitialize,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FreeLibrary,0_2_00007FF665A34EA8
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A34EA8 VariantInit,HeapSetInformation,CoInitializeEx,SysAllocString,_wcsicmp,_wcsicmp,_wcsicmp,GetUserNameExW,GetLastError,LoadStringW,CoCreateInstance,VariantClear,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,SysFreeString,SysFreeString,SysFreeString,CoUninitialize,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FreeLibrary,0_2_00007FF665A34EA8
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A395E8 FindResourceW,LoadResource,LockResource,SizeofResource,GlobalAlloc,GlobalLock,memmove,CreateStreamOnHGlobal,GetLastError,FreeResource,GlobalUnlock,GlobalFree,0_2_00007FF665A395E8
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A395E8 FindResourceW,LoadResource,LockResource,SizeofResource,GlobalAlloc,GlobalLock,memmove,CreateStreamOnHGlobal,GetLastError,FreeResource,GlobalUnlock,GlobalFree,0_2_00007FF665A395E8
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6468:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6468:120:WilError_01
Source: logman.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: logman.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\logman.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\logman.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\logman.exe 'C:\Users\user\Desktop\logman.exe'
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\logman.exe 'C:\Users\user\Desktop\logman.exe'
Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: logman.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: logman.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: logman.exeStatic PE information: GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: logman.exeStatic PE information: GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: logman.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: logman.pdb source: logman.exe
Source: Binary string: logman.pdbGCTL source: logman.exe
Source: Binary string: logman.pdb source: logman.exe
Source: Binary string: logman.pdbGCTL source: logman.exe
Source: logman.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: logman.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: logman.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: logman.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: logman.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: logman.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: logman.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: logman.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: logman.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: logman.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation:

barindex
Binary contains a suspicious time stampShow sources
Source: initial sampleStatic PE information: 0xEA48DB36 [Thu Jul 22 13:20:54 2094 UTC]
Source: initial sampleStatic PE information: 0xEA48DB36 [Thu Jul 22 13:20:54 2094 UTC]
Source: C:\Users\user\Desktop\logman.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-5467
Source: C:\Users\user\Desktop\logman.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-5467
Source: C:\Users\user\Desktop\logman.exeAPI coverage: 6.5 %
Source: C:\Users\user\Desktop\logman.exeAPI coverage: 6.5 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3E5EC _wsplitpath_s,FindFirstFileW,_wmakepath_s,memmove,FindNextFileW,wcschr,wcschr,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,memmove,FindClose,0_2_00007FF665A3E5EC
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3E5EC _wsplitpath_s,FindFirstFileW,_wmakepath_s,memmove,FindNextFileW,wcschr,wcschr,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,memmove,FindClose,0_2_00007FF665A3E5EC
Source: logman.exe, 00000000.00000002.666277863.00000207768A0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: logman.exe, 00000000.00000002.666277863.00000207768A0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: logman.exe, 00000000.00000002.666277863.00000207768A0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: logman.exe, 00000000.00000002.666277863.00000207768A0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: logman.exe, 00000000.00000002.666277863.00000207768A0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: logman.exe, 00000000.00000002.666277863.00000207768A0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: logman.exe, 00000000.00000002.666277863.00000207768A0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: logman.exe, 00000000.00000002.666277863.00000207768A0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A34EA8 VariantInit,HeapSetInformation,CoInitializeEx,SysAllocString,_wcsicmp,_wcsicmp,_wcsicmp,GetUserNameExW,GetLastError,LoadStringW,CoCreateInstance,VariantClear,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,SysFreeString,SysFreeString,SysFreeString,CoUninitialize,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FreeLibrary,0_2_00007FF665A34EA8
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A34EA8 VariantInit,HeapSetInformation,CoInitializeEx,SysAllocString,_wcsicmp,_wcsicmp,_wcsicmp,GetUserNameExW,GetLastError,LoadStringW,CoCreateInstance,VariantClear,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,SysFreeString,SysFreeString,SysFreeString,CoUninitialize,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FreeLibrary,0_2_00007FF665A34EA8
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A414A0 SetUnhandledExceptionFilter,0_2_00007FF665A414A0
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A41194 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF665A41194
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A414A0 SetUnhandledExceptionFilter,0_2_00007FF665A414A0
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A41194 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF665A41194
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A35C2C GetProcessHeap,HeapAlloc,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetLastError,InitializeSecurityDescriptor,GetLastError,GetSecurityDescriptorOwner,GetLastError,SetSecurityDescriptorOwner,GetLastError,GetSecurityDescriptorGroup,GetLastError,SetSecurityDescriptorGroup,GetLastError,GetSecurityDescriptorDacl,GetLastError,SetSecurityDescriptorDacl,GetLastError,CoInitializeSecurity,GetProcessHeap,HeapFree,LocalFree,LocalFree,0_2_00007FF665A35C2C
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A35C2C GetProcessHeap,HeapAlloc,ConvertStringSecurityDescriptorToSecurityDescriptorW,GetLastError,InitializeSecurityDescriptor,GetLastError,GetSecurityDescriptorOwner,GetLastError,SetSecurityDescriptorOwner,GetLastError,GetSecurityDescriptorGroup,GetLastError,SetSecurityDescriptorGroup,GetLastError,GetSecurityDescriptorDacl,GetLastError,SetSecurityDescriptorDacl,GetLastError,CoInitializeSecurity,GetProcessHeap,HeapFree,LocalFree,LocalFree,0_2_00007FF665A35C2C
Source: C:\Users\user\Desktop\logman.exeCode function: LoadLibraryW,SearchPathW,FindResourceExW,GetUserDefaultUILanguage,GetLocaleInfoW,wcsncmp,GetSystemDefaultUILanguage,FreeLibrary,FreeLibrary,LoadLibraryExW,FreeLibrary,0_2_00007FF665A404BC
Source: C:\Users\user\Desktop\logman.exeCode function: GetProcessHeap,HeapAlloc,GetProcessHeap,RtlAllocateHeap,wcstok,wcstok,_wcsicmp,wcstok,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,wcsrchr,wcstok,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00007FF665A3C948
Source: C:\Users\user\Desktop\logman.exeCode function: GetProcessHeap,HeapAlloc,GetLocaleInfoW,wcstok,wcstok,GetProcessHeap,HeapFree,0_2_00007FF665A3EEA8
Source: C:\Users\user\Desktop\logman.exeCode function: LoadLibraryW,SearchPathW,FindResourceExW,GetUserDefaultUILanguage,GetLocaleInfoW,wcsncmp,GetSystemDefaultUILanguage,FreeLibrary,FreeLibrary,LoadLibraryExW,FreeLibrary,0_2_00007FF665A404BC
Source: C:\Users\user\Desktop\logman.exeCode function: GetProcessHeap,HeapAlloc,GetProcessHeap,RtlAllocateHeap,wcstok,wcstok,_wcsicmp,wcstok,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,wcsrchr,wcstok,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00007FF665A3C948
Source: C:\Users\user\Desktop\logman.exeCode function: GetProcessHeap,HeapAlloc,GetLocaleInfoW,wcstok,wcstok,GetProcessHeap,HeapFree,0_2_00007FF665A3EEA8
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A41674 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,0_2_00007FF665A41674
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A41674 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,0_2_00007FF665A41674
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A34EA8 VariantInit,HeapSetInformation,CoInitializeEx,SysAllocString,_wcsicmp,_wcsicmp,_wcsicmp,GetUserNameExW,GetLastError,LoadStringW,CoCreateInstance,VariantClear,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,SysFreeString,SysFreeString,SysFreeString,CoUninitialize,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FreeLibrary,0_2_00007FF665A34EA8
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A34EA8 VariantInit,HeapSetInformation,CoInitializeEx,SysAllocString,_wcsicmp,_wcsicmp,_wcsicmp,GetUserNameExW,GetLastError,LoadStringW,CoCreateInstance,VariantClear,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,SysFreeString,SysFreeString,SysFreeString,CoUninitialize,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FreeLibrary,0_2_00007FF665A34EA8
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3FF14 memset,GetVersionExW,GetVersionExW,0_2_00007FF665A3FF14
Source: C:\Users\user\Desktop\logman.exeCode function: 0_2_00007FF665A3FF14 memset,GetVersionExW,GetVersionExW,0_2_00007FF665A3FF14

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsNative API1Path InterceptionProcess Injection1Process Injection1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsTimestomp1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerAccount Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Owner/User Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery13VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 319946 Sample: logman.exe Startdate: 18/11/2020 Architecture: WINDOWS Score: 23 10 Binary contains a suspicious time stamp 2->10 6 logman.exe 1 2->6         started        process3 process4 8 conhost.exe 6->8         started       

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
logman.exe0%VirustotalBrowse
logman.exe0%MetadefenderBrowse
logman.exe0%ReversingLabs

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:31.0.0 Red Diamond
Analysis ID:319946
Start date:18.11.2020
Start time:21:15:26
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 2m 20s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:logman.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:SUS
Classification:sus23.winEXE@2/0@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 100% (good quality ratio 28.4%)
  • Quality average: 19.3%
  • Quality standard deviation: 33.4%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
Warnings:
Show All
  • Exclude process from analysis (whitelisted): svchost.exe

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

No created / dropped files found

Static File Info

General

File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):5.525535467255417
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:logman.exe
File size:120320
MD5:ca042c9a80d01c409c740d0437942b4e
SHA1:715146caa48d94a6ae2f6f0b2d5268296d51773e
SHA256:cdaa7d2fd4328877fcab873cfa85b6b46b0a1afa6cc39017ced21dcfb139bba7
SHA512:32c0ef8ab6a938dfc0bb00f41b4a2937ea9370d80104a4d1f6cc5782d1f97d4c8823f413a02a6f911dc06f4b1eecf4bafab08db56cdf678e0e0b37cba7c96a63
SSDEEP:3072:jk3dNq/ZpEoxPeFpT0NMrUs0Kj6aWkGTy:jk3/q/PEoxP6pT0NY0Kja
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........@.......................-.......*......./......./.......+.......&...............,.....Rich....................PE..d...6.H....

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x140011050
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
Time Stamp:0xEA48DB36 [Thu Jul 22 13:20:54 2094 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:468ae0e85185c7b62e8740f0b95d8d25

Entrypoint Preview

Instruction
dec eax
sub esp, 28h
call 00007F511489BEC0h
dec eax
add esp, 28h
jmp 00007F511489B6C3h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
nop word ptr [eax+eax+00000000h]
dec eax
cmp ecx, dword ptr [0000A1D1h]
jne 00007F511489B8B2h
dec eax
rol ecx, 10h
test cx, FFFFh
jne 00007F511489B8A3h
ret
dec eax
ror ecx, 10h
jmp 00007F511489B9D7h
int3
int3
int3
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
dec eax
lea ecx, dword ptr [0000C6E4h]
call dword ptr [00004096h]
mov eax, dword ptr [0000A190h]
dec eax
lea ecx, dword ptr [0000C6D1h]
mov edx, dword ptr [0000CC63h]
inc eax
mov dword ptr [0000A17Bh], eax
mov dword ptr [ebx], eax
dec eax
mov eax, dword ptr [00000058h]
inc ecx
mov ecx, 00000004h
dec esp
mov eax, dword ptr [eax+edx*8]
mov eax, dword ptr [0000A160h]
inc ebx
mov dword ptr [ecx+eax], eax
call dword ptr [0000405Eh]
dec eax
lea ecx, dword ptr [0000C69Fh]
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [00004063h]
int3
int3
int3
int3
int3
int3
int3
inc eax
push ebx
dec eax

Rich Headers

Programming Language:
  • [IMP] VS2008 SP1 build 30729

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x18ae80x280.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x200000x808.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1f0000x924.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x210000x854.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x17f400x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x14db80x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x14ca00x118.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x14de00x5c8.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x109660x10a00False0.486548402256data6.18960548838IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rdata0x120000x81340x8200False0.364603365385data4.20455027863IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1b0000x30680x2800False0.06630859375data0.447443967859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.pdata0x1f0000x9240xa00False0.45625PEX Binary Archive4.50307300662IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x200000x8080xa00False0.38359375data3.71062234732IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x210000x8540xa00False0.4015625data4.98444381936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
MUI0x207380xd0dataEnglishUnited States
RT_VERSION0x203980x39cdataEnglishUnited States
RT_MANIFEST0x200f00x2a6XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States

Imports

DLLImport
msvcrt.dllbsearch, ??3@YAXPEAX@Z, __CxxFrameHandler3, ?terminate@@YAXXZ, _commode, wcsncmp, _fmode, __C_specific_handler, _initterm, __setusermatherr, _wcsnicmp, _cexit, _exit, iswspace, _wmakepath_s, exit, __set_app_type, __wgetmainargs, _amsg_exit, _XcptFilter, wcsrchr, isspace, fgetws, wcsstr, _wfopen, wprintf, wcschr, _errno, wcstok, qsort, fseek, _wtoi, fclose, _wcsicmp, towlower, ferror, memmove, _vsnwprintf, _wsplitpath_s, malloc, _callnewh, memcpy, memset
api-ms-win-security-base-l1-1-0.dllSetSecurityDescriptorDacl, GetSecurityDescriptorDacl, GetTokenInformation, SetSecurityDescriptorGroup, InitializeSecurityDescriptor, GetSecurityDescriptorOwner, SetSecurityDescriptorOwner, GetSecurityDescriptorGroup
api-ms-win-core-file-l1-1-0.dllCreateFileW, WriteFile, FindFirstFileW, ReadFile, FindClose, FindNextFileW, SetFilePointerEx, GetFullPathNameW, GetFileType
api-ms-win-core-libraryloader-l1-2-0.dllFreeResource, SizeofResource, LoadStringW, FreeLibrary, GetModuleFileNameW, LoadResource, FindResourceExW, GetModuleHandleW, LockResource, LoadLibraryExW
OLEAUT32.dllSystemTimeToVariantTime, VariantInit, SysAllocString, VariantChangeType, VarDateFromStr, SysFreeString, SafeArrayUnaccessData, SafeArrayDestroy, VariantTimeToSystemTime, SafeArrayCreateVector, SafeArrayAccessData, VariantClear, VarBstrFromDate
api-ms-win-core-heap-l1-1-0.dllGetProcessHeap, HeapFree, HeapAlloc, HeapSetInformation
api-ms-win-core-processthreads-l1-1-0.dllGetCurrentProcessId, OpenProcessToken, GetCurrentThreadId, GetCurrentProcess, OpenThreadToken, GetCurrentThread, TerminateProcess
api-ms-win-core-processenvironment-l1-1-0.dllGetStdHandle, GetCurrentDirectoryW, SearchPathW
api-ms-win-security-sddl-l1-1-0.dllConvertSidToStringSidW, ConvertStringSecurityDescriptorToSecurityDescriptorW
api-ms-win-core-console-l1-1-0.dllReadConsoleW, GetConsoleMode, GetConsoleOutputCP, WriteConsoleW, SetConsoleMode
api-ms-win-core-com-l1-1-0.dllCoInitializeEx, CoCreateInstance, CoUninitialize, CoInitializeSecurity, CreateStreamOnHGlobal, StringFromGUID2
SspiCli.dllGetUserNameExW
api-ms-win-shcore-path-l1-1-0.dll
api-ms-win-core-string-l1-1-0.dllWideCharToMultiByte, MultiByteToWideChar
api-ms-win-core-errorhandling-l1-1-0.dllGetLastError, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SetLastError
api-ms-win-core-heap-l2-1-0.dllGlobalFree, LocalFree, GlobalAlloc
api-ms-win-core-handle-l1-1-0.dllCloseHandle
api-ms-win-core-libraryloader-l1-2-1.dllLoadLibraryW, FindResourceW
api-ms-win-core-heap-obsolete-l1-1-0.dllGlobalUnlock, GlobalLock
api-ms-win-core-timezone-l1-1-0.dllSystemTimeToFileTime
api-ms-win-core-synch-l1-2-0.dllSleepConditionVariableSRW, WakeAllConditionVariable, Sleep
api-ms-win-core-synch-l1-1-0.dllAcquireSRWLockExclusive, ReleaseSRWLockExclusive
api-ms-win-core-rtlsupport-l1-1-0.dllRtlLookupFunctionEntry, RtlCaptureContext, RtlVirtualUnwind
api-ms-win-core-profile-l1-1-0.dllQueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0.dllGetVersionExW, GetTickCount, GetSystemTimeAsFileTime
api-ms-win-core-localization-l1-2-0.dllGetLocaleInfoW, FormatMessageW, SetThreadPreferredUILanguages
api-ms-win-core-version-l1-1-0.dllGetFileVersionInfoExW, GetFileVersionInfoSizeExW, VerQueryValueW
api-ms-win-core-console-l2-1-0.dllGetConsoleScreenBufferInfo
api-ms-win-core-registry-l1-1-0.dllRegCloseKey, RegQueryValueExW, RegOpenKeyExW
api-ms-win-core-localization-obsolete-l1-2-0.dllGetUserDefaultUILanguage, GetSystemDefaultUILanguage
api-ms-win-core-memory-l1-1-0.dllCreateFileMappingW, UnmapViewOfFile, MapViewOfFile

Version Infos

DescriptionData
LegalCopyright Microsoft Corporation. All rights reserved.
InternalNameLogman.exe
FileVersion10.0.19041.546 (WinBuild.160101.0800)
CompanyNameMicrosoft Corporation
ProductNameMicrosoft Windows Operating System
ProductVersion10.0.19041.546
FileDescriptionPerformance Log Utility
OriginalFilenameLogman.exe
Translation0x0409 0x04b0

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

Behavior

Click to jump to process

System Behavior

General

Start time:21:16:22
Start date:18/11/2020
Path:C:\Users\user\Desktop\logman.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\logman.exe'
Imagebase:0x7ff665a30000
File size:120320 bytes
MD5 hash:CA042C9A80D01C409C740D0437942B4E
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:21:16:22
Start date:18/11/2020
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff724c50000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:4.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:42.9%
    Total number of Nodes:1317
    Total number of Limit Nodes:3

    Graph

    execution_graph 5893 7ff665a418f0 _XcptFilter 5918 7ff665a3f8e0 5919 7ff665a3f8e5 GetProcessHeap HeapFree 5918->5919 5920 7ff665a3f912 5918->5920 5919->5920 5921 7ff665a41460 5922 7ff665a4146f 5921->5922 5923 7ff665a41492 5921->5923 5922->5923 5924 7ff665a4148b ?terminate@ 5922->5924 5924->5923 5965 7ff665a3f850 5966 7ff665a3f86e wcschr 5965->5966 5967 7ff665a3f8a7 5965->5967 5966->5967 5968 7ff665a3f896 5966->5968 5969 7ff665a3c828 3 API calls 5968->5969 5969->5967 5970 7ff665a41050 5973 7ff665a41674 5970->5973 5974 7ff665a416a0 6 API calls 5973->5974 5975 7ff665a41059 5973->5975 5974->5975 5976 7ff665a40d50 5978 7ff665a40d62 5976->5978 5983 7ff665a41528 GetModuleHandleW 5978->5983 5979 7ff665a40dc9 __set_app_type 5980 7ff665a40e06 5979->5980 5981 7ff665a40e1c 5980->5981 5982 7ff665a40e0f __setusermatherr 5980->5982 5982->5981 5984 7ff665a4153d 5983->5984 5984->5979 4405 7ff665a40e30 __wgetmainargs 6057 7ff665a3ae30 _wcsicmp 6082 7ff665a3faa0 6083 7ff665a3fac8 6082->6083 6084 7ff665a3fad3 6083->6084 6090 7ff665a3f9b0 fgetws 6083->6090 6086 7ff665a3fb1d wcschr 6084->6086 6087 7ff665a3fb5a 6084->6087 6088 7ff665a3faf2 6084->6088 6086->6088 6089 7ff665a3c828 3 API calls 6088->6089 6089->6087 6093 7ff665a3f9e5 6090->6093 6091 7ff665a3fa51 ferror 6092 7ff665a3fa4b 6091->6092 6092->6084 6093->6091 6093->6092 6094 7ff665a3fa01 iswspace 6093->6094 6095 7ff665a3fa31 fgetws 6093->6095 6094->6093 6095->6093 6112 7ff665a31010 6113 7ff665a3102a memset 6112->6113 6115 7ff665a31062 6113->6115 6140 7ff665a3f790 6141 7ff665a3f7bb 6140->6141 6144 7ff665a3f806 6140->6144 6142 7ff665a3f7c1 wcschr 6141->6142 6141->6144 6143 7ff665a3c828 3 API calls 6142->6143 6143->6144 6145 7ff665a3fb90 6146 7ff665a3fbb3 6145->6146 6149 7ff665a3fbac 6145->6149 6148 7ff665a3f9b0 4 API calls 6146->6148 6150 7ff665a3fbbc 6146->6150 6147 7ff665a3c828 3 API calls 6147->6149 6148->6150 6150->6147 6150->6149 6151 7ff665a40ffb 6152 7ff665a4100a _exit 6151->6152 6153 7ff665a41013 6151->6153 6152->6153 6154 7ff665a41028 6153->6154 6155 7ff665a4101c _cexit 6153->6155 6155->6154 4406 7ff665a40e80 4407 7ff665a40ea4 4406->4407 4408 7ff665a40eb6 4407->4408 4409 7ff665a40ebf Sleep 4407->4409 4410 7ff665a40edb _amsg_exit 4408->4410 4413 7ff665a40ee7 4408->4413 4409->4407 4411 7ff665a40f38 4410->4411 4412 7ff665a40f56 _initterm 4411->4412 4414 7ff665a40f3c 4411->4414 4415 7ff665a40f73 _IsNonwritableInCurrentImage 4411->4415 4412->4415 4413->4411 4413->4414 4422 7ff665a414a0 SetUnhandledExceptionFilter 4413->4422 4423 7ff665a34ea8 VariantInit HeapSetInformation 4415->4423 4418 7ff665a40fdc exit 4419 7ff665a40fe4 4418->4419 4419->4414 4420 7ff665a40fed _cexit 4419->4420 4420->4414 4422->4413 4540 7ff665a3ddac SetThreadPreferredUILanguages GetStdHandle 4423->4540 4426 7ff665a35731 VariantClear 4428 7ff665a35745 4426->4428 4429 7ff665a35753 4426->4429 4427 7ff665a34f61 CoInitializeEx 4427->4426 4430 7ff665a34f7b 4427->4430 4431 7ff665a3c1fc 72 API calls 4428->4431 4432 7ff665a35751 4429->4432 4578 7ff665a3c270 LoadLibraryW 4429->4578 4606 7ff665a35c2c 4430->4606 4431->4432 4435 7ff665a35789 4432->4435 4436 7ff665a35769 GetProcessHeap HeapFree 4432->4436 4438 7ff665a357b3 4435->4438 4439 7ff665a35793 GetProcessHeap HeapFree 4435->4439 4436->4435 4437 7ff665a34f83 4437->4426 4444 7ff665a34f96 SysAllocString 4437->4444 4445 7ff665a34fbf 4437->4445 4440 7ff665a357dd 4438->4440 4441 7ff665a357bd GetProcessHeap HeapFree 4438->4441 4439->4438 4442 7ff665a357e7 SysFreeString 4440->4442 4443 7ff665a357f3 4440->4443 4441->4440 4442->4443 4446 7ff665a357ff SysFreeString 4443->4446 4452 7ff665a35812 4443->4452 4444->4445 4516 7ff665a34fb5 4444->4516 4448 7ff665a34fc9 4445->4448 4641 7ff665a39768 4445->4641 4446->4452 4448->4426 4449 7ff665a34ff2 _wcsicmp _wcsicmp 4448->4449 4457 7ff665a35042 4448->4457 4449->4457 4450 7ff665a358a9 4454 7ff665a358ca CoUninitialize 4450->4454 4462 7ff665a358d6 4450->4462 4451 7ff665a35899 SysFreeString 4451->4450 4452->4450 4452->4451 4453 7ff665a3567f 4455 7ff665a39b60 250 API calls 4453->4455 4454->4462 4458 7ff665a35693 4455->4458 4456 7ff665a350b8 4459 7ff665a3518b 4456->4459 4460 7ff665a350c5 4456->4460 4457->4453 4457->4456 4458->4426 4473 7ff665a392c8 170 API calls 4458->4473 4466 7ff665a352e4 4459->4466 4467 7ff665a35194 4459->4467 4464 7ff665a350dd 4460->4464 4465 7ff665a3513b 4460->4465 4461 7ff665a359e6 4468 7ff665a35a05 4461->4468 4469 7ff665a359f2 FreeLibrary 4461->4469 4462->4461 4463 7ff665a358f2 GetProcessHeap HeapFree 4462->4463 4472 7ff665a3591f GetProcessHeap HeapFree 4462->4472 4481 7ff665a3594c GetProcessHeap HeapFree 4462->4481 4486 7ff665a35979 GetProcessHeap HeapFree 4462->4486 4504 7ff665a359b3 GetProcessHeap HeapFree 4462->4504 4463->4462 4672 7ff665a39b60 VariantInit CoCreateInstance 4464->4672 4470 7ff665a39b60 250 API calls 4465->4470 4474 7ff665a352ed 4466->4474 4475 7ff665a3532f 4466->4475 4477 7ff665a39b60 250 API calls 4467->4477 4598 7ff665a41080 4468->4598 4469->4468 4478 7ff665a35140 4470->4478 4472->4462 4502 7ff665a356ac 4473->4502 4480 7ff665a39b60 250 API calls 4474->4480 4483 7ff665a35446 4475->4483 4484 7ff665a3533c 4475->4484 4485 7ff665a351a6 4477->4485 4478->4426 4703 7ff665a392c8 4478->4703 4480->4516 4481->4462 4496 7ff665a39b60 250 API calls 4483->4496 4537 7ff665a355b1 4483->4537 4487 7ff665a353bc 4484->4487 4488 7ff665a35345 4484->4488 4485->4426 4507 7ff665a351e4 _wcsicmp 4485->4507 4486->4462 4493 7ff665a35437 4487->4493 4500 7ff665a353d6 4487->4500 4494 7ff665a35349 4488->4494 4495 7ff665a3536d 4488->4495 4489 7ff665a355c9 4497 7ff665a39b60 250 API calls 4489->4497 4490 7ff665a355f4 4490->4426 4499 7ff665a35601 CoCreateInstance 4490->4499 4839 7ff665a3a2d4 VariantInit GetProcessHeap HeapAlloc 4493->4839 4751 7ff665a3a0d0 CoCreateInstance 4494->4751 4766 7ff665a39fc0 CoCreateInstance 4495->4766 4506 7ff665a35467 4496->4506 4508 7ff665a355db 4497->4508 4499->4426 4510 7ff665a35635 4499->4510 4511 7ff665a39b60 250 API calls 4500->4511 4502->4426 4512 7ff665a36334 41 API calls 4502->4512 4504->4462 4506->4426 4531 7ff665a35484 4506->4531 4535 7ff665a3552d 4506->4535 4507->4426 4514 7ff665a35204 4507->4514 4508->4426 4874 7ff665a39a48 VariantInit 4508->4874 4882 7ff665a38f98 VariantInit SysAllocString 4510->4882 4517 7ff665a353ea 4511->4517 4512->4516 4514->4426 4523 7ff665a3521e GetUserNameExW 4514->4523 4516->4426 4517->4426 4823 7ff665a3acbc VariantInit 4517->4823 4525 7ff665a35241 GetLastError 4523->4525 4529 7ff665a3525d 4523->4529 4525->4529 4526 7ff665a36334 41 API calls 4526->4516 4529->4426 4746 7ff665a3c828 4529->4746 4530 7ff665a354f3 LoadStringW 4530->4426 4532 7ff665a35513 4530->4532 4531->4426 4531->4530 4867 7ff665a3c1fc 4532->4867 4535->4426 4536 7ff665a36334 41 API calls 4535->4536 4536->4537 4537->4426 4537->4489 4537->4490 4538 7ff665a35297 4538->4516 4538->4538 4539 7ff665a36334 41 API calls 4538->4539 4539->4516 4541 7ff665a3de19 4540->4541 4546 7ff665a3dfab 4540->4546 4889 7ff665a3e578 GetFileType 4541->4889 4544 7ff665a3de2d GetConsoleScreenBufferInfo 4545 7ff665a3de57 4544->4545 4548 7ff665a3de45 GetLastError 4544->4548 4893 7ff665a3c72c 4545->4893 4547 7ff665a41080 7 API calls 4546->4547 4550 7ff665a34f4e 4547->4550 4548->4545 4550->4426 4550->4427 4551 7ff665a3de87 4897 7ff665a3c948 GetProcessHeap HeapAlloc 4551->4897 4554 7ff665a3de9b 4923 7ff665a3f91c GetProcessHeap HeapAlloc 4554->4923 4559 7ff665a3defa 4560 7ff665a3df0d 4559->4560 4942 7ff665a3d87c 4559->4942 4563 7ff665a3df9b 4560->4563 4564 7ff665a3df1a 4560->4564 4565 7ff665a33f88 81 API calls 4563->4565 4951 7ff665a33f88 4564->4951 4567 7ff665a3dfa2 4565->4567 4569 7ff665a3cd84 72 API calls 4567->4569 4577 7ff665a3df96 4569->4577 4570 7ff665a3db30 137 API calls 4570->4559 4577->4546 4579 7ff665a3c2c1 4578->4579 4580 7ff665a3c2a2 GetLastError 4578->4580 4582 7ff665a3c2cb 4579->4582 4583 7ff665a3c2da 4579->4583 4581 7ff665a3c390 4580->4581 4584 7ff665a3c3a6 4581->4584 4585 7ff665a3c39a LocalFree 4581->4585 4586 7ff665a3c1fc 72 API calls 4582->4586 4587 7ff665a3c1fc 72 API calls 4583->4587 4584->4432 4585->4584 4588 7ff665a3c2d8 4586->4588 4589 7ff665a3c2e4 FormatMessageW 4587->4589 4588->4589 4590 7ff665a3c366 4589->4590 4591 7ff665a3c320 FormatMessageW 4589->4591 4593 7ff665a3bdf8 17 API calls 4590->4593 4591->4590 4592 7ff665a3c358 4591->4592 4594 7ff665a3c1fc 72 API calls 4592->4594 4595 7ff665a3c364 4593->4595 4594->4595 4596 7ff665a3c37f FreeLibrary 4595->4596 4597 7ff665a3c1fc 72 API calls 4595->4597 4596->4581 4597->4596 4599 7ff665a41089 4598->4599 4600 7ff665a35a16 4599->4600 4601 7ff665a411d0 RtlCaptureContext RtlLookupFunctionEntry 4599->4601 4600->4418 4600->4419 4602 7ff665a41257 4601->4602 4603 7ff665a41215 RtlVirtualUnwind 4601->4603 5456 7ff665a41194 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 4602->5456 4603->4602 5457 7ff665a35a38 GetCurrentThread OpenThreadToken 4606->5457 4609 7ff665a35f17 LocalFree LocalFree 4609->4437 4610 7ff665a35c5b GetProcessHeap HeapAlloc 4611 7ff665a35c86 4610->4611 4612 7ff665a35c90 4610->4612 4611->4609 4613 7ff665a33f04 _vsnwprintf 4612->4613 4614 7ff665a35cb2 4613->4614 4615 7ff665a35ef7 GetProcessHeap HeapFree 4614->4615 4616 7ff665a35cbc ConvertStringSecurityDescriptorToSecurityDescriptorW 4614->4616 4615->4609 4617 7ff665a35cf9 4616->4617 4618 7ff665a35ce0 GetLastError 4616->4618 4617->4615 4619 7ff665a35d03 InitializeSecurityDescriptor 4617->4619 4618->4617 4620 7ff665a35d1c GetLastError 4619->4620 4621 7ff665a35d35 4619->4621 4620->4621 4621->4615 4622 7ff665a35d3f GetSecurityDescriptorOwner 4621->4622 4623 7ff665a35d5b GetLastError 4622->4623 4624 7ff665a35d74 4622->4624 4623->4624 4624->4615 4625 7ff665a35d7e SetSecurityDescriptorOwner 4624->4625 4626 7ff665a35d9a GetLastError 4625->4626 4627 7ff665a35db3 4625->4627 4626->4627 4627->4615 4628 7ff665a35dbd GetSecurityDescriptorGroup 4627->4628 4629 7ff665a35dd9 GetLastError 4628->4629 4630 7ff665a35df2 4628->4630 4629->4630 4630->4615 4631 7ff665a35dfc SetSecurityDescriptorGroup 4630->4631 4632 7ff665a35e18 GetLastError 4631->4632 4633 7ff665a35e31 4631->4633 4632->4633 4633->4615 4634 7ff665a35e3b GetSecurityDescriptorDacl 4633->4634 4635 7ff665a35e5b GetLastError 4634->4635 4636 7ff665a35e74 4634->4636 4635->4636 4636->4615 4637 7ff665a35e7a SetSecurityDescriptorDacl 4636->4637 4638 7ff665a35e99 GetLastError 4637->4638 4639 7ff665a35eb2 4637->4639 4638->4639 4639->4615 4640 7ff665a35eb8 CoInitializeSecurity 4639->4640 4640->4615 4642 7ff665a397b3 4641->4642 4644 7ff665a39819 4642->4644 4645 7ff665a39990 4642->4645 4659 7ff665a397f8 4642->4659 4643 7ff665a41080 7 API calls 4646 7ff665a39a22 4643->4646 4647 7ff665a39888 _wcsicmp 4644->4647 4648 7ff665a3981e 4644->4648 4649 7ff665a3c828 3 API calls 4645->4649 4646->4448 4650 7ff665a398a4 _wcsicmp 4647->4650 4651 7ff665a39952 4647->4651 4655 7ff665a3c828 3 API calls 4648->4655 4669 7ff665a3994c 4648->4669 4649->4669 4650->4651 4654 7ff665a398c0 _wcsicmp 4650->4654 4653 7ff665a3c828 3 API calls 4651->4653 4652 7ff665a399b6 4657 7ff665a33f04 _vsnwprintf 4652->4657 4652->4659 4665 7ff665a3995c 4653->4665 4654->4651 4658 7ff665a398dc _wcsicmp 4654->4658 4664 7ff665a39831 4655->4664 4656 7ff665a3c828 3 API calls 4656->4652 4660 7ff665a399e7 4657->4660 4658->4651 4661 7ff665a398f8 _wcsicmp 4658->4661 4659->4643 4660->4659 4662 7ff665a399ed SysAllocString 4660->4662 4661->4651 4663 7ff665a39914 4661->4663 4662->4659 4666 7ff665a3c828 3 API calls 4663->4666 4664->4659 4667 7ff665a3c828 3 API calls 4664->4667 4665->4659 4668 7ff665a3c828 3 API calls 4665->4668 4670 7ff665a39864 4666->4670 4667->4670 4668->4669 4669->4652 4669->4656 4669->4659 4670->4659 4670->4670 4671 7ff665a3c828 3 API calls 4670->4671 4671->4669 4673 7ff665a39f1c VariantClear 4672->4673 4675 7ff665a39be0 4672->4675 4674 7ff665a350e2 4673->4674 4674->4426 4684 7ff665a390a4 GetProcessHeap HeapAlloc 4674->4684 4675->4673 4676 7ff665a39c0e 4675->4676 4677 7ff665a39c75 SysAllocString 4675->4677 4678 7ff665a39c6b 4675->4678 4676->4673 4677->4676 4677->4678 4678->4673 4678->4676 4679 7ff665a39d94 VariantClear SysAllocString 4678->4679 4683 7ff665a39dc4 4678->4683 4679->4676 4679->4683 4680 7ff665a392c8 170 API calls 4680->4676 4681 7ff665a33f88 81 API calls 4682 7ff665a39ec8 4681->4682 4682->4673 4682->4680 4683->4673 4683->4676 4683->4681 4683->4682 4685 7ff665a390fb 4684->4685 4686 7ff665a390f1 4684->4686 4687 7ff665a3915a GetFullPathNameW 4685->4687 4688 7ff665a39103 4685->4688 4686->4516 4689 7ff665a39129 GetLastError 4687->4689 4690 7ff665a39180 4687->4690 4691 7ff665a3910f GetCurrentDirectoryW 4688->4691 4700 7ff665a39150 4688->4700 4692 7ff665a39272 GetProcessHeap HeapFree 4689->4692 4696 7ff665a391a0 SysAllocString 4690->4696 4697 7ff665a391f5 SysAllocString 4690->4697 4690->4700 4691->4689 4693 7ff665a39148 4691->4693 4692->4686 4695 7ff665a39297 SysFreeString 4692->4695 4694 7ff665a39239 SysAllocString 4693->4694 4693->4700 4694->4700 4695->4686 4698 7ff665a391c1 4696->4698 4696->4700 4699 7ff665a39209 4697->4699 4697->4700 4698->4692 4702 7ff665a391e1 SysFreeString 4698->4702 4699->4692 4701 7ff665a39222 SysFreeString 4699->4701 4700->4692 4701->4694 4702->4697 4704 7ff665a392f5 4703->4704 4705 7ff665a39379 _wcsicmp 4704->4705 4706 7ff665a39374 4704->4706 4708 7ff665a35159 4704->4708 4705->4706 4707 7ff665a3939e _wcsicmp 4705->4707 4706->4708 4709 7ff665a393f9 SysAllocString 4706->4709 4712 7ff665a39421 4706->4712 4707->4706 4707->4708 4708->4426 4730 7ff665a36334 4708->4730 4709->4708 4709->4712 4711 7ff665a395bd SysFreeString 4711->4708 4725 7ff665a3955d 4712->4725 5475 7ff665a36684 VariantInit VariantInit 4712->5475 4714 7ff665a39549 4716 7ff665a39587 4714->4716 4717 7ff665a3954e 4714->4717 4715 7ff665a39591 5565 7ff665a372d8 4715->5565 5543 7ff665a38428 4716->5543 4720 7ff665a3957d 4717->4720 4721 7ff665a39553 4717->4721 5529 7ff665a38aa8 4720->5529 4722 7ff665a39573 4721->4722 4726 7ff665a39558 4721->4726 5511 7ff665a38830 4722->5511 4723 7ff665a39571 4723->4725 4729 7ff665a390a4 13 API calls 4723->4729 4725->4708 4725->4711 4726->4725 5486 7ff665a38c5c 4726->5486 4729->4725 4731 7ff665a36365 4730->4731 4732 7ff665a3636e 4730->4732 4731->4731 4731->4732 4733 7ff665a36423 SysAllocString 4731->4733 4736 7ff665a363b8 GetProcessHeap HeapAlloc 4731->4736 4732->4516 4734 7ff665a3643a 4733->4734 4735 7ff665a36441 SysAllocString 4733->4735 4734->4732 4741 7ff665a364a2 GetProcessHeap HeapFree 4734->4741 4737 7ff665a36458 SysFreeString 4735->4737 4736->4732 4738 7ff665a363ed LoadStringW 4736->4738 4737->4734 4743 7ff665a3648e SysFreeString 4737->4743 4739 7ff665a3c1cc 20 API calls 4738->4739 4742 7ff665a36418 4739->4742 4741->4732 5750 7ff665a3b93c GetStdHandle 4742->5750 4743->4734 4747 7ff665a3c847 4746->4747 4747->4747 4748 7ff665a3c89c 4747->4748 4749 7ff665a3c866 GetProcessHeap HeapAlloc 4747->4749 4748->4538 4749->4748 4750 7ff665a3c88e memmove 4749->4750 4750->4748 4752 7ff665a35352 4751->4752 4752->4426 4753 7ff665a3ae48 4752->4753 4754 7ff665a3ae7f 4753->4754 4755 7ff665a3ae89 GetProcessHeap HeapAlloc 4754->4755 4756 7ff665a3aeba 4754->4756 4755->4756 4757 7ff665a3aec4 4755->4757 4756->4516 4758 7ff665a3af3d qsort 4757->4758 4763 7ff665a3af9e 4757->4763 4759 7ff665a3af62 4758->4759 4764 7ff665a3af8c 4758->4764 4760 7ff665a3b530 105 API calls 4759->4760 4759->4763 4759->4764 4760->4759 4761 7ff665a3bdf8 17 API calls 4761->4763 4762 7ff665a3aff8 GetProcessHeap HeapFree 4762->4756 4763->4762 4765 7ff665a3afc1 SysFreeString 4763->4765 4764->4761 4765->4763 4767 7ff665a3a00f SysAllocString 4766->4767 4770 7ff665a3a02b 4766->4770 4767->4770 4768 7ff665a3a0a1 SysFreeString 4769 7ff665a3537d 4768->4769 4769->4426 4771 7ff665a3b530 GetProcessHeap HeapAlloc 4769->4771 4770->4768 4770->4769 4772 7ff665a3b59d 4771->4772 4773 7ff665a3b593 4771->4773 4775 7ff665a3b5bc StringFromGUID2 4772->4775 4776 7ff665a3b79e GetProcessHeap HeapFree 4772->4776 4774 7ff665a41080 7 API calls 4773->4774 4777 7ff665a3539f 4774->4777 4778 7ff665a3b5d9 GetLastError 4775->4778 4779 7ff665a3b5fb 4775->4779 4776->4773 4777->4426 4799 7ff665a3bdf8 GetStdHandle 4777->4799 4778->4776 4778->4779 4780 7ff665a3b630 4779->4780 4781 7ff665a3b600 _wcsicmp 4779->4781 4782 7ff665a3b679 4780->4782 4784 7ff665a3c1fc 72 API calls 4780->4784 4781->4780 4783 7ff665a3b616 _wcsicmp 4781->4783 4785 7ff665a3c1cc 20 API calls 4782->4785 4783->4776 4783->4780 4789 7ff665a3b652 4784->4789 4786 7ff665a3b68b 4785->4786 4786->4776 4788 7ff665a3bdf8 17 API calls 4786->4788 4787 7ff665a3bdf8 17 API calls 4787->4789 4792 7ff665a3b6a2 4788->4792 4789->4787 4790 7ff665a3b66b 4789->4790 4791 7ff665a3bdf8 17 API calls 4790->4791 4791->4782 4792->4776 5765 7ff665a3b03c VariantInit VariantInit VariantInit GetProcessHeap HeapAlloc 4792->5765 4795 7ff665a3b03c 45 API calls 4796 7ff665a3b746 4795->4796 4796->4776 4797 7ff665a3b783 4796->4797 4798 7ff665a3b03c 45 API calls 4796->4798 4797->4776 4798->4797 4800 7ff665a3c079 GetLastError 4799->4800 4801 7ff665a3be3a 4799->4801 4802 7ff665a3c085 4800->4802 4803 7ff665a3be4f 4801->4803 5790 7ff665a3bd04 4801->5790 4806 7ff665a3c098 GetProcessHeap HeapFree 4802->4806 4810 7ff665a3bedd 4802->4810 4805 7ff665a3e578 3 API calls 4803->4805 4803->4810 4807 7ff665a3be65 4805->4807 4806->4810 4808 7ff665a3bf11 4807->4808 4813 7ff665a3be6d 4807->4813 4808->4810 4812 7ff665a3bf40 GetProcessHeap HeapAlloc 4808->4812 4809 7ff665a3be72 WriteConsoleW 4811 7ff665a3bea0 GetLastError 4809->4811 4809->4813 4810->4516 4811->4813 4814 7ff665a3bf68 4812->4814 4815 7ff665a3bf72 WideCharToMultiByte 4812->4815 4813->4809 4816 7ff665a3bed9 4813->4816 4814->4810 4817 7ff665a3bfbc 4815->4817 4818 7ff665a3bfac GetLastError 4815->4818 4816->4810 4819 7ff665a3bee4 GetLastError 4816->4819 4817->4802 4820 7ff665a3c02c WriteFile 4817->4820 4821 7ff665a3c050 4817->4821 4818->4817 4819->4810 4820->4821 4822 7ff665a3c054 GetLastError 4820->4822 4821->4802 4822->4802 4822->4821 5794 7ff665a3a898 VariantInit VariantInit 4823->5794 4826 7ff665a3adfe VariantClear 4826->4516 4827 7ff665a3acfe SysAllocString 4828 7ff665a3ad19 4827->4828 4829 7ff665a3ad23 4827->4829 4828->4826 5804 7ff665a36148 VariantInit CoCreateInstance 4829->5804 4831 7ff665a3adc5 SysFreeString 4831->4826 4834 7ff665a36148 16 API calls 4835 7ff665a3ad7b 4834->4835 4835->4831 4836 7ff665a3ad85 VariantClear 4835->4836 4837 7ff665a3adaf 4836->4837 4837->4831 4838 7ff665a3bdf8 17 API calls 4837->4838 4838->4831 4840 7ff665a3a36c SysAllocString 4839->4840 4841 7ff665a3a362 4839->4841 4840->4841 4847 7ff665a3a3a4 4840->4847 4842 7ff665a3a64e VariantClear 4841->4842 4843 7ff665a3a684 4842->4843 4844 7ff665a3a664 GetProcessHeap HeapFree 4842->4844 4846 7ff665a3a68e SysFreeString 4843->4846 4850 7ff665a3a69f 4843->4850 4844->4843 4846->4850 4848 7ff665a3c1fc 72 API calls 4847->4848 4849 7ff665a3a3b0 4848->4849 4851 7ff665a3bdf8 17 API calls 4849->4851 4854 7ff665a3a3c9 4849->4854 4852 7ff665a41080 7 API calls 4850->4852 4851->4849 4853 7ff665a3a71b 4852->4853 4853->4516 4855 7ff665a3bdf8 17 API calls 4854->4855 4856 7ff665a3a3d7 CoCreateInstance 4855->4856 4857 7ff665a3a63f SysFreeString 4856->4857 4865 7ff665a3a40b 4856->4865 4857->4842 4858 7ff665a3a631 4859 7ff665a3bdf8 17 API calls 4858->4859 4859->4857 4860 7ff665a3a501 VariantClear 4860->4865 4861 7ff665a3a52b LoadStringW 4861->4865 4862 7ff665a3a5a0 LoadStringW 4863 7ff665a3a5c6 SysFreeString 4862->4863 4862->4865 4863->4865 4865->4857 4865->4858 4865->4860 4865->4861 4865->4862 4866 7ff665a3c1fc 72 API calls 4865->4866 5839 7ff665a3b804 4865->5839 4866->4865 4868 7ff665a3c8bc 52 API calls 4867->4868 4869 7ff665a3c23b 4868->4869 4870 7ff665a3c24f 4869->4870 4871 7ff665a3c0d8 20 API calls 4869->4871 4872 7ff665a41080 7 API calls 4870->4872 4871->4870 4873 7ff665a3c25f 4872->4873 4873->4516 4875 7ff665a39a8a 4874->4875 4876 7ff665a39b1f VariantClear 4875->4876 4878 7ff665a36148 16 API calls 4875->4878 4877 7ff665a39b34 4876->4877 4877->4516 4879 7ff665a39aad 4878->4879 4880 7ff665a39ab3 VariantClear SysAllocString 4879->4880 4881 7ff665a39ae7 4879->4881 4880->4881 4881->4876 4883 7ff665a38fe8 4882->4883 4888 7ff665a38fe1 VariantClear 4882->4888 4885 7ff665a36148 16 API calls 4883->4885 4885->4888 4886 7ff665a39060 SysFreeString 4887 7ff665a3563f 4886->4887 4887->4426 4887->4526 4888->4886 4888->4887 4890 7ff665a3e59e GetConsoleMode 4889->4890 4892 7ff665a3de29 4889->4892 4891 7ff665a3e5b8 GetLastError 4890->4891 4890->4892 4891->4892 4892->4544 4892->4545 4894 7ff665a3c749 4893->4894 4895 7ff665a3c77e 4894->4895 4896 7ff665a3c763 memset 4894->4896 4895->4551 4896->4895 4898 7ff665a3c9b9 GetProcessHeap RtlAllocateHeap 4897->4898 4899 7ff665a3c9af 4897->4899 4900 7ff665a3c9e5 4898->4900 4907 7ff665a3c9ef 4898->4907 4903 7ff665a41080 7 API calls 4899->4903 4901 7ff665a3cd17 GetProcessHeap HeapFree 4900->4901 4901->4899 4902 7ff665a3ccf4 4904 7ff665a3ccf7 GetProcessHeap HeapFree 4902->4904 4905 7ff665a3cd48 4903->4905 4904->4901 4905->4546 4905->4554 4907->4902 4907->4904 4908 7ff665a3ca25 wcstok 4907->4908 5061 7ff665a3c8bc 4907->5061 4908->4902 4921 7ff665a3ca44 4908->4921 4909 7ff665a3c828 GetProcessHeap HeapAlloc memmove 4909->4921 4910 7ff665a3ca59 wcstok 4910->4902 4910->4921 4911 7ff665a3cd6a 4911->4904 4912 7ff665a3cac4 wcstok 4912->4902 4912->4921 4913 7ff665a3ca84 _wcsicmp 4913->4912 4913->4921 4914 7ff665a3ccae wcstok 4914->4902 4914->4921 4915 7ff665a3cb3f GetLocaleInfoW 4917 7ff665a3cb65 GetLocaleInfoW 4915->4917 4915->4921 4916 7ff665a3c8bc 52 API calls 4916->4921 4918 7ff665a3cb8e GetLocaleInfoW 4917->4918 4917->4921 4919 7ff665a3cbb4 GetLocaleInfoW 4918->4919 4918->4921 4920 7ff665a3cbda wcsrchr 4919->4920 4919->4921 4920->4921 4921->4902 4921->4904 4921->4907 4921->4909 4921->4910 4921->4911 4921->4912 4921->4913 4921->4914 4921->4915 4921->4916 4921->4917 4921->4918 4921->4919 4921->4920 4922 7ff665a33f04 _vsnwprintf 4921->4922 4922->4921 4924 7ff665a3deaa 4923->4924 4924->4546 4925 7ff665a3db30 4924->4925 4926 7ff665a3db62 4925->4926 4927 7ff665a3dd50 4926->4927 4930 7ff665a3dbe5 _wcsicmp 4926->4930 4932 7ff665a3dc03 _wcsicmp 4926->4932 4933 7ff665a3c1fc 72 API calls 4926->4933 4934 7ff665a3dcfb GetProcessHeap HeapFree 4926->4934 5216 7ff665a3f5a8 4926->5216 4928 7ff665a3dd59 GetProcessHeap HeapFree 4927->4928 4929 7ff665a3dd7f 4927->4929 4928->4929 4929->4559 4935 7ff665a3fcb8 GetProcessHeap HeapAlloc 4929->4935 4930->4926 4932->4926 4933->4926 4934->4926 4936 7ff665a3fd07 GetProcessHeap HeapAlloc 4935->4936 4937 7ff665a3fcfd 4935->4937 4936->4937 4938 7ff665a3fd63 _wfopen 4936->4938 4941 7ff665a3dee3 4937->4941 5333 7ff665a3fc30 4937->5333 4938->4937 4939 7ff665a3fd8c _errno 4938->4939 4939->4937 4941->4546 4941->4570 4943 7ff665a3bdf8 17 API calls 4942->4943 4950 7ff665a3d89e 4943->4950 4944 7ff665a3da44 4945 7ff665a3bdf8 17 API calls 4944->4945 4946 7ff665a3da52 SysFreeString 4945->4946 4946->4560 4947 7ff665a3c1cc 20 API calls 4947->4950 4948 7ff665a3d921 SystemTimeToVariantTime VarBstrFromDate 4948->4946 4948->4950 4949 7ff665a3bdf8 17 API calls 4949->4950 4950->4944 4950->4947 4950->4948 4950->4949 4952 7ff665a33fdf 4951->4952 4953 7ff665a34832 4951->4953 4955 7ff665a41114 3 API calls 4952->4955 4959 7ff665a33ff5 4952->4959 5360 7ff665a41114 AcquireSRWLockExclusive 4953->5360 4957 7ff665a348d8 4955->4957 4957->4959 5365 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 4957->5365 4960 7ff665a34018 4959->4960 4962 7ff665a41114 3 API calls 4959->4962 4963 7ff665a41114 3 API calls 4960->4963 4966 7ff665a34028 4960->4966 4964 7ff665a34914 4962->4964 4965 7ff665a3498b 4963->4965 4964->4960 5366 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 4964->5366 4965->4966 5367 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 4965->5367 4967 7ff665a34045 4966->4967 4970 7ff665a41114 3 API calls 4966->4970 4972 7ff665a41114 3 API calls 4967->4972 4974 7ff665a34055 4967->4974 4971 7ff665a349cb 4970->4971 4971->4967 5368 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 4971->5368 4973 7ff665a34a50 4972->4973 4973->4974 5369 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 4973->5369 4975 7ff665a34071 4974->4975 4977 7ff665a41114 3 API calls 4974->4977 4980 7ff665a41114 3 API calls 4975->4980 4983 7ff665a34081 4975->4983 4979 7ff665a34a8c 4977->4979 4979->4975 5370 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 4979->5370 4981 7ff665a34b03 4980->4981 4981->4983 5371 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 4981->5371 4984 7ff665a3409d 4983->4984 4986 7ff665a41114 3 API calls 4983->4986 4987 7ff665a41114 3 API calls 4984->4987 4991 7ff665a340ad 4984->4991 4988 7ff665a34b43 4986->4988 4989 7ff665a34c15 4987->4989 4988->4984 5372 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 4988->5372 4989->4991 5373 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 4989->5373 4992 7ff665a340ca 4991->4992 4994 7ff665a41114 3 API calls 4991->4994 4995 7ff665a41114 3 API calls 4992->4995 4999 7ff665a340da 4992->4999 4996 7ff665a34c55 4994->4996 4997 7ff665a34ce1 4995->4997 4996->4992 5374 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 4996->5374 4997->4999 5375 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 4997->5375 4998 7ff665a340f7 5004 7ff665a41114 3 API calls 4998->5004 5007 7ff665a34107 4998->5007 4999->4998 5002 7ff665a41114 3 API calls 4999->5002 5003 7ff665a34d21 5002->5003 5003->4998 5376 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 5003->5376 5005 7ff665a34d91 5004->5005 5005->5007 5377 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 5005->5377 5006 7ff665a34124 5012 7ff665a41114 3 API calls 5006->5012 5015 7ff665a34134 5006->5015 5007->5006 5009 7ff665a41114 3 API calls 5007->5009 5011 7ff665a34dd1 5009->5011 5011->5006 5378 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 5011->5378 5013 7ff665a34e6b 5012->5013 5013->5015 5379 7ff665a410a4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 5013->5379 5340 7ff665a3e084 5015->5340 5020 7ff665a34284 5021 7ff665a342aa 5020->5021 5022 7ff665a3e304 72 API calls 5020->5022 5023 7ff665a34324 5021->5023 5024 7ff665a3e304 72 API calls 5021->5024 5022->5021 5025 7ff665a3434a 5023->5025 5027 7ff665a3e304 72 API calls 5023->5027 5024->5023 5029 7ff665a34391 5025->5029 5030 7ff665a3e304 72 API calls 5025->5030 5027->5025 5031 7ff665a343bd 5029->5031 5033 7ff665a3e4e8 3 API calls 5029->5033 5032 7ff665a34370 5030->5032 5035 7ff665a3e304 72 API calls 5031->5035 5044 7ff665a34416 5031->5044 5352 7ff665a3e3c0 5032->5352 5033->5031 5037 7ff665a343fc 5035->5037 5036 7ff665a3453d 5039 7ff665a3e304 72 API calls 5036->5039 5041 7ff665a3456a 5036->5041 5040 7ff665a3e4e8 3 API calls 5037->5040 5038 7ff665a3e304 72 API calls 5038->5036 5039->5041 5040->5044 5042 7ff665a3464a 5041->5042 5043 7ff665a3e304 72 API calls 5041->5043 5045 7ff665a41080 7 API calls 5042->5045 5043->5042 5044->5036 5044->5038 5046 7ff665a34813 5045->5046 5047 7ff665a3cd84 5046->5047 5050 7ff665a3cda9 5047->5050 5048 7ff665a3ce41 5048->4546 5051 7ff665a3da78 5048->5051 5049 7ff665a3c1fc 72 API calls 5049->5050 5050->5048 5050->5049 5398 7ff665a3d544 GetProcessHeap HeapAlloc 5051->5398 5054 7ff665a3c1fc 72 API calls 5055 7ff665a3da99 5054->5055 5058 7ff665a3dab7 5055->5058 5426 7ff665a3d384 5055->5426 5057 7ff665a3db12 5058->5057 5059 7ff665a3bdf8 17 API calls 5058->5059 5440 7ff665a3ce5c 5058->5440 5059->5058 5067 7ff665a3c5fc 5061->5067 5064 7ff665a3c8e9 LoadStringW 5065 7ff665a3c919 5064->5065 5066 7ff665a3c909 GetLastError 5064->5066 5065->4907 5066->5065 5068 7ff665a3c626 GetProcessHeap HeapAlloc 5067->5068 5074 7ff665a3c689 5067->5074 5069 7ff665a3c65b GetModuleFileNameW 5068->5069 5070 7ff665a3c651 5068->5070 5071 7ff665a3c679 GetLastError 5069->5071 5072 7ff665a3c690 5069->5072 5070->5064 5070->5065 5071->5074 5080 7ff665a404bc 5072->5080 5073 7ff665a3c6eb GetProcessHeap HeapFree 5073->5070 5074->5070 5074->5073 5077 7ff665a3c6a7 GetLastError 5077->5074 5078 7ff665a3c6c3 5078->5074 5079 7ff665a3c6d0 FreeLibrary 5078->5079 5079->5074 5081 7ff665a40506 5080->5081 5113 7ff665a409fc 5080->5113 5145 7ff665a3ff14 5081->5145 5084 7ff665a41080 7 API calls 5086 7ff665a3c69f 5084->5086 5085 7ff665a40539 5087 7ff665a40546 SearchPathW 5085->5087 5085->5113 5086->5077 5086->5078 5088 7ff665a4057e FindResourceExW 5087->5088 5089 7ff665a40a04 FreeLibrary 5087->5089 5091 7ff665a40847 5088->5091 5092 7ff665a405ca 5088->5092 5089->5113 5093 7ff665a40851 FreeLibrary 5091->5093 5091->5113 5094 7ff665a405d8 GetUserDefaultUILanguage 5092->5094 5095 7ff665a408aa 5092->5095 5096 7ff665a3ff14 10 API calls 5093->5096 5097 7ff665a405f9 GetLocaleInfoW 5094->5097 5118 7ff665a40644 5094->5118 5095->5091 5173 7ff665a40200 5095->5173 5099 7ff665a40865 5096->5099 5101 7ff665a40620 wcsncmp 5097->5101 5097->5118 5102 7ff665a4086d 5099->5102 5103 7ff665a409de 5099->5103 5101->5118 5164 7ff665a33f04 5102->5164 5105 7ff665a3ff14 10 API calls 5103->5105 5110 7ff665a409e3 LoadLibraryExW 5105->5110 5106 7ff665a40836 5106->5091 5109 7ff665a409ca FreeLibrary 5106->5109 5108 7ff665a40444 4 API calls 5112 7ff665a408cf 5108->5112 5109->5113 5110->5113 5112->5091 5115 7ff665a408f1 5112->5115 5117 7ff665a4018c 22 API calls 5112->5117 5113->5084 5115->5109 5119 7ff665a4018c 22 API calls 5115->5119 5122 7ff665a40919 5115->5122 5117->5115 5118->5106 5118->5109 5120 7ff665a40700 GetSystemDefaultUILanguage 5118->5120 5123 7ff665a4018c 22 API calls 5118->5123 5152 7ff665a40444 5118->5152 5119->5122 5125 7ff665a4071a 5120->5125 5133 7ff665a407b1 5120->5133 5121 7ff665a40949 5121->5109 5124 7ff665a40994 5121->5124 5126 7ff665a40444 4 API calls 5121->5126 5122->5109 5122->5121 5129 7ff665a4018c 22 API calls 5122->5129 5123->5118 5124->5109 5128 7ff665a409b9 5124->5128 5132 7ff665a4018c 22 API calls 5124->5132 5127 7ff665a40444 4 API calls 5125->5127 5130 7ff665a4097a 5126->5130 5131 7ff665a40732 5127->5131 5128->5091 5128->5109 5129->5121 5130->5124 5135 7ff665a4018c 22 API calls 5130->5135 5131->5091 5139 7ff665a40754 5131->5139 5158 7ff665a4018c 5131->5158 5132->5128 5133->5109 5134 7ff665a40444 4 API calls 5133->5134 5141 7ff665a4080d 5133->5141 5137 7ff665a407f3 5134->5137 5135->5124 5136 7ff665a4018c 22 API calls 5136->5106 5140 7ff665a4018c 22 API calls 5137->5140 5137->5141 5139->5109 5142 7ff665a4018c 22 API calls 5139->5142 5143 7ff665a40781 5139->5143 5140->5141 5141->5106 5141->5109 5141->5136 5142->5143 5143->5109 5143->5133 5144 7ff665a4018c 22 API calls 5143->5144 5144->5133 5146 7ff665a40018 5145->5146 5147 7ff665a3ff3b memset GetVersionExW 5145->5147 5149 7ff665a41080 7 API calls 5146->5149 5148 7ff665a3ff6a GetVersionExW 5147->5148 5151 7ff665a3ff83 5147->5151 5148->5151 5150 7ff665a40028 LoadLibraryW 5149->5150 5150->5085 5150->5113 5151->5146 5153 7ff665a40468 5152->5153 5154 7ff665a40480 5152->5154 5181 7ff665a40b0c 5153->5181 5154->5118 5159 7ff665a4019d 5158->5159 5160 7ff665a40195 5158->5160 5161 7ff665a401c4 5159->5161 5193 7ff665a40044 5159->5193 5160->5139 5165 7ff665a33f33 _vsnwprintf 5164->5165 5166 7ff665a33f54 5164->5166 5165->5166 5167 7ff665a3fe24 5166->5167 5168 7ff665a3fee6 LoadLibraryExW 5167->5168 5169 7ff665a3fe3e CreateFileW 5167->5169 5172 7ff665a3fed9 5168->5172 5170 7ff665a3fe6d CreateFileMappingW CloseHandle 5169->5170 5169->5172 5171 7ff665a3fea5 MapViewOfFile CloseHandle 5170->5171 5170->5172 5171->5172 5172->5113 5174 7ff665a40232 RegOpenKeyExW 5173->5174 5179 7ff665a402e9 5173->5179 5176 7ff665a4026b RegQueryValueExW RegCloseKey 5174->5176 5174->5179 5175 7ff665a41080 7 API calls 5177 7ff665a40311 5175->5177 5176->5179 5180 7ff665a402b4 5176->5180 5177->5108 5178 7ff665a402c0 _wcsnicmp 5178->5179 5178->5180 5179->5175 5180->5178 5180->5179 5182 7ff665a40b2d 5181->5182 5183 7ff665a40b32 bsearch 5181->5183 5182->5183 5186 7ff665a40b67 5182->5186 5183->5186 5184 7ff665a40b6c SetLastError 5185 7ff665a40471 5184->5185 5185->5154 5187 7ff665a40c38 5185->5187 5186->5184 5186->5185 5188 7ff665a40c55 5187->5188 5189 7ff665a40c93 5187->5189 5188->5189 5191 7ff665a40c5e bsearch 5188->5191 5190 7ff665a40d27 SetLastError 5189->5190 5192 7ff665a40d1e 5189->5192 5190->5192 5191->5189 5192->5154 5194 7ff665a4007a 5193->5194 5195 7ff665a40081 _vsnwprintf 5193->5195 5197 7ff665a41080 7 API calls 5194->5197 5195->5194 5196 7ff665a400af 5195->5196 5196->5194 5199 7ff665a3ff14 10 API calls 5196->5199 5198 7ff665a40179 5197->5198 5198->5139 5200 7ff665a400c9 5199->5200 5201 7ff665a3ff14 10 API calls 5200->5201 5202 7ff665a400d3 5201->5202 5203 7ff665a3fe24 6 API calls 5202->5203 5204 7ff665a400e5 5203->5204 5204->5194 5213 7ff665a3fdd8 FindResourceExW 5204->5213 5207 7ff665a3fdd8 2 API calls 5208 7ff665a40100 5207->5208 5209 7ff665a40130 SetLastError 5208->5209 5210 7ff665a4010d 5208->5210 5209->5210 5210->5194 5211 7ff665a40149 UnmapViewOfFile 5210->5211 5212 7ff665a40157 FreeLibrary 5210->5212 5211->5194 5212->5194 5214 7ff665a3fe07 LoadResource 5213->5214 5215 7ff665a3fe00 5213->5215 5215->5207 5217 7ff665a3f5de 5216->5217 5222 7ff665a3f5d4 5216->5222 5218 7ff665a3f618 5217->5218 5219 7ff665a3f633 5217->5219 5217->5222 5220 7ff665a3c828 3 API calls 5218->5220 5221 7ff665a3f620 5219->5221 5234 7ff665a3f650 5219->5234 5238 7ff665a3f675 5219->5238 5220->5221 5221->5222 5224 7ff665a3f68b 5221->5224 5225 7ff665a3f715 5221->5225 5222->4926 5223 7ff665a3f740 GetProcessHeap HeapFree 5223->5222 5226 7ff665a3f6fb 5224->5226 5227 7ff665a3f690 5224->5227 5225->5238 5279 7ff665a3f1d4 5225->5279 5226->5238 5265 7ff665a3f2fc 5226->5265 5229 7ff665a3f695 5227->5229 5230 7ff665a3f6e4 5227->5230 5232 7ff665a3f6ca 5229->5232 5233 7ff665a3f69a 5229->5233 5230->5238 5253 7ff665a3eea8 GetProcessHeap HeapAlloc 5230->5253 5232->5238 5245 7ff665a3f064 GetProcessHeap HeapAlloc 5232->5245 5233->5238 5240 7ff665a3edf8 VariantInit 5233->5240 5235 7ff665a3c1fc 72 API calls 5234->5235 5234->5238 5235->5238 5238->5222 5238->5223 5241 7ff665a3ee29 SysAllocString 5240->5241 5242 7ff665a3ee25 5240->5242 5241->5242 5244 7ff665a3ee49 VariantChangeType 5241->5244 5243 7ff665a3ee7c VariantClear 5242->5243 5243->5238 5244->5242 5244->5243 5246 7ff665a3f0b7 5245->5246 5250 7ff665a3f0c1 5245->5250 5247 7ff665a3f18d GetProcessHeap HeapFree 5246->5247 5248 7ff665a3f1af 5246->5248 5247->5248 5248->5238 5249 7ff665a3f166 GetProcessHeap HeapFree 5249->5246 5250->5249 5251 7ff665a3f12b VarDateFromStr 5250->5251 5251->5249 5252 7ff665a3f14b VariantTimeToSystemTime 5251->5252 5252->5249 5254 7ff665a3ef1f GetLocaleInfoW 5253->5254 5255 7ff665a3ef15 5253->5255 5256 7ff665a3ef47 5254->5256 5257 7ff665a41080 7 API calls 5255->5257 5259 7ff665a3f013 GetProcessHeap HeapFree 5256->5259 5260 7ff665a3ef79 wcstok 5256->5260 5258 7ff665a3f041 5257->5258 5258->5238 5259->5255 5262 7ff665a3ef8f 5260->5262 5261 7ff665a3edf8 4 API calls 5261->5262 5262->5259 5262->5261 5263 7ff665a3efae wcstok 5262->5263 5264 7ff665a3efc5 5262->5264 5263->5262 5263->5264 5264->5259 5266 7ff665a3c828 3 API calls 5265->5266 5267 7ff665a3f32a 5266->5267 5268 7ff665a3f334 5267->5268 5269 7ff665a3f349 GetProcessHeap HeapAlloc 5267->5269 5270 7ff665a3f385 GetProcessHeap HeapAlloc 5267->5270 5268->5238 5271 7ff665a3f374 5269->5271 5275 7ff665a3f37e 5269->5275 5270->5271 5270->5275 5271->5268 5272 7ff665a3f55d GetProcessHeap HeapFree 5271->5272 5272->5268 5273 7ff665a3f506 5273->5271 5276 7ff665a3f50b 5273->5276 5291 7ff665a3e5ec 5273->5291 5274 7ff665a3f4b8 GetProcessHeap HeapFree 5274->5275 5275->5273 5275->5274 5275->5276 5276->5271 5278 7ff665a3f535 GetProcessHeap HeapFree 5276->5278 5278->5271 5280 7ff665a3c828 3 API calls 5279->5280 5281 7ff665a3f1fb 5280->5281 5282 7ff665a3f20a 5281->5282 5283 7ff665a3f29f 5281->5283 5284 7ff665a3f21e GetProcessHeap HeapAlloc 5281->5284 5282->5238 5283->5282 5285 7ff665a3e5ec 26 API calls 5283->5285 5284->5282 5287 7ff665a3f249 5284->5287 5286 7ff665a3f298 5285->5286 5286->5282 5288 7ff665a3f2b6 GetProcessHeap HeapFree 5286->5288 5287->5286 5289 7ff665a3f280 wcstok 5287->5289 5288->5282 5289->5286 5290 7ff665a3f268 _wcsicmp 5289->5290 5290->5286 5290->5287 5305 7ff665a3e65d 5291->5305 5292 7ff665a3e9a7 5294 7ff665a3e9b0 GetProcessHeap HeapFree 5292->5294 5295 7ff665a3e9d4 5292->5295 5293 7ff665a3e667 _wsplitpath_s 5296 7ff665a3e97f 5293->5296 5297 7ff665a3e6be FindFirstFileW 5293->5297 5294->5295 5295->5296 5299 7ff665a3e9d9 GetProcessHeap HeapAlloc 5295->5299 5300 7ff665a3ea4d FindClose 5296->5300 5311 7ff665a3e993 5296->5311 5298 7ff665a3e8c3 wcschr 5297->5298 5297->5305 5301 7ff665a3e8e0 wcschr 5298->5301 5298->5305 5299->5296 5303 7ff665a3ea1b memmove 5299->5303 5300->5311 5301->5305 5302 7ff665a3e70a _wmakepath_s 5302->5296 5302->5305 5303->5296 5304 7ff665a3ea77 5309 7ff665a41080 7 API calls 5304->5309 5305->5292 5305->5293 5305->5296 5305->5302 5306 7ff665a3e8a3 FindNextFileW 5305->5306 5307 7ff665a3eab0 memmove memmove memmove ??3@YAXPEAX malloc 5305->5307 5305->5311 5314 7ff665a3e81e memmove 5305->5314 5316 7ff665a41794 5305->5316 5319 7ff665a41788 5305->5319 5321 7ff665a3ebf0 5305->5321 5306->5305 5307->5305 5308 7ff665a41788 ??3@YAXPEAX 5308->5304 5310 7ff665a3ea88 5309->5310 5310->5276 5311->5304 5311->5308 5314->5305 5329 7ff665a417d4 5316->5329 5320 7ff665a417b9 ??3@YAXPEAX 5319->5320 5323 7ff665a3ec19 5321->5323 5322 7ff665a3ecbc 5322->5305 5323->5322 5324 7ff665a3ec7e 5323->5324 5325 7ff665a41794 malloc 5323->5325 5324->5322 5326 7ff665a3ec8b memmove 5324->5326 5325->5324 5326->5322 5327 7ff665a3ecad 5326->5327 5328 7ff665a41788 ??3@YAXPEAX 5327->5328 5328->5322 5330 7ff665a417f2 malloc 5329->5330 5331 7ff665a417a6 5330->5331 5332 7ff665a417e3 5330->5332 5331->5305 5332->5330 5332->5331 5334 7ff665a3fcaf 5333->5334 5335 7ff665a3fc35 5333->5335 5334->4941 5336 7ff665a3fc57 5335->5336 5337 7ff665a3fc4b fclose 5335->5337 5338 7ff665a3fc60 GetProcessHeap HeapFree 5336->5338 5339 7ff665a3fc85 GetProcessHeap HeapFree 5336->5339 5337->5336 5338->5339 5339->5334 5342 7ff665a3e0b2 5340->5342 5341 7ff665a341ce 5344 7ff665a3e4e8 5341->5344 5342->5341 5380 7ff665a3dfec 5342->5380 5345 7ff665a3e503 5344->5345 5384 7ff665a3e240 5345->5384 5348 7ff665a3e304 5350 7ff665a3e32b 5348->5350 5349 7ff665a3e344 5349->5020 5350->5349 5351 7ff665a3c1fc 72 API calls 5350->5351 5351->5350 5354 7ff665a3e3e7 5352->5354 5353 7ff665a3e240 3 API calls 5356 7ff665a3e42b 5353->5356 5354->5353 5354->5354 5355 7ff665a3e4b2 5355->5029 5356->5355 5357 7ff665a3c1fc 72 API calls 5356->5357 5358 7ff665a3e479 5357->5358 5358->5355 5388 7ff665a3c1cc 5358->5388 5361 7ff665a4112a 5360->5361 5362 7ff665a4112f ReleaseSRWLockExclusive 5361->5362 5364 7ff665a41134 SleepConditionVariableSRW 5361->5364 5364->5361 5381 7ff665a3e044 5380->5381 5382 7ff665a3e011 GetProcessHeap HeapAlloc 5380->5382 5381->5342 5382->5381 5383 7ff665a3e04b memset 5382->5383 5383->5381 5385 7ff665a341ea 5384->5385 5386 7ff665a3e272 5384->5386 5385->5020 5385->5348 5386->5385 5387 7ff665a3dfec 3 API calls 5386->5387 5387->5386 5391 7ff665a3c0d8 FormatMessageW 5388->5391 5392 7ff665a3c12c GetLastError 5391->5392 5393 7ff665a3c153 5391->5393 5395 7ff665a3c13c 5392->5395 5394 7ff665a3bdf8 17 API calls 5393->5394 5394->5395 5396 7ff665a3c17f 5395->5396 5397 7ff665a3c173 LocalFree 5395->5397 5396->5358 5397->5396 5399 7ff665a3d5bd GetProcessHeap HeapAlloc 5398->5399 5400 7ff665a3d5b3 5398->5400 5401 7ff665a3d5f6 GetModuleFileNameW 5399->5401 5415 7ff665a3d5ec 5399->5415 5402 7ff665a41080 7 API calls 5400->5402 5404 7ff665a3d64e GetLastError 5401->5404 5405 7ff665a3d612 5401->5405 5406 7ff665a3d857 5402->5406 5403 7ff665a3d7df GetProcessHeap HeapFree 5407 7ff665a3d824 5403->5407 5408 7ff665a3d804 GetProcessHeap HeapFree 5403->5408 5404->5415 5405->5403 5410 7ff665a3d631 GetFileVersionInfoSizeExW 5405->5410 5406->5054 5407->5400 5409 7ff665a3d829 GetProcessHeap HeapFree 5407->5409 5408->5407 5409->5400 5410->5404 5411 7ff665a3d668 GetProcessHeap HeapAlloc 5410->5411 5412 7ff665a3d699 GetFileVersionInfoExW 5411->5412 5411->5415 5413 7ff665a3d6bc GetLastError 5412->5413 5414 7ff665a3d6db VerQueryValueW 5412->5414 5413->5415 5414->5415 5416 7ff665a3d710 5414->5416 5415->5403 5417 7ff665a33f04 _vsnwprintf 5416->5417 5418 7ff665a3d73c 5417->5418 5418->5403 5419 7ff665a3d746 VerQueryValueW 5418->5419 5419->5415 5420 7ff665a3d76a 5419->5420 5421 7ff665a33f04 _vsnwprintf 5420->5421 5422 7ff665a3d79a 5421->5422 5422->5403 5423 7ff665a3d7a0 VerQueryValueW 5422->5423 5423->5415 5424 7ff665a3d7cb 5423->5424 5425 7ff665a3c1cc 20 API calls 5424->5425 5425->5403 5427 7ff665a3d3bf 5426->5427 5434 7ff665a3d48a 5426->5434 5429 7ff665a3d3da 5427->5429 5432 7ff665a3d3f9 5427->5432 5428 7ff665a3d51d 5428->5055 5430 7ff665a3d3e3 5429->5430 5429->5434 5431 7ff665a3ce5c 20 API calls 5430->5431 5433 7ff665a3d3ed 5431->5433 5432->5428 5432->5433 5437 7ff665a3bdf8 17 API calls 5432->5437 5439 7ff665a3ce5c 20 API calls 5432->5439 5433->5428 5435 7ff665a3bdf8 17 API calls 5433->5435 5434->5428 5434->5433 5436 7ff665a3bdf8 17 API calls 5434->5436 5438 7ff665a3ce5c 20 API calls 5434->5438 5435->5428 5436->5434 5437->5432 5438->5434 5439->5432 5441 7ff665a3ce7c 5440->5441 5453 7ff665a3c198 5441->5453 5443 7ff665a3cf63 5443->5058 5445 7ff665a3bdf8 17 API calls 5446 7ff665a3cf1c 5445->5446 5447 7ff665a3cf3f 5446->5447 5449 7ff665a3cf28 5446->5449 5448 7ff665a3bdf8 17 API calls 5447->5448 5451 7ff665a3cf3d 5448->5451 5450 7ff665a3c198 20 API calls 5449->5450 5450->5451 5452 7ff665a3bdf8 17 API calls 5451->5452 5452->5443 5454 7ff665a3c0d8 20 API calls 5453->5454 5455 7ff665a3c1bd 5454->5455 5455->5443 5455->5445 5458 7ff665a35a7e GetLastError 5457->5458 5459 7ff665a35a96 5457->5459 5458->5459 5460 7ff665a35aa8 GetCurrentProcess OpenProcessToken 5459->5460 5461 7ff665a35bf8 5459->5461 5469 7ff665a35ae9 5459->5469 5462 7ff665a35ad1 GetLastError 5460->5462 5460->5469 5463 7ff665a35c07 CloseHandle 5461->5463 5464 7ff665a35c13 5461->5464 5462->5469 5463->5464 5464->4609 5464->4610 5465 7ff665a35b20 GetProcessHeap HeapAlloc 5465->5461 5467 7ff665a35b50 GetTokenInformation 5465->5467 5466 7ff665a35b00 GetProcessHeap HeapFree 5466->5465 5468 7ff665a35b7c GetLastError 5467->5468 5467->5469 5468->5469 5469->5461 5469->5465 5469->5466 5470 7ff665a35ba2 5469->5470 5471 7ff665a35bd6 GetProcessHeap HeapFree 5470->5471 5472 7ff665a35ba6 ConvertSidToStringSidW 5470->5472 5471->5461 5473 7ff665a35bbc GetLastError 5472->5473 5474 7ff665a35bd4 5472->5474 5473->5471 5474->5471 5478 7ff665a366dc 5475->5478 5480 7ff665a3676c 5475->5480 5476 7ff665a366e5 _wcsicmp 5477 7ff665a36716 _wcsicmp 5476->5477 5476->5478 5477->5478 5478->5476 5479 7ff665a369e7 VariantClear VariantClear 5478->5479 5478->5480 5481 7ff665a36a10 5479->5481 5480->5479 5484 7ff665a3681e 5480->5484 5584 7ff665a364e4 SystemTimeToFileTime 5480->5584 5481->4714 5481->4715 5481->4725 5483 7ff665a364e4 15 API calls 5485 7ff665a368bf 5483->5485 5484->5479 5484->5483 5484->5485 5485->5479 5487 7ff665a38ca2 5486->5487 5488 7ff665a38cb8 #170 5487->5488 5496 7ff665a38cfe 5487->5496 5510 7ff665a38ccf 5487->5510 5491 7ff665a38cd9 SysAllocString 5488->5491 5488->5510 5489 7ff665a38f40 SysFreeString 5490 7ff665a38f4f 5489->5490 5492 7ff665a38f54 SysFreeString 5490->5492 5493 7ff665a38f63 5490->5493 5491->5496 5491->5510 5492->5493 5494 7ff665a38f68 SafeArrayDestroy 5493->5494 5495 7ff665a38f77 5493->5495 5494->5495 5495->4723 5501 7ff665a38dc4 5496->5501 5496->5510 5598 7ff665a36a54 5496->5598 5498 7ff665a38e26 5502 7ff665a36a54 5 API calls 5498->5502 5499 7ff665a38e0c SafeArrayDestroy 5499->5498 5501->5498 5501->5499 5506 7ff665a38e2f 5501->5506 5501->5510 5502->5506 5504 7ff665a38e77 SafeArrayDestroy 5505 7ff665a38e91 5504->5505 5507 7ff665a36a54 5 API calls 5505->5507 5506->5504 5506->5505 5509 7ff665a38e9a 5506->5509 5506->5510 5507->5509 5508 7ff665a38ed7 SysAllocString 5508->5510 5509->5510 5609 7ff665a38398 5509->5609 5510->5489 5510->5490 5513 7ff665a38863 5511->5513 5512 7ff665a38a79 5512->4723 5513->5512 5514 7ff665a36a54 5 API calls 5513->5514 5516 7ff665a388ca 5513->5516 5514->5516 5515 7ff665a38968 5518 7ff665a389d0 5515->5518 5519 7ff665a38a38 5515->5519 5521 7ff665a38997 SysFreeString 5515->5521 5522 7ff665a389a6 5515->5522 5516->5515 5517 7ff665a3895e 5516->5517 5520 7ff665a3894a SysAllocString 5516->5520 5517->5512 5523 7ff665a38a6a SafeArrayDestroy 5517->5523 5518->5519 5524 7ff665a389fb SysFreeString 5518->5524 5525 7ff665a38a0a 5518->5525 5519->5517 5526 7ff665a38a56 SysFreeString 5519->5526 5520->5515 5520->5517 5521->5522 5522->5518 5527 7ff665a389bc SysAllocString 5522->5527 5523->5512 5524->5525 5525->5519 5528 7ff665a38a20 SysAllocString 5525->5528 5526->5517 5527->5517 5527->5518 5528->5517 5528->5519 5531 7ff665a38adc 5529->5531 5530 7ff665a38c2a 5530->4723 5531->5530 5532 7ff665a36a54 5 API calls 5531->5532 5533 7ff665a38b33 5531->5533 5532->5533 5534 7ff665a38b70 SafeArrayDestroy 5533->5534 5535 7ff665a38b84 5533->5535 5536 7ff665a38bed 5533->5536 5542 7ff665a38b94 5533->5542 5534->5535 5537 7ff665a36a54 5 API calls 5535->5537 5536->5530 5538 7ff665a38c1b SafeArrayDestroy 5536->5538 5537->5542 5538->5530 5539 7ff665a38bc9 SafeArrayDestroy 5540 7ff665a38bdd 5539->5540 5541 7ff665a36a54 5 API calls 5540->5541 5541->5536 5542->5536 5542->5539 5542->5540 5544 7ff665a38463 5543->5544 5545 7ff665a384a3 5544->5545 5546 7ff665a38398 2 API calls 5544->5546 5545->4723 5547 7ff665a38475 5546->5547 5547->5545 5548 7ff665a38488 SysAllocString 5547->5548 5550 7ff665a384ad 5547->5550 5548->5545 5548->5550 5549 7ff665a387ea SysFreeString 5549->5545 5551 7ff665a38552 towlower 5550->5551 5553 7ff665a385c2 5550->5553 5554 7ff665a38570 5550->5554 5560 7ff665a387e3 5550->5560 5551->5551 5551->5554 5552 7ff665a38584 wcsstr 5552->5554 5555 7ff665a3873d 5553->5555 5556 7ff665a386cc _wtoi 5553->5556 5553->5560 5554->5552 5554->5553 5558 7ff665a38760 _wcsicmp 5555->5558 5555->5560 5563 7ff665a38795 5555->5563 5559 7ff665a386f5 5556->5559 5561 7ff665a38777 _wcsicmp 5558->5561 5558->5563 5559->5555 5559->5560 5564 7ff665a38717 _wtoi 5559->5564 5560->5545 5560->5549 5562 7ff665a3879a _wcsicmp 5561->5562 5561->5563 5562->5563 5563->5560 5613 7ff665a37c0c VariantInit 5563->5613 5564->5555 5572 7ff665a3731a 5565->5572 5566 7ff665a375ea 5568 7ff665a375fe 5566->5568 5569 7ff665a375ef SafeArrayDestroy 5566->5569 5567 7ff665a375db SysFreeString 5567->5566 5568->4723 5569->5568 5570 7ff665a373ae _wcsicmp 5570->5572 5577 7ff665a373d3 5570->5577 5571 7ff665a375a1 5576 7ff665a37435 5571->5576 5678 7ff665a36b8c CreateFileW 5571->5678 5572->5570 5572->5576 5572->5577 5581 7ff665a374b1 5572->5581 5573 7ff665a37575 5575 7ff665a36a54 5 API calls 5573->5575 5575->5576 5576->5566 5576->5567 5577->5576 5578 7ff665a37468 wcschr 5577->5578 5577->5581 5579 7ff665a374d7 SysAllocString 5578->5579 5580 7ff665a3748c SysAllocString 5578->5580 5579->5576 5582 7ff665a374f6 5579->5582 5580->5576 5580->5581 5581->5571 5581->5573 5581->5576 5582->5576 5583 7ff665a37517 SysFreeString SysAllocString 5582->5583 5583->5576 5583->5581 5585 7ff665a36529 GetLastError 5584->5585 5586 7ff665a36545 5584->5586 5585->5586 5587 7ff665a3663a VariantInit VariantInit 5586->5587 5588 7ff665a36550 VariantClear 5586->5588 5591 7ff665a3665b 5587->5591 5589 7ff665a3658d SystemTimeToVariantTime 5588->5589 5590 7ff665a3657f 5588->5590 5592 7ff665a365c8 5589->5592 5593 7ff665a365cf VariantClear 5589->5593 5590->5589 5590->5593 5594 7ff665a41080 7 API calls 5591->5594 5592->5587 5592->5591 5596 7ff665a365e4 5593->5596 5597 7ff665a365f2 SystemTimeToVariantTime 5593->5597 5595 7ff665a36669 5594->5595 5595->5484 5596->5592 5596->5597 5597->5592 5599 7ff665a36a87 5598->5599 5600 7ff665a36aa5 SafeArrayCreateVector 5598->5600 5599->5600 5601 7ff665a36aca SafeArrayAccessData 5600->5601 5602 7ff665a36ac3 5600->5602 5601->5602 5607 7ff665a36ae4 5601->5607 5603 7ff665a36b51 5602->5603 5604 7ff665a36b42 SafeArrayUnaccessData 5602->5604 5606 7ff665a36b69 5603->5606 5608 7ff665a36b5a SafeArrayDestroy 5603->5608 5604->5603 5605 7ff665a36aee SysAllocString 5605->5602 5605->5607 5606->5501 5607->5602 5607->5605 5608->5606 5610 7ff665a383af _wcsicmp 5609->5610 5611 7ff665a383cd 5609->5611 5610->5611 5612 7ff665a383d2 _wcsicmp 5610->5612 5611->5508 5611->5510 5612->5611 5614 7ff665a37c88 5613->5614 5615 7ff665a38294 VariantClear 5614->5615 5616 7ff665a37c92 CoCreateInstance 5614->5616 5617 7ff665a382ad SysFreeString 5615->5617 5618 7ff665a382bc 5615->5618 5616->5615 5619 7ff665a37cc5 GetProcessHeap HeapAlloc 5616->5619 5617->5618 5626 7ff665a3832d fclose 5618->5626 5627 7ff665a3833c 5618->5627 5620 7ff665a37cfa 5619->5620 5628 7ff665a37cf0 5619->5628 5621 7ff665a37d02 _wfopen 5620->5621 5643 7ff665a37d65 5620->5643 5623 7ff665a37d24 GetLastError 5621->5623 5624 7ff665a37d43 fgetws 5621->5624 5622 7ff665a38281 5658 7ff665a37924 VariantInit 5622->5658 5623->5615 5624->5643 5626->5627 5629 7ff665a38361 5627->5629 5630 7ff665a38341 GetProcessHeap HeapFree 5627->5630 5628->5615 5631 7ff665a41080 7 API calls 5629->5631 5630->5629 5632 7ff665a3836f 5631->5632 5632->5560 5633 7ff665a37dbc wcsstr 5633->5643 5634 7ff665a37e38 wcstok wcstok 5637 7ff665a37e68 wcstok 5634->5637 5635 7ff665a37df2 wcsstr 5636 7ff665a37e15 wcstok 5635->5636 5635->5643 5636->5637 5637->5643 5638 7ff665a37f36 SysAllocString 5638->5628 5638->5643 5639 7ff665a37f27 SysFreeString 5639->5638 5640 7ff665a35f50 10 API calls 5640->5643 5641 7ff665a380eb VariantClear 5641->5643 5642 7ff665a38138 SysAllocString 5642->5628 5642->5643 5643->5615 5643->5622 5643->5628 5643->5633 5643->5634 5643->5635 5643->5638 5643->5639 5643->5640 5643->5641 5643->5642 5644 7ff665a38204 VariantClear 5643->5644 5646 7ff665a3761c VariantInit wcstok 5643->5646 5644->5643 5647 7ff665a378e7 VariantClear 5646->5647 5648 7ff665a37683 5646->5648 5647->5643 5648->5647 5649 7ff665a3768b isspace 5648->5649 5650 7ff665a376ab VariantClear SysAllocString 5648->5650 5652 7ff665a378c0 wcstok 5648->5652 5653 7ff665a37889 VariantClear 5648->5653 5654 7ff665a37725 VariantInit VariantInit 5648->5654 5655 7ff665a37863 VariantClear VariantClear 5648->5655 5656 7ff665a3777e VariantClear 5648->5656 5657 7ff665a377e4 VariantClear 5648->5657 5649->5648 5649->5650 5650->5648 5651 7ff665a378e2 5650->5651 5651->5647 5652->5647 5652->5648 5653->5648 5654->5648 5655->5647 5655->5648 5656->5648 5657->5648 5661 7ff665a3798b 5658->5661 5659 7ff665a37b61 VariantClear 5660 7ff665a37b76 5659->5660 5663 7ff665a41080 7 API calls 5660->5663 5661->5659 5662 7ff665a379ba VariantClear 5661->5662 5667 7ff665a379e5 5662->5667 5664 7ff665a37be0 5663->5664 5664->5628 5665 7ff665a37b5f 5665->5659 5667->5659 5667->5665 5668 7ff665a37ab5 VariantClear 5667->5668 5669 7ff665a37b24 VariantClear 5667->5669 5670 7ff665a35f50 VariantInit 5667->5670 5668->5667 5669->5667 5677 7ff665a35fac 5670->5677 5671 7ff665a360c2 VariantClear 5672 7ff665a360db 5671->5672 5674 7ff665a41080 7 API calls 5672->5674 5673 7ff665a35fdb VariantClear 5673->5677 5675 7ff665a3612c 5674->5675 5675->5667 5676 7ff665a36097 5676->5671 5677->5671 5677->5673 5677->5676 5679 7ff665a36c28 ReadFile 5678->5679 5680 7ff665a36c09 GetLastError 5678->5680 5682 7ff665a36c50 GetLastError 5679->5682 5689 7ff665a36c6f 5679->5689 5681 7ff665a36f0b 5680->5681 5683 7ff665a41080 7 API calls 5681->5683 5684 7ff665a36c76 5682->5684 5685 7ff665a36f1c 5683->5685 5686 7ff665a36ee8 CloseHandle 5684->5686 5687 7ff665a36ef7 5684->5687 5685->5576 5686->5687 5687->5681 5688 7ff665a36efc SafeArrayDestroy 5687->5688 5688->5681 5689->5684 5690 7ff665a36cd4 CloseHandle _wfopen 5689->5690 5692 7ff665a36d32 5689->5692 5691 7ff665a36d08 _errno 5690->5691 5690->5692 5691->5681 5693 7ff665a36dfa SetFilePointerEx 5692->5693 5694 7ff665a36d4f fgetws 5692->5694 5695 7ff665a36eb4 GetLastError 5693->5695 5717 7ff665a36e1a 5693->5717 5704 7ff665a36d72 5694->5704 5698 7ff665a36db8 5695->5698 5696 7ff665a36e26 ReadFile 5696->5695 5696->5717 5697 7ff665a36dc2 ferror 5699 7ff665a36dd9 _errno 5697->5699 5700 7ff665a36fab SafeArrayCreateVector 5697->5700 5698->5684 5701 7ff665a36ed3 fclose 5698->5701 5699->5698 5700->5698 5702 7ff665a36fd8 SafeArrayAccessData 5700->5702 5701->5684 5702->5698 5705 7ff665a36ff8 5702->5705 5703 7ff665a36e5e wcsrchr 5707 7ff665a36e7d SetFilePointerEx 5703->5707 5703->5717 5704->5697 5704->5698 5712 7ff665a36d9d fgetws 5704->5712 5708 7ff665a370fb SetFilePointerEx 5705->5708 5709 7ff665a37003 fseek 5705->5709 5706 7ff665a372ca 5744 7ff665a41348 RtlCaptureContext RtlLookupFunctionEntry 5706->5744 5707->5695 5707->5717 5714 7ff665a37119 GetLastError 5708->5714 5721 7ff665a37138 5708->5721 5713 7ff665a3701d _errno 5709->5713 5724 7ff665a37041 5709->5724 5711 7ff665a36f80 wcstok 5711->5717 5712->5704 5713->5698 5714->5698 5715 7ff665a37046 fgetws 5715->5698 5715->5724 5716 7ff665a3713d ReadFile 5716->5714 5716->5721 5717->5696 5717->5698 5717->5700 5717->5703 5717->5706 5717->5711 5718 7ff665a37168 wcsrchr 5719 7ff665a371d5 wcstok 5718->5719 5720 7ff665a37183 SetFilePointerEx 5718->5720 5719->5721 5720->5714 5720->5721 5721->5698 5721->5706 5721->5716 5721->5718 5721->5719 5733 7ff665a37276 wcstok 5721->5733 5734 7ff665a37249 SysAllocString 5721->5734 5724->5715 5725 7ff665a370c4 SysAllocString 5724->5725 5725->5698 5725->5715 5733->5721 5734->5698 5734->5733 5745 7ff665a413c7 5744->5745 5746 7ff665a41385 RtlVirtualUnwind 5744->5746 5749 7ff665a41194 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5745->5749 5746->5745 5751 7ff665a3b98a GetConsoleMode SetConsoleMode 5750->5751 5752 7ff665a3bb75 GetLastError 5750->5752 5753 7ff665a3b9b2 GetFileType 5751->5753 5759 7ff665a36420 5752->5759 5754 7ff665a3b9e0 ReadFile 5753->5754 5755 7ff665a3ba7f ReadConsoleW 5753->5755 5756 7ff665a3bb22 GetLastError 5754->5756 5760 7ff665a3b9f8 5754->5760 5755->5760 5758 7ff665a3bb4c SetConsoleMode 5756->5758 5757 7ff665a3ba13 MultiByteToWideChar 5757->5760 5758->5759 5759->4733 5760->5753 5760->5757 5761 7ff665a3ba5b ReadFile 5760->5761 5762 7ff665a3bb3e 5760->5762 5764 7ff665a3badf wprintf 5760->5764 5761->5760 5763 7ff665a3bdf8 17 API calls 5762->5763 5763->5758 5764->5760 5764->5764 5766 7ff665a3b0dc 5765->5766 5767 7ff665a3b1ef GetProcessHeap HeapAlloc 5765->5767 5769 7ff665a3b0e4 VariantClear VariantClear VariantClear 5766->5769 5767->5766 5768 7ff665a3b21b GetProcessHeap HeapAlloc 5767->5768 5768->5766 5777 7ff665a3b247 5768->5777 5770 7ff665a3b11d 5769->5770 5771 7ff665a3b187 5770->5771 5772 7ff665a3b167 GetProcessHeap HeapFree 5770->5772 5773 7ff665a3b1ac 5771->5773 5774 7ff665a3b18c GetProcessHeap HeapFree 5771->5774 5772->5771 5775 7ff665a3b1d1 5773->5775 5776 7ff665a3b1b1 GetProcessHeap HeapFree 5773->5776 5774->5773 5775->4776 5775->4795 5776->5775 5777->5766 5778 7ff665a3b2d8 LoadStringW LoadStringW LoadStringW 5777->5778 5786 7ff665a3b36a 5777->5786 5779 7ff665a3c1cc 20 API calls 5778->5779 5781 7ff665a3b344 5779->5781 5780 7ff665a3b395 VariantClear VariantClear VariantClear 5780->5786 5782 7ff665a3bdf8 17 API calls 5781->5782 5783 7ff665a3b35c 5781->5783 5782->5781 5784 7ff665a3bdf8 17 API calls 5783->5784 5784->5786 5785 7ff665a3b460 VariantClear 5785->5786 5786->5769 5786->5780 5786->5785 5787 7ff665a3c1cc 20 API calls 5786->5787 5788 7ff665a3b50e 5786->5788 5787->5786 5788->5769 5789 7ff665a3bdf8 17 API calls 5788->5789 5789->5766 5791 7ff665a3bd38 5790->5791 5792 7ff665a3bd5b GetConsoleOutputCP 5791->5792 5793 7ff665a3bd71 5791->5793 5792->5793 5793->4803 5796 7ff665a3a8f7 5794->5796 5795 7ff665a3abb7 VariantClear VariantClear 5797 7ff665a3abe0 5795->5797 5796->5795 5798 7ff665a3a992 VariantClear 5796->5798 5797->4826 5797->4827 5802 7ff665a3a9c0 5798->5802 5799 7ff665a3abb5 5799->5795 5800 7ff665a3ab7d VariantClear 5800->5802 5801 7ff665a3ab45 VariantClear 5801->5802 5802->5795 5802->5799 5802->5800 5802->5801 5812 7ff665a3a740 5802->5812 5805 7ff665a362c9 VariantClear 5804->5805 5807 7ff665a361c5 5804->5807 5806 7ff665a362e2 5805->5806 5806->4831 5806->4834 5807->5805 5808 7ff665a3626d SysAllocString 5807->5808 5809 7ff665a361f4 5807->5809 5811 7ff665a361f9 5807->5811 5808->5811 5809->5811 5824 7ff665a395e8 FindResourceW 5809->5824 5811->5805 5813 7ff665a3a77d 5812->5813 5814 7ff665a3a787 GetProcessHeap HeapAlloc 5813->5814 5815 7ff665a3a7b2 5813->5815 5814->5815 5816 7ff665a3a7bc StringFromGUID2 5814->5816 5817 7ff665a41080 7 API calls 5815->5817 5819 7ff665a3a7da 5816->5819 5820 7ff665a3a7e1 SysAllocString 5816->5820 5818 7ff665a3a87d 5817->5818 5818->5802 5821 7ff665a3a84e GetProcessHeap HeapFree 5819->5821 5820->5819 5823 7ff665a3a7ff SysFreeString 5820->5823 5821->5815 5823->5821 5825 7ff665a396eb GetLastError 5824->5825 5826 7ff665a3962e LoadResource 5824->5826 5828 7ff665a39666 5825->5828 5826->5825 5827 7ff665a3964f LockResource 5826->5827 5827->5828 5829 7ff665a39670 SizeofResource 5827->5829 5830 7ff665a39719 5828->5830 5831 7ff665a3970a FreeResource 5828->5831 5829->5825 5832 7ff665a39685 GlobalAlloc 5829->5832 5833 7ff665a3972d 5830->5833 5834 7ff665a3971e GlobalUnlock 5830->5834 5831->5830 5832->5825 5835 7ff665a396a6 GlobalLock 5832->5835 5836 7ff665a39745 5833->5836 5837 7ff665a39736 GlobalFree 5833->5837 5834->5833 5835->5825 5838 7ff665a396c2 memmove CreateStreamOnHGlobal 5835->5838 5836->5811 5837->5836 5838->5828 5840 7ff665a3b829 5839->5840 5842 7ff665a3b851 5839->5842 5841 7ff665a33f04 _vsnwprintf 5840->5841 5844 7ff665a3b84c 5841->5844 5843 7ff665a3bd04 GetConsoleOutputCP 5842->5843 5842->5844 5843->5844 5844->4865

    Executed Functions

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Free$Process$String$_wcsicmp$AllocErrorLastLocalVariant$BufferClearConsoleHandleInfoInformationInitInitializeLanguagesLibraryNamePreferredScreenThreadUninitializeUser
    • String ID: * $autosession$session$system
    • API String ID: 458234009-83901310
    • Opcode ID: 4b025d3d5182439bc3d474bdd108457c76c75260f48871e0497235036acfb712
    • Instruction ID: adff83bb3201a7be630cd25d699a51a89c9877a1cbe684d430aec3ccf65280ef
    • Opcode Fuzzy Hash: 4b025d3d5182439bc3d474bdd108457c76c75260f48871e0497235036acfb712
    • Instruction Fuzzy Hash: 70624B25A09A83C6EB109BA9E4525796BB1FF88F88F544135EA4ECB765DF3CEC05C700
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 241 7ff665a3c948-7ff665a3c9ad GetProcessHeap HeapAlloc 242 7ff665a3c9b9-7ff665a3c9e3 GetProcessHeap RtlAllocateHeap 241->242 243 7ff665a3c9af-7ff665a3c9b4 241->243 245 7ff665a3c9ef-7ff665a3ca04 242->245 246 7ff665a3c9e5-7ff665a3c9ea 242->246 244 7ff665a3cd37-7ff665a3cd68 call 7ff665a41080 243->244 248 7ff665a3ca0a 245->248 249 7ff665a3ccf4 245->249 247 7ff665a3cd17-7ff665a3cd32 GetProcessHeap HeapFree 246->247 247->244 252 7ff665a3ca10-7ff665a3ca16 call 7ff665a3c8bc 248->252 251 7ff665a3ccf7-7ff665a3cd12 GetProcessHeap HeapFree 249->251 251->247 255 7ff665a3ca1b-7ff665a3ca1f 252->255 255->251 256 7ff665a3ca25-7ff665a3ca3e wcstok 255->256 257 7ff665a3cd71-7ff665a3cd76 256->257 258 7ff665a3ca44-7ff665a3ca53 call 7ff665a3c828 256->258 257->251 261 7ff665a3ca59-7ff665a3ca78 wcstok 258->261 262 7ff665a3cd6a-7ff665a3cd6f 258->262 261->257 263 7ff665a3ca7e-7ff665a3ca82 261->263 262->251 264 7ff665a3cac4-7ff665a3cadc wcstok 263->264 265 7ff665a3ca84-7ff665a3ca9c _wcsicmp 263->265 264->257 267 7ff665a3cae2-7ff665a3cae6 264->267 265->264 266 7ff665a3ca9e-7ff665a3caad call 7ff665a3c828 265->266 266->262 277 7ff665a3cab3-7ff665a3cabb 266->277 269 7ff665a3cc99 267->269 270 7ff665a3caec-7ff665a3caf1 267->270 271 7ff665a3cc9c-7ff665a3cca8 call 7ff665a3c828 269->271 270->269 273 7ff665a3caf7-7ff665a3cafc 270->273 271->262 274 7ff665a3ccae-7ff665a3ccc6 wcstok 271->274 273->274 275 7ff665a3cb02-7ff665a3cb05 273->275 274->257 281 7ff665a3cccc-7ff665a3ccdb call 7ff665a3c828 274->281 278 7ff665a3cb07-7ff665a3cb0a 275->278 279 7ff665a3cb22-7ff665a3cb2e 275->279 277->264 282 7ff665a3cabd 277->282 283 7ff665a3cc8c-7ff665a3cc94 278->283 284 7ff665a3cb10-7ff665a3cb17 278->284 285 7ff665a3cb30 279->285 286 7ff665a3cb35-7ff665a3cb3a call 7ff665a3c8bc 279->286 281->262 293 7ff665a3cce1-7ff665a3ccee 281->293 282->264 283->286 288 7ff665a3cb19-7ff665a3cb1c 284->288 289 7ff665a3cb3f-7ff665a3cb5e GetLocaleInfoW 284->289 285->286 296 7ff665a3cc81-7ff665a3cc85 286->296 288->274 288->279 294 7ff665a3cb60 289->294 295 7ff665a3cb65-7ff665a3cb86 GetLocaleInfoW 289->295 293->249 293->252 294->295 297 7ff665a3cb88 295->297 298 7ff665a3cb8e-7ff665a3cbac GetLocaleInfoW 295->298 296->251 301 7ff665a3cc87-7ff665a3cc8a 296->301 297->298 299 7ff665a3cbae 298->299 300 7ff665a3cbb4-7ff665a3cbd2 GetLocaleInfoW 298->300 299->300 302 7ff665a3cbda-7ff665a3cbf3 wcsrchr 300->302 303 7ff665a3cbd4 300->303 301->271 304 7ff665a3cbf9-7ff665a3cc02 302->304 305 7ff665a3cbf5 302->305 303->302 306 7ff665a3cc05-7ff665a3cc0d 304->306 305->304 306->306 307 7ff665a3cc0f-7ff665a3cc12 306->307 308 7ff665a3cc61-7ff665a3cc7c call 7ff665a33f04 307->308 309 7ff665a3cc14-7ff665a3cc19 307->309 308->296 310 7ff665a3cc1c-7ff665a3cc24 309->310 310->310 312 7ff665a3cc26-7ff665a3cc29 310->312 312->308 313 7ff665a3cc2b-7ff665a3cc5f call 7ff665a33f04 312->313 313->296
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Process$AllocAllocateFree
    • String ID: %s %s$%s %s[%s|%s]
    • API String ID: 1927113959-619522601
    • Opcode ID: fc8f53e1a38ee0093a996aea513ba28f1b8a8d045b33a8843f2e02462afc6140
    • Instruction ID: 1a276a99805868bb182b47c3e077fc7a0c0edfaf8e25fd9c7c4fe67960cde17c
    • Opcode Fuzzy Hash: fc8f53e1a38ee0093a996aea513ba28f1b8a8d045b33a8843f2e02462afc6140
    • Instruction Fuzzy Hash: 4FB15E21A09B52C6EB108B51E82627867B4FF89F88F858535DA4ECB794EF3CED54C700
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 316 7ff665a404bc-7ff665a40500 317 7ff665a40506-7ff665a40533 call 7ff665a3ff14 LoadLibraryW 316->317 318 7ff665a40a13 316->318 317->318 323 7ff665a40539-7ff665a40540 317->323 320 7ff665a40a15-7ff665a40a44 call 7ff665a41080 318->320 323->320 325 7ff665a40546-7ff665a40578 SearchPathW 323->325 326 7ff665a4057e-7ff665a40586 325->326 327 7ff665a40a04-7ff665a40a0e FreeLibrary 325->327 328 7ff665a40599-7ff665a405a0 326->328 329 7ff665a40588-7ff665a40597 326->329 327->318 330 7ff665a405a4-7ff665a405c4 FindResourceExW 328->330 329->330 331 7ff665a40847-7ff665a4084b 330->331 332 7ff665a405ca-7ff665a405d2 330->332 333 7ff665a40851-7ff665a40867 FreeLibrary call 7ff665a3ff14 331->333 334 7ff665a409ff-7ff665a40a02 331->334 335 7ff665a405d8-7ff665a405f7 GetUserDefaultUILanguage 332->335 336 7ff665a408aa-7ff665a408ac 332->336 346 7ff665a4086d-7ff665a408a5 call 7ff665a33f04 call 7ff665a3fe24 333->346 347 7ff665a409de-7ff665a409f7 call 7ff665a3ff14 LoadLibraryExW 333->347 334->320 339 7ff665a405f9-7ff665a4061e GetLocaleInfoW 335->339 340 7ff665a40648-7ff665a40663 call 7ff665a40444 335->340 336->331 338 7ff665a408ae-7ff665a408d1 call 7ff665a40200 call 7ff665a40444 336->338 338->331 365 7ff665a408d7-7ff665a408df 338->365 339->340 344 7ff665a40620-7ff665a40642 wcsncmp 339->344 351 7ff665a40669-7ff665a40671 340->351 352 7ff665a4083e-7ff665a40841 340->352 344->340 349 7ff665a40644 344->349 361 7ff665a409fc 346->361 347->361 349->340 357 7ff665a4068d 351->357 358 7ff665a40673-7ff665a4068b call 7ff665a4018c 351->358 352->331 355 7ff665a409ca-7ff665a409dc FreeLibrary 352->355 355->320 364 7ff665a40690-7ff665a40693 357->364 358->364 361->334 364->355 370 7ff665a40699-7ff665a4069c 364->370 366 7ff665a408f9-7ff665a408fc 365->366 367 7ff665a408e1-7ff665a408f6 call 7ff665a4018c 365->367 366->355 372 7ff665a40902-7ff665a40905 366->372 367->366 373 7ff665a406ba 370->373 374 7ff665a4069e-7ff665a406b8 call 7ff665a4018c 370->374 376 7ff665a40907-7ff665a40921 call 7ff665a4018c 372->376 377 7ff665a40923 372->377 379 7ff665a406bd-7ff665a406c0 373->379 374->379 381 7ff665a40926-7ff665a40929 376->381 377->381 379->355 383 7ff665a406c6-7ff665a406ca 379->383 381->355 387 7ff665a4092f-7ff665a40933 381->387 384 7ff665a406cc-7ff665a406cf 383->384 385 7ff665a406f1-7ff665a406fa 383->385 388 7ff665a406d1-7ff665a406e3 call 7ff665a4018c 384->388 389 7ff665a406e5 384->389 385->349 390 7ff665a40700-7ff665a40714 GetSystemDefaultUILanguage 385->390 391 7ff665a4095b-7ff665a40964 387->391 392 7ff665a40935-7ff665a40938 387->392 396 7ff665a406e8-7ff665a406eb 388->396 389->396 397 7ff665a407c9 390->397 398 7ff665a4071a-7ff665a40734 call 7ff665a40444 390->398 394 7ff665a409a6-7ff665a409a9 391->394 395 7ff665a40966-7ff665a40982 call 7ff665a40444 391->395 399 7ff665a4093a-7ff665a40951 call 7ff665a4018c 392->399 400 7ff665a40953 392->400 406 7ff665a409ab-7ff665a409bc call 7ff665a4018c 394->406 407 7ff665a409be 394->407 417 7ff665a4099e 395->417 418 7ff665a40984-7ff665a4099c call 7ff665a4018c 395->418 396->355 396->385 401 7ff665a407ce-7ff665a407d7 397->401 398->331 421 7ff665a4073a-7ff665a40742 398->421 402 7ff665a40956-7ff665a40959 399->402 400->402 409 7ff665a407d9-7ff665a407dd 401->409 410 7ff665a40823-7ff665a40826 401->410 402->355 402->391 415 7ff665a409c1-7ff665a409c4 406->415 407->415 409->410 416 7ff665a407df-7ff665a407fb call 7ff665a40444 409->416 419 7ff665a40828-7ff665a40839 call 7ff665a4018c 410->419 420 7ff665a4083b 410->420 415->331 415->355 435 7ff665a40817 416->435 436 7ff665a407fd-7ff665a40815 call 7ff665a4018c 416->436 425 7ff665a409a1-7ff665a409a4 417->425 418->425 419->352 420->352 427 7ff665a4075e 421->427 428 7ff665a40744-7ff665a4075c call 7ff665a4018c 421->428 425->355 425->394 429 7ff665a40761-7ff665a40764 427->429 428->429 429->355 434 7ff665a4076a-7ff665a4076d 429->434 438 7ff665a4078b 434->438 439 7ff665a4076f-7ff665a40789 call 7ff665a4018c 434->439 441 7ff665a4081a-7ff665a4081d 435->441 436->441 443 7ff665a4078e-7ff665a40791 438->443 439->443 441->355 441->410 443->355 446 7ff665a40797-7ff665a4079b 443->446 446->401 447 7ff665a4079d-7ff665a407a0 446->447 448 7ff665a407bb 447->448 449 7ff665a407a2-7ff665a407b9 call 7ff665a4018c 447->449 451 7ff665a407be-7ff665a407c1 448->451 449->451 451->355 453 7ff665a407c7 451->453 453->401
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Library$Free$DefaultLanguageLoadVersion$FindInfoLocalePathResourceSearchSystemUsermemsetwcsncmp
    • String ID: %s\%s$MUI
    • API String ID: 1026695814-2651373239
    • Opcode ID: 90d34b9ab477659f843cde9baaae141349e5483f5f8188f8e86cbd08c41d877b
    • Instruction ID: ad93feec9fa1728b68a7a59c5ece95ad37c9d7c79ef18d26e7395959cac53554
    • Opcode Fuzzy Hash: 90d34b9ab477659f843cde9baaae141349e5483f5f8188f8e86cbd08c41d877b
    • Instruction Fuzzy Hash: 52E1B322A19A86C6FA609B91D5066FAA2B0FF65FC4F444031DE4E8FB89DF3CDD059740
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: FormatFreeLibraryMessage$ErrorLastLoadLocal
    • String ID: pdh.dll
    • API String ID: 1294030245-3378302140
    • Opcode ID: 038b587c4490429e5ccbab2bbc70e84d6e0d849361c5174492147ad67f0e304c
    • Instruction ID: 63adb1ea4a376df0af90365ee40e22e0bbfed9af8cd4c2b14929aabecef7e3ed
    • Opcode Fuzzy Hash: 038b587c4490429e5ccbab2bbc70e84d6e0d849361c5174492147ad67f0e304c
    • Instruction Fuzzy Hash: 09316171A08B41C6E7645B95E46237ABAB0FF89F99F448139DA4ECAB95CF3CDC448700
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 663 7ff665a414a0-7ff665a414b7 SetUnhandledExceptionFilter
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 67d2c54695339df7a5555eb053d7b24bb2de5de247fe95676dd543c2f754d831
    • Instruction ID: 2b7cd916f1a4ecc99859f5fb722c3007a040e4f37529fbe99694fb92b7fdbefa
    • Opcode Fuzzy Hash: 67d2c54695339df7a5555eb053d7b24bb2de5de247fe95676dd543c2f754d831
    • Instruction Fuzzy Hash: 7AB01214F25402C1D604EFA1EC870B012B07F5CB4CFD00430C10DC9120DE5C99AB8700
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 454 7ff665a3bdf8-7ff665a3be34 GetStdHandle 455 7ff665a3c079-7ff665a3c080 GetLastError 454->455 456 7ff665a3be3a-7ff665a3be3d 454->456 457 7ff665a3c085-7ff665a3c090 455->457 458 7ff665a3be5d-7ff665a3be67 call 7ff665a3e578 456->458 459 7ff665a3be3f-7ff665a3be53 call 7ff665a3bd04 456->459 460 7ff665a3c093-7ff665a3c096 457->460 468 7ff665a3be6d 458->468 469 7ff665a3bf11-7ff665a3bf1a 458->469 463 7ff665a3c0b8-7ff665a3c0cd 459->463 467 7ff665a3be59 459->467 460->463 464 7ff665a3c098-7ff665a3c0b3 GetProcessHeap HeapFree 460->464 464->463 467->458 470 7ff665a3be72-7ff665a3be9a WriteConsoleW 468->470 471 7ff665a3bf20-7ff665a3bf2e 469->471 472 7ff665a3c072-7ff665a3c077 469->472 474 7ff665a3be9c-7ff665a3be9e 470->474 475 7ff665a3bea0-7ff665a3beae GetLastError 470->475 471->472 473 7ff665a3bf34-7ff665a3bf3a 471->473 472->463 473->472 476 7ff665a3bf40-7ff665a3bf66 GetProcessHeap HeapAlloc 473->476 477 7ff665a3bec9-7ff665a3becf 474->477 478 7ff665a3bec0 475->478 479 7ff665a3beb0-7ff665a3bebe 475->479 480 7ff665a3bf68-7ff665a3bf6d 476->480 481 7ff665a3bf72-7ff665a3bfaa WideCharToMultiByte 476->481 483 7ff665a3bed9 477->483 484 7ff665a3bed1-7ff665a3bed7 477->484 482 7ff665a3bec5-7ff665a3bec7 478->482 479->482 480->463 485 7ff665a3bfd9-7ff665a3bfe2 481->485 486 7ff665a3bfac-7ff665a3bfba GetLastError 481->486 482->477 487 7ff665a3bedb 482->487 483->487 484->470 484->483 490 7ff665a3bfe4-7ff665a3bfe7 485->490 491 7ff665a3bff2-7ff665a3c020 485->491 488 7ff665a3bfcc 486->488 489 7ff665a3bfbc-7ff665a3bfca 486->489 492 7ff665a3bedd-7ff665a3bedf 487->492 493 7ff665a3bee4-7ff665a3bef2 GetLastError 487->493 494 7ff665a3bfd1-7ff665a3bfd3 488->494 489->494 490->491 495 7ff665a3bfe9-7ff665a3bff0 490->495 491->460 496 7ff665a3c022-7ff665a3c02a 491->496 492->463 497 7ff665a3bf07-7ff665a3bf0c 493->497 498 7ff665a3bef4-7ff665a3bf02 493->498 494->460 494->485 495->490 495->491 499 7ff665a3c02c-7ff665a3c04e WriteFile 496->499 500 7ff665a3c06b-7ff665a3c070 496->500 497->463 498->463 501 7ff665a3c050-7ff665a3c052 499->501 502 7ff665a3c054-7ff665a3c062 GetLastError 499->502 500->460 501->460 502->457 503 7ff665a3c064-7ff665a3c069 502->503 503->460
    APIs
    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF665A3BE1E
    • WriteConsoleW.KERNELBASE(?,?,?,?,?,00000000,00007FF665A3C160), ref: 00007FF665A3BE8C
      • Part of subcall function 00007FF665A3BD04: GetConsoleOutputCP.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,00007FF665A3BE4F), ref: 00007FF665A3BD5B
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,00000000,00007FF665A3C160), ref: 00007FF665A3BEA0
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,00000000,00007FF665A3C160), ref: 00007FF665A3BEE4
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF665A3C079
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00007FF665A3C160), ref: 00007FF665A3C098
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,00007FF665A3C160), ref: 00007FF665A3C0AC
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: ErrorLast$ConsoleHeap$FreeHandleOutputProcessWrite
    • String ID:
    • API String ID: 1006420052-0
    • Opcode ID: fcf909f1a46a8a25542ed62ec4726a942a4def42d310a4e1628c6b41bac06545
    • Instruction ID: db84ba91407cae35a4422f92c6ab08648d02ab321e99a65a16bb541f6bfe0885
    • Opcode Fuzzy Hash: fcf909f1a46a8a25542ed62ec4726a942a4def42d310a4e1628c6b41bac06545
    • Instruction Fuzzy Hash: F371C522A08B97C6F7108B65D856379A5E1FF4AF94F548339DA4ECA394DF3CEC058A10
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF665A3C8E3), ref: 00007FF665A3C626
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF665A3C8E3), ref: 00007FF665A3C63D
    • GetModuleFileNameW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,00007FF665A3C8E3), ref: 00007FF665A3C669
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF665A3C8E3), ref: 00007FF665A3C679
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF665A3C8E3), ref: 00007FF665A3C6EB
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF665A3C8E3), ref: 00007FF665A3C6FF
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Process$AllocErrorFileFreeLastModuleName
    • String ID:
    • API String ID: 4281205730-0
    • Opcode ID: bc5a87fdb0858a539558e43a59203451f03e1861209a5ba02d65ff77e63dff5d
    • Instruction ID: 8060da87c00fac9ef515ac5bb280e10ce9bc749d3da3dde418e098e74b3d9e0b
    • Opcode Fuzzy Hash: bc5a87fdb0858a539558e43a59203451f03e1861209a5ba02d65ff77e63dff5d
    • Instruction Fuzzy Hash: 3A317F31A08B56CAE7109F91E956179BAB0FF89F85B55A138CE4ECB754DF3CEC418A00
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: CurrentImageNonwritableSleep_amsg_exit_cexit_inittermexit
    • String ID:
    • API String ID: 4291973834-0
    • Opcode ID: 122c23335260713928010548e5698b691d9ba90b486abce56278abbc5116aadc
    • Instruction ID: 1f93a48181e8833332704dcd1c9f0e5f444be5d7a5c2e430fdc9596f7b243bad
    • Opcode Fuzzy Hash: 122c23335260713928010548e5698b691d9ba90b486abce56278abbc5116aadc
    • Instruction Fuzzy Hash: 7341E131A18642C6FB609B94E94227962B0BF58F84F94043AD94ECF6A4DF3CED50D740
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 580 7ff665a3ddac-7ff665a3de13 SetThreadPreferredUILanguages GetStdHandle 581 7ff665a3de19-7ff665a3de2b call 7ff665a3e578 580->581 582 7ff665a3dfab 580->582 588 7ff665a3de2d-7ff665a3de43 GetConsoleScreenBufferInfo 581->588 589 7ff665a3de80-7ff665a3de8e call 7ff665a3c72c call 7ff665a3c7bc call 7ff665a3c948 581->589 583 7ff665a3dfb0-7ff665a3dfb2 582->583 586 7ff665a3dfbb-7ff665a3dfe1 call 7ff665a41080 583->586 587 7ff665a3dfb4-7ff665a3dfb7 583->587 587->586 590 7ff665a3dfb9 587->590 592 7ff665a3de6f-7ff665a3de79 588->592 593 7ff665a3de45-7ff665a3de55 GetLastError 588->593 603 7ff665a3de93-7ff665a3de95 589->603 590->586 592->589 596 7ff665a3de57-7ff665a3de64 593->596 597 7ff665a3de66 593->597 599 7ff665a3de6b-7ff665a3de6d 596->599 597->599 599->589 599->592 603->586 604 7ff665a3de9b-7ff665a3deac call 7ff665a3f91c 603->604 604->586 607 7ff665a3deb2-7ff665a3decb call 7ff665a3db30 604->607 610 7ff665a3decd-7ff665a3ded7 607->610 611 7ff665a3deff-7ff665a3df06 607->611 610->611 612 7ff665a3ded9-7ff665a3dee5 call 7ff665a3fcb8 610->612 613 7ff665a3df08 call 7ff665a3d87c 611->613 614 7ff665a3df0d-7ff665a3df14 611->614 612->586 626 7ff665a3deeb-7ff665a3defc call 7ff665a3db30 612->626 613->614 617 7ff665a3df9b-7ff665a3dfa9 call 7ff665a33f88 call 7ff665a3cd84 614->617 618 7ff665a3df1a-7ff665a3df41 614->618 617->583 619 7ff665a3df74-7ff665a3df85 call 7ff665a33f88 call 7ff665a3cd84 618->619 620 7ff665a3df43-7ff665a3df47 618->620 619->586 641 7ff665a3df87-7ff665a3df99 call 7ff665a3da78 call 7ff665a3d130 619->641 623 7ff665a3df49-7ff665a3df4d 620->623 624 7ff665a3df4f-7ff665a3df55 620->624 623->624 628 7ff665a3df59-7ff665a3df5c 623->628 629 7ff665a3df57 624->629 630 7ff665a3df6f-7ff665a3df72 624->630 626->611 628->619 629->620 630->619 635 7ff665a3df5e-7ff665a3df66 630->635 638 7ff665a3df68 635->638 639 7ff665a3df6c 635->639 638->639 639->630 641->583
    APIs
    • SetThreadPreferredUILanguages.KERNELBASE(?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3DDE8
    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3DDF9
      • Part of subcall function 00007FF665A3E578: GetFileType.KERNELBASE(?,?,00000000,00007FF665A3BE65), ref: 00007FF665A3E581
    • GetConsoleScreenBufferInfo.KERNELBASE(?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3DE35
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3DE45
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: BufferConsoleErrorFileHandleInfoLanguagesLastPreferredScreenThreadType
    • String ID:
    • API String ID: 3317847511-0
    • Opcode ID: c0c2edf4c239bd1dd7d92177eb650b69b84330f3cd296dfc37a5a1fd4e1c5b70
    • Instruction ID: 0f08818c6fdec8caef26a8d9b4615560c1b71cdc34abf23269ced52aa81da22a
    • Opcode Fuzzy Hash: c0c2edf4c239bd1dd7d92177eb650b69b84330f3cd296dfc37a5a1fd4e1c5b70
    • Instruction Fuzzy Hash: E6517921B18652C6FB649B61D99327966B5AF88FD8F504239EE4ECF691DE3CEC01C700
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • GetFileType.KERNELBASE(?,?,00000000,00007FF665A3BE65), ref: 00007FF665A3E581
    • GetConsoleMode.KERNELBASE(?,?,00000000,00007FF665A3BE65), ref: 00007FF665A3E5A6
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FF665A3BE65), ref: 00007FF665A3E5B8
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: ConsoleErrorFileLastModeType
    • String ID:
    • API String ID: 2867079444-0
    • Opcode ID: 3d3d397adf416d82cfcc1ddc2963b86d3519c7ab1d8e2ef6ed9c6a3d6a772c55
    • Instruction ID: 6de50b0e3251935b6bb20cba8e322de9449d088bba15e9f4b67749ea90051038
    • Opcode Fuzzy Hash: 3d3d397adf416d82cfcc1ddc2963b86d3519c7ab1d8e2ef6ed9c6a3d6a772c55
    • Instruction Fuzzy Hash: 1AF03A61A18743CBE7501FA5E88617AAAB0EF4DF45B559134DA4BCE240EE2CDC488610
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 654 7ff665a3c8bc-7ff665a3c8e7 call 7ff665a3c5fc 657 7ff665a3c8e9-7ff665a3c907 LoadStringW 654->657 658 7ff665a3c92e-7ff665a3c93f 654->658 657->658 659 7ff665a3c909-7ff665a3c917 GetLastError 657->659 660 7ff665a3c929 659->660 661 7ff665a3c919-7ff665a3c927 659->661 660->658 661->658
    APIs
      • Part of subcall function 00007FF665A3C5FC: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF665A3C8E3), ref: 00007FF665A3C626
      • Part of subcall function 00007FF665A3C5FC: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF665A3C8E3), ref: 00007FF665A3C63D
    • LoadStringW.KERNELBASE ref: 00007FF665A3C8F9
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF665A3C909
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$AllocErrorLastLoadProcessString
    • String ID:
    • API String ID: 687070592-0
    • Opcode ID: 3c50ac57a039396b457700c5dc362494d3ee0ee6d98a9471463f8d0f100e9a64
    • Instruction ID: ddda87e6bc622b0ce67d10b169220ccb175e2ceeacbb9437e1d4bfa9949a9108
    • Opcode Fuzzy Hash: 3c50ac57a039396b457700c5dc362494d3ee0ee6d98a9471463f8d0f100e9a64
    • Instruction Fuzzy Hash: 0B018B66B04B52C6E3104B66F8813697AA4FF88F84F068135DB8ACB394EF38DC41C740
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 662 7ff665a40e30-7ff665a40e78 __wgetmainargs
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: __wgetmainargs
    • String ID:
    • API String ID: 1709950718-0
    • Opcode ID: 731880b81678335e1cbd31024e0b1a71b849c4a077cf4ff238ab084f88e1869f
    • Instruction ID: 186bdc81eef53f657d0e726709a2dd5573a7613f422f728a4748f6a0511eac02
    • Opcode Fuzzy Hash: 731880b81678335e1cbd31024e0b1a71b849c4a077cf4ff238ab084f88e1869f
    • Instruction Fuzzy Hash: 56E075B5E09647D6FB008F90F8424A237B0FF58B08F800032D80C9A230EE3CA949CB80
    Uniqueness

    Uniqueness Score: -1.00%

    Non-executed Functions

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: ErrorFileLast$ArrayCloseCreateDestroyHandleReadSafe
    • String ID: "$;
    • API String ID: 3893635249-2221622046
    • Opcode ID: d5c3a603fb3da9d1355b44d1b765f2842e3f7d65100ed97ad7fe576d628cc7ca
    • Instruction ID: cf139d490d73e741bc763567fda79454b254c0645a1fbb25ca514a4bec4b1575
    • Opcode Fuzzy Hash: d5c3a603fb3da9d1355b44d1b765f2842e3f7d65100ed97ad7fe576d628cc7ca
    • Instruction Fuzzy Hash: 75526E32A08A42C6EB108B65E85227967B1FF89F99F558131DA4ECB7A4DF3DEC05C740
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 843 7ff665a3b03c-7ff665a3b0d6 VariantInit * 3 GetProcessHeap HeapAlloc 844 7ff665a3b0dc 843->844 845 7ff665a3b1ef-7ff665a3b215 GetProcessHeap HeapAlloc 843->845 846 7ff665a3b0e1 844->846 845->844 847 7ff665a3b21b-7ff665a3b241 GetProcessHeap HeapAlloc 845->847 848 7ff665a3b0e4-7ff665a3b11b VariantClear * 3 846->848 847->844 849 7ff665a3b247-7ff665a3b25f 847->849 850 7ff665a3b11d-7ff665a3b12a 848->850 851 7ff665a3b12e-7ff665a3b135 848->851 849->846 855 7ff665a3b265-7ff665a3b282 849->855 850->851 853 7ff665a3b148-7ff665a3b14f 851->853 854 7ff665a3b137-7ff665a3b144 851->854 856 7ff665a3b151-7ff665a3b15e 853->856 857 7ff665a3b162-7ff665a3b165 853->857 854->853 855->846 866 7ff665a3b288-7ff665a3b2a7 855->866 856->857 860 7ff665a3b187-7ff665a3b18a 857->860 861 7ff665a3b167-7ff665a3b182 GetProcessHeap HeapFree 857->861 864 7ff665a3b1ac-7ff665a3b1af 860->864 865 7ff665a3b18c-7ff665a3b1a7 GetProcessHeap HeapFree 860->865 861->860 867 7ff665a3b1d1-7ff665a3b1ed 864->867 868 7ff665a3b1b1-7ff665a3b1cc GetProcessHeap HeapFree 864->868 865->864 866->846 870 7ff665a3b2ad-7ff665a3b2c7 866->870 868->867 870->846 872 7ff665a3b2cd-7ff665a3b2d2 870->872 873 7ff665a3b2d8-7ff665a3b344 LoadStringW * 3 call 7ff665a3c1cc 872->873 874 7ff665a3b36d-7ff665a3b375 872->874 880 7ff665a3b349-7ff665a3b35a call 7ff665a3bdf8 873->880 874->848 875 7ff665a3b37b-7ff665a3b382 874->875 877 7ff665a3b395-7ff665a3b3e5 VariantClear * 3 875->877 878 7ff665a3b384-7ff665a3b391 875->878 877->848 885 7ff665a3b3eb-7ff665a3b40a 877->885 878->877 886 7ff665a3b35c-7ff665a3b36a call 7ff665a3bdf8 880->886 885->848 890 7ff665a3b410-7ff665a3b432 885->890 886->874 890->848 892 7ff665a3b438-7ff665a3b45a 890->892 892->848 894 7ff665a3b460-7ff665a3b489 VariantClear 892->894 894->848 896 7ff665a3b48f-7ff665a3b4a6 894->896 897 7ff665a3b4a8-7ff665a3b4ad 896->897 898 7ff665a3b4df-7ff665a3b4e3 896->898 899 7ff665a3b4bb-7ff665a3b4dd call 7ff665a3c1cc 897->899 900 7ff665a3b4af-7ff665a3b4b9 897->900 901 7ff665a3b4ea-7ff665a3b4fc call 7ff665a3c1cc 898->901 904 7ff665a3b501-7ff665a3b508 899->904 900->901 901->904 904->875 906 7ff665a3b50e-7ff665a3b510 904->906 906->848 907 7ff665a3b516-7ff665a3b524 call 7ff665a3bdf8 906->907 907->848
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$ProcessVariant$AllocClearFreeInitLoadString
    • String ID: %1!-18s! %2!-20s! %3!s!$0x%1!016I64x! %2!-20s! %3!s!$0x%1!02x! %2!-20s! %3!s!$0x%1!08x! %2!-20s! %3!s!
    • API String ID: 1805853320-3335809433
    • Opcode ID: 6490f9479f253628138642087272e6b601dbd61cb1d95f7b7d1f6e7c19e80749
    • Instruction ID: d6c9cf3452de8a5e642ac24752f00839adc1ae8d13c7b13e52c305d2e8d4c94d
    • Opcode Fuzzy Hash: 6490f9479f253628138642087272e6b601dbd61cb1d95f7b7d1f6e7c19e80749
    • Instruction Fuzzy Hash: 67E1C826B05E4ACAEB00DFA5E8551AC6BB1FF89F89B458135DE0E9B764DF38D905C300
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 910 7ff665a35c2c-7ff665a35c55 call 7ff665a35a38 913 7ff665a35f17-7ff665a35f45 LocalFree * 2 910->913 914 7ff665a35c5b-7ff665a35c84 GetProcessHeap HeapAlloc 910->914 915 7ff665a35c86-7ff665a35c8b 914->915 916 7ff665a35c90-7ff665a35cb6 call 7ff665a33f04 914->916 915->913 919 7ff665a35ef7-7ff665a35f12 GetProcessHeap HeapFree 916->919 920 7ff665a35cbc-7ff665a35cde ConvertStringSecurityDescriptorToSecurityDescriptorW 916->920 919->913 921 7ff665a35cf9 920->921 922 7ff665a35ce0-7ff665a35cf7 GetLastError 920->922 923 7ff665a35cfb-7ff665a35cfd 921->923 922->923 923->919 924 7ff665a35d03-7ff665a35d1a InitializeSecurityDescriptor 923->924 925 7ff665a35d1c-7ff665a35d33 GetLastError 924->925 926 7ff665a35d35 924->926 927 7ff665a35d37-7ff665a35d39 925->927 926->927 927->919 928 7ff665a35d3f-7ff665a35d59 GetSecurityDescriptorOwner 927->928 929 7ff665a35d5b-7ff665a35d72 GetLastError 928->929 930 7ff665a35d74 928->930 931 7ff665a35d76-7ff665a35d78 929->931 930->931 931->919 932 7ff665a35d7e-7ff665a35d98 SetSecurityDescriptorOwner 931->932 933 7ff665a35d9a-7ff665a35db1 GetLastError 932->933 934 7ff665a35db3 932->934 935 7ff665a35db5-7ff665a35db7 933->935 934->935 935->919 936 7ff665a35dbd-7ff665a35dd7 GetSecurityDescriptorGroup 935->936 937 7ff665a35dd9-7ff665a35df0 GetLastError 936->937 938 7ff665a35df2 936->938 939 7ff665a35df4-7ff665a35df6 937->939 938->939 939->919 940 7ff665a35dfc-7ff665a35e16 SetSecurityDescriptorGroup 939->940 941 7ff665a35e18-7ff665a35e2f GetLastError 940->941 942 7ff665a35e31 940->942 943 7ff665a35e33-7ff665a35e35 941->943 942->943 943->919 944 7ff665a35e3b-7ff665a35e59 GetSecurityDescriptorDacl 943->944 945 7ff665a35e5b-7ff665a35e72 GetLastError 944->945 946 7ff665a35e74 944->946 947 7ff665a35e76-7ff665a35e78 945->947 946->947 947->919 948 7ff665a35e7a-7ff665a35e97 SetSecurityDescriptorDacl 947->948 949 7ff665a35e99-7ff665a35eb0 GetLastError 948->949 950 7ff665a35eb2 948->950 951 7ff665a35eb4-7ff665a35eb6 949->951 950->951 951->919 952 7ff665a35eb8-7ff665a35ef5 CoInitializeSecurity 951->952 952->919
    APIs
      • Part of subcall function 00007FF665A35A38: GetCurrentThread.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF665A35A4F
      • Part of subcall function 00007FF665A35A38: OpenThreadToken.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF665A35A69
      • Part of subcall function 00007FF665A35A38: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF665A35A7E
      • Part of subcall function 00007FF665A35A38: GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF665A35AA8
      • Part of subcall function 00007FF665A35A38: OpenProcessToken.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF665A35AC1
      • Part of subcall function 00007FF665A35A38: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF665A35AD1
      • Part of subcall function 00007FF665A35A38: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF665A35B00
      • Part of subcall function 00007FF665A35A38: HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF665A35B14
      • Part of subcall function 00007FF665A35A38: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF665A35B24
      • Part of subcall function 00007FF665A35A38: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF665A35B38
      • Part of subcall function 00007FF665A35A38: GetTokenInformation.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FF665A35B6C
      • Part of subcall function 00007FF665A35A38: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF665A35B7C
      • Part of subcall function 00007FF665A35A38: ConvertSidToStringSidW.API-MS-WIN-SECURITY-SDDL-L1-1-0 ref: 00007FF665A35BAC
      • Part of subcall function 00007FF665A35A38: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF665A35BBC
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35C5B
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35C72
    • ConvertStringSecurityDescriptorToSecurityDescriptorW.API-MS-WIN-SECURITY-SDDL-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35CCA
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35CE0
    • InitializeSecurityDescriptor.API-MS-WIN-SECURITY-BASE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35D0C
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35D1C
    • GetSecurityDescriptorOwner.API-MS-WIN-SECURITY-BASE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35D4B
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35D5B
    • SetSecurityDescriptorOwner.API-MS-WIN-SECURITY-BASE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35D8A
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35D9A
    • GetSecurityDescriptorGroup.API-MS-WIN-SECURITY-BASE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35DC9
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35DD9
    • SetSecurityDescriptorGroup.API-MS-WIN-SECURITY-BASE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35E08
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35E18
    • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35F1B
    • LocalFree.API-MS-WIN-CORE-HEAP-L2-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF665A35F2B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: ErrorLast$DescriptorSecurity$Heap$Process$FreeToken$AllocConvertCurrentGroupLocalOpenOwnerStringThread$InformationInitialize
    • String ID: $O:%sG:%sD:(A;;0x7;;;%s)
    • API String ID: 1303351966-3381022231
    • Opcode ID: 033c648bfd06c79449feffb491a42a91789286ccf8333b5359487b0f2f769939
    • Instruction ID: e3eed87c1230302df8fc1a56ce707bc2317ce67100423fed8c2e0a9ec27d8471
    • Opcode Fuzzy Hash: 033c648bfd06c79449feffb491a42a91789286ccf8333b5359487b0f2f769939
    • Instruction Fuzzy Hash: 16913B32A04B43CAE7109FA9E4856B9ABB0FF49F49F418135DE4EDA654DF78EC098710
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 953 7ff665a3d544-7ff665a3d5b1 GetProcessHeap HeapAlloc 954 7ff665a3d5bd-7ff665a3d5ea GetProcessHeap HeapAlloc 953->954 955 7ff665a3d5b3-7ff665a3d5b8 953->955 957 7ff665a3d5f6-7ff665a3d610 GetModuleFileNameW 954->957 958 7ff665a3d5ec-7ff665a3d5f1 954->958 956 7ff665a3d849-7ff665a3d873 call 7ff665a41080 955->956 961 7ff665a3d64e-7ff665a3d65c GetLastError 957->961 962 7ff665a3d612-7ff665a3d62b call 7ff665a33da0 957->962 960 7ff665a3d7df-7ff665a3d802 GetProcessHeap HeapFree 958->960 967 7ff665a3d824-7ff665a3d827 960->967 968 7ff665a3d804-7ff665a3d81f GetProcessHeap HeapFree 960->968 965 7ff665a3d6c8-7ff665a3d6d6 961->965 966 7ff665a3d65e-7ff665a3d663 961->966 962->960 971 7ff665a3d631-7ff665a3d64c GetFileVersionInfoSizeExW 962->971 965->960 966->960 967->956 970 7ff665a3d829-7ff665a3d844 GetProcessHeap HeapFree 967->970 968->967 970->956 971->961 972 7ff665a3d668-7ff665a3d693 GetProcessHeap HeapAlloc 971->972 972->958 973 7ff665a3d699-7ff665a3d6ba GetFileVersionInfoExW 972->973 974 7ff665a3d6bc-7ff665a3d6c3 GetLastError 973->974 975 7ff665a3d6db-7ff665a3d704 VerQueryValueW 973->975 974->965 976 7ff665a3d706-7ff665a3d70b 975->976 977 7ff665a3d710-7ff665a3d740 call 7ff665a33f04 975->977 976->960 977->960 980 7ff665a3d746-7ff665a3d768 VerQueryValueW 977->980 980->976 981 7ff665a3d76a-7ff665a3d79e call 7ff665a33f04 980->981 981->960 984 7ff665a3d7a0-7ff665a3d7c5 VerQueryValueW 981->984 984->976 985 7ff665a3d7cb-7ff665a3d7da call 7ff665a3c1cc 984->985 985->960
    APIs
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,?,00007FF665A3DA8A), ref: 00007FF665A3D586
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,?,00007FF665A3DA8A), ref: 00007FF665A3D59F
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,?,00007FF665A3DA8A), ref: 00007FF665A3D5C1
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,?,00007FF665A3DA8A), ref: 00007FF665A3D5D8
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,?,00007FF665A3DA8A), ref: 00007FF665A3D7DF
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,?,00007FF665A3DA8A), ref: 00007FF665A3D7F3
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,?,00007FF665A3DA8A), ref: 00007FF665A3D804
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,?,00007FF665A3DA8A), ref: 00007FF665A3D818
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,?,00007FF665A3DA8A), ref: 00007FF665A3D829
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,?,00007FF665A3DA8A), ref: 00007FF665A3D83D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Process$Free$Alloc
    • String ID: %1!s! %2!s! (%3!s!)$OriginalFilename$ProductVersion$\StringFileInfo\%04x%04x\%s$\VarFileInfo\Translation
    • API String ID: 3689955550-3739321850
    • Opcode ID: 193d3a76fac85f8b1ad68e31236a513a26f92c021d5d149f58e997a69c21f482
    • Instruction ID: 2ca002f19e89de61b9c220fd07b94c8aa3d787e37da68482e11777215639ff23
    • Opcode Fuzzy Hash: 193d3a76fac85f8b1ad68e31236a513a26f92c021d5d149f58e997a69c21f482
    • Instruction Fuzzy Hash: 91911B22A04B52CAE7109BA1E8412BDBBB1FF89F89B558139CE4D9BB54DF3CD845C700
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$FreeProcessVariant$AllocClearCreateErrorInitInstanceLastString_wfopenfclose
    • String ID:
    • API String ID: 3713371570-410699589
    • Opcode ID: 4aeb28876fd0c5f9e98f8158f35f9bce4b3c4eac5d5b3d2615974a0ab57e64ab
    • Instruction ID: 3d6799617dce0facb9c13331af85d0f15a8594751fba5659446c9102d8e60ef7
    • Opcode Fuzzy Hash: 4aeb28876fd0c5f9e98f8158f35f9bce4b3c4eac5d5b3d2615974a0ab57e64ab
    • Instruction Fuzzy Hash: E922F426B09B46C6EB508BA9E4521B967B1FF89F88B444132DE4ECB764DF78ED45C300
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Variant$AllocClearFreeProcessString$CreateInitInstance
    • String ID: service\*$session\*
    • API String ID: 256460511-2341345938
    • Opcode ID: 9c3114284af54396d1a867b3776e7649df92ddcec5e16d702708d133b37a5ab4
    • Instruction ID: 2f186a4c02290f7e67e87a88f31f9214e965dfdd18f5bd948bff8b9b85680956
    • Opcode Fuzzy Hash: 9c3114284af54396d1a867b3776e7649df92ddcec5e16d702708d133b37a5ab4
    • Instruction Fuzzy Hash: 46D11836609B86C6EB008B65E4521697BB1FF89F88F504036DA4E8BB68DF3DEC45C700
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Find$FileProcessmemmovewcschr$AllocCloseFirstFreeNext_wmakepath_s_wsplitpath_s
    • String ID:
    • API String ID: 3425222978-0
    • Opcode ID: 25ecf0add4ce65bad0817fa65b2af72f8de03f63710de67add37a2d883fc61d8
    • Instruction ID: 4146fde742cf7a51f5adcb198d4593adbdcd143014a24ab5417a2f2406ca5de1
    • Opcode Fuzzy Hash: 25ecf0add4ce65bad0817fa65b2af72f8de03f63710de67add37a2d883fc61d8
    • Instruction Fuzzy Hash: 97C15F32A08B82C6EA108F55E4411A9B7B5FF88BA8F454236DA9D8B7D4DF7CED45C700
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: GlobalResource$FreeLock$AllocCreateErrorFindLastLoadSizeofStreamUnlockmemmove
    • String ID:
    • API String ID: 3361051293-0
    • Opcode ID: aaece6a30071f986e97ff5687322ce59bbb5af9a295880495176d3fc510f560b
    • Instruction ID: 651fcefa603b96532ed66bb2b49c68c5a1985d61dc6d09eba81446a784827982
    • Opcode Fuzzy Hash: aaece6a30071f986e97ff5687322ce59bbb5af9a295880495176d3fc510f560b
    • Instruction Fuzzy Hash: A8414D31A09A42CBE6045F62E645179AAA0FF4AFB5B458334DE6ECB7D4DF3CDC418600
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap_wcsicmp$AllocErrorFromLastProcessString
    • String ID: %1!-40s! %2!-38s!
    • API String ID: 3821196655-2002942371
    • Opcode ID: a6400e080f0d0da4d28cb11b721a14704c8a39ac3192fe0e44e2de7e3d533435
    • Instruction ID: ed6157e8dce3d1c994b1faa91e0a969c16e8b83a2efa92c673ecda1e529687cd
    • Opcode Fuzzy Hash: a6400e080f0d0da4d28cb11b721a14704c8a39ac3192fe0e44e2de7e3d533435
    • Instruction Fuzzy Hash: 2A814A26B15E5AC6EB108B66D85667967B1BF48F88F408135CE0ECB765DF7DEC058300
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Processwcstok$AllocFreeInfoLocale
    • String ID:
    • API String ID: 3763529093-0
    • Opcode ID: 78e75197a721c6ccfec268c0d4a1a5298bad2254f178965899641632965e0cdd
    • Instruction ID: 2626af903aff2734c1e4f31cb588d964542b1c849ee0443b0cce8f23719f2336
    • Opcode Fuzzy Hash: 78e75197a721c6ccfec268c0d4a1a5298bad2254f178965899641632965e0cdd
    • Instruction Fuzzy Hash: CE415B26A24B52CAEB108B66E4011BD66B1FF8AF88F548035DE4EDB754EF3CDD428710
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 4104442557-0
    • Opcode ID: f8145ee991bba0ce992050832f4fadfa445b3df78faf0bbad4ea6aa3408f916c
    • Instruction ID: 74a1a6643736a26a7409ad33b1b1d979c7d6bb777bbf0453cfa4cdf8ee375087
    • Opcode Fuzzy Hash: f8145ee991bba0ce992050832f4fadfa445b3df78faf0bbad4ea6aa3408f916c
    • Instruction Fuzzy Hash: 93110E26A04B45CBEB10DFA5E84516933B4FF58B58F400A35EA6D8A754EF7CD9A4C240
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000000,00000000,?,00007FF665A3DF96,?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3D2B5
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,00007FF665A3DF96,?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3D2CC
    • wcstok.MSVCRT ref: 00007FF665A3D326
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,00007FF665A3DF96,?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3D33A
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,00007FF665A3DF96,?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3D34E
      • Part of subcall function 00007FF665A3BDF8: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF665A3BE1E
      • Part of subcall function 00007FF665A3BDF8: WriteConsoleW.KERNELBASE(?,?,?,?,?,00000000,00007FF665A3C160), ref: 00007FF665A3BE8C
      • Part of subcall function 00007FF665A3BDF8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,00000000,00007FF665A3C160), ref: 00007FF665A3BEA0
      • Part of subcall function 00007FF665A3BDF8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,00000000,00007FF665A3C160), ref: 00007FF665A3BEE4
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$ErrorLastProcess$AllocConsoleFreeHandleWritewcstok
    • String ID:
    • API String ID: 611209975-0
    • Opcode ID: 03d3d2132bfac06fdaf7d0c14ea8e091a477c2e9d1a3a4ea64eafcd154402123
    • Instruction ID: d2a7ce2c5b18e3d54b3657885fd38bf3b32ffd89988e4f52b3c4c348e7528daf
    • Opcode Fuzzy Hash: 03d3d2132bfac06fdaf7d0c14ea8e091a477c2e9d1a3a4ea64eafcd154402123
    • Instruction Fuzzy Hash: AE616A71A08B42C6EB649B65E41317967B2EF48F88F44843AD90ECE699CF7CEC45C700
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Version$memset
    • String ID:
    • API String ID: 3607446104-0
    • Opcode ID: 134a97ef0477d238f73521c359988d66ab773a5adf20d640f6b65f3e2f119e0c
    • Instruction ID: 53df9b5a255570337753c50b0807633d2600510e67b69b9c24bf6773a2d64af0
    • Opcode Fuzzy Hash: 134a97ef0477d238f73521c359988d66ab773a5adf20d640f6b65f3e2f119e0c
    • Instruction Fuzzy Hash: 20313831A18146C6FB748B64E5523BA66F0FFA9F44F504139DA4ECE684EF3DED449A00
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF665A4119F
    • UnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF665A411A8
    • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF665A411AE
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$CurrentProcess
    • String ID:
    • API String ID: 1249254920-0
    • Opcode ID: 190f0c9cf2e63ebc2514097563bd3f5bda4b2f6388e4ef4920ad6970d80fea3c
    • Instruction ID: fa234533473e440f4e4df0355575e9f17c6cfca97a1054c03175a35566f29204
    • Opcode Fuzzy Hash: 190f0c9cf2e63ebc2514097563bd3f5bda4b2f6388e4ef4920ad6970d80fea3c
    • Instruction Fuzzy Hash: DBD0C759E08906C6F75C5BE1FC174751231AF9DF45F155034C94F8A350DD7D5C8A8740
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 605de4a4e25ad8854672d4795f1d7f1ec4ac7b4a79fd9c18f50adee2990bee41
    • Instruction ID: 49742bec6dab0100a7609f32d4d6a38e6688b1b4c8374b7f0fa53f91fc064b02
    • Opcode Fuzzy Hash: 605de4a4e25ad8854672d4795f1d7f1ec4ac7b4a79fd9c18f50adee2990bee41
    • Instruction Fuzzy Hash: B292D071E09B06CAEB10CBA0E8961B833B9AF54F48F40423AD84DDE665EF7DAD55C740
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5afda1d434f605ec6dab8cd345f7cfe15459255fbfbf9c475e7b9b36d858b2e5
    • Instruction ID: acb2d239bd5aba1bc12a48c019926f35e9f0ce79c926480bf0069a77e9b1759a
    • Opcode Fuzzy Hash: 5afda1d434f605ec6dab8cd345f7cfe15459255fbfbf9c475e7b9b36d858b2e5
    • Instruction Fuzzy Hash: B1513872A09A12C2EB619B15D50227967B2AF48FDCF894036CA1DCF694CFBDFC85C640
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Process$ErrorLast$Token$CurrentFreeOpenThread$AllocCloseConvertHandleInformationString
    • String ID: T
    • API String ID: 140808997-3187964512
    • Opcode ID: 10ff41e0a32023c95977cbc58c50dfdc5029366e9b9a691ffb8021a234ae0f48
    • Instruction ID: 20c5fa9a0da2d0a3718eaabd315b8d9604ae3346ac4794af5095894f47f117ed
    • Opcode Fuzzy Hash: 10ff41e0a32023c95977cbc58c50dfdc5029366e9b9a691ffb8021a234ae0f48
    • Instruction Fuzzy Hash: 12510C35A08B46CAE7105FA5E445279ABB0FF8EF95F458134CA4ACA654EF7CEC058610
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Variant$Clear$Init$wcstok$AllocStringisspace
    • String ID: (),
    • API String ID: 638735022-3212918082
    • Opcode ID: 0a63b5d847dfeb361e9bfe18baa8fbb19abfc56681a8e9d21c1c10666a9883a7
    • Instruction ID: 97a839ab0994780213e60400ef1ae3e11e2720fea43e7e991eda500e26deba10
    • Opcode Fuzzy Hash: 0a63b5d847dfeb361e9bfe18baa8fbb19abfc56681a8e9d21c1c10666a9883a7
    • Instruction Fuzzy Hash: 45912736B04E42C6EB018F65E8512A86BB1FF49F89F558132CE4E9B754EF78E945C340
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF665A36420), ref: 00007FF665A3B96D
    • GetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF665A36420), ref: 00007FF665A3B991
    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF665A36420), ref: 00007FF665A3B9A6
    • GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF665A36420), ref: 00007FF665A3B9B5
    • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF665A36420), ref: 00007FF665A3B9E4
    • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0 ref: 00007FF665A3BA32
    • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF665A3BA71
    • ReadConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF665A36420), ref: 00007FF665A3BA83
    • wprintf.MSVCRT ref: 00007FF665A3BAEE
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF665A36420), ref: 00007FF665A3BB22
    • SetConsoleMode.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF665A36420), ref: 00007FF665A3BB52
      • Part of subcall function 00007FF665A3BDF8: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF665A3BE1E
      • Part of subcall function 00007FF665A3BDF8: WriteConsoleW.KERNELBASE(?,?,?,?,?,00000000,00007FF665A3C160), ref: 00007FF665A3BE8C
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,00000000,00000000,?,00007FF665A36420), ref: 00007FF665A3BB75
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Console$FileModeRead$ErrorHandleLast$ByteCharMultiTypeWideWritewprintf
    • String ID: %c %c
    • API String ID: 1390269697-3801459041
    • Opcode ID: 7485b384eabae3195ca0692ecfa4258bdb405900b32f60aab22617bdacb2827f
    • Instruction ID: 9edcfb6d2ee0f7b7a690f1fe98d0d8f900ce1fad8fa82cd5c8f6804ca02f2e0e
    • Opcode Fuzzy Hash: 7485b384eabae3195ca0692ecfa4258bdb405900b32f60aab22617bdacb2827f
    • Instruction Fuzzy Hash: CB518E32A08E55CBE7148F20D4022B87AB2FF49F59F558635DA4ACA7A4DF3DDC458710
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: _wcsicmp$String_wtoi$AllocFreetowlowerwcsstr
    • String ID: cycle$perf$system
    • API String ID: 2625957229-1414367915
    • Opcode ID: a9e2468ff03ee93f3f4897dd50b927cb824294edcf99e113a79a37289d4fc389
    • Instruction ID: 3c130c7e4312899a3171ae0ecfd70efc936fa005721a0b1d08efce1d71d02dde
    • Opcode Fuzzy Hash: a9e2468ff03ee93f3f4897dd50b927cb824294edcf99e113a79a37289d4fc389
    • Instruction Fuzzy Hash: D3C1E826B0AA47C6EB148B6AE8521796BB1FF48F89B544132DA0DCB364DF7DEC45C300
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: _wcsicmp$AllocHeap$ProcessStringmemmove
    • String ID: %s\%s$autosession$legacy$service$session$system
    • API String ID: 2853241229-3132811936
    • Opcode ID: b986bca90d6689e86ebcb196d71dab2db6de9bde0e9eac888a83798d9e7a8da1
    • Instruction ID: 25712423a5f328689cfc679435800028543b2c11603beae5588ea84a6f03a0cf
    • Opcode Fuzzy Hash: b986bca90d6689e86ebcb196d71dab2db6de9bde0e9eac888a83798d9e7a8da1
    • Instruction Fuzzy Hash: 7F81AC22A19A46DAEA50CF10E5521B967B0FF84F18F805635E65ECB6E4EF3CED15C700
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000003,00000000,?,00007FF665A39EE3), ref: 00007FF665A390C6
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000003,00000000,?,00007FF665A39EE3), ref: 00007FF665A390DD
    • GetCurrentDirectoryW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,?,?,?,00000003,00000000,?,00007FF665A39EE3), ref: 00007FF665A39119
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,00000003,00000000,?,00007FF665A39EE3), ref: 00007FF665A39129
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000003,00000000,?,00007FF665A39EE3), ref: 00007FF665A39272
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000003,00000000,?,00007FF665A39EE3), ref: 00007FF665A39286
    • SysFreeString.OLEAUT32 ref: 00007FF665A3929A
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$FreeProcess$AllocCurrentDirectoryErrorLastString
    • String ID:
    • API String ID: 171301060-0
    • Opcode ID: 2888566fb334214c9ef4aeee684fd0fef4db5b9239423247195526b91ba74c5e
    • Instruction ID: 2907d291376b38e26b1492f4a572a1f2c05ace2ba4f8c48015c586457ee9fe88
    • Opcode Fuzzy Hash: 2888566fb334214c9ef4aeee684fd0fef4db5b9239423247195526b91ba74c5e
    • Instruction Fuzzy Hash: F1512B21A08B42CAEA509F96E946179BAB0FF89F85F458135CE4ECB764DF7CEC458700
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00007FF665A3BDF8: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF665A3BE1E
      • Part of subcall function 00007FF665A3BDF8: WriteConsoleW.KERNELBASE(?,?,?,?,?,00000000,00007FF665A3C160), ref: 00007FF665A3BE8C
    • SysFreeString.OLEAUT32 ref: 00007FF665A3DA57
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: ConsoleFreeHandleStringWrite
    • String ID: %1!26s!%2!-20s!$%1!-16s! %2!-6s! = $%1!-20s!$%1!02d!:%2!02d!:%3!02d!$%1!d!$%1!s!$FALSE$TRUE
    • API String ID: 1268984746-2453359417
    • Opcode ID: 5c1517ec00812bcdc8a1b57281dc262cf3bd5ff4232645bd83f1d22e9b88845b
    • Instruction ID: 01fe28d8176f6717951d5f90342622b8217c21f8dc0c3c1dbb1f8b422b6e23a8
    • Opcode Fuzzy Hash: 5c1517ec00812bcdc8a1b57281dc262cf3bd5ff4232645bd83f1d22e9b88845b
    • Instruction Fuzzy Hash: 56516922A0C552C2EB609F64E9522B96771FF45F88F989136DA4ECF998DF2CED45C300
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Variant$ClearInit$_wcsicmp
    • String ID: start$stop
    • API String ID: 4111760150-149793450
    • Opcode ID: 385e3626686d79f64ff0c0fe4a9c1d92f3cb63dcf11f9eaf6d7845ac1b8f8477
    • Instruction ID: d3654ff9a4929b60e1e78928ee22338a8890271ab9ffb20b7a38cb9b2278960a
    • Opcode Fuzzy Hash: 385e3626686d79f64ff0c0fe4a9c1d92f3cb63dcf11f9eaf6d7845ac1b8f8477
    • Instruction Fuzzy Hash: 64C1E922B04A56C6EB118F69E8561B827B1FF48F99B404132DA0ECB765EF79EC85C310
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000001,00000000,00000003,00007FF665A356D4), ref: 00007FF665A363B8
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF665A363CF
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$AllocProcess
    • String ID:
    • API String ID: 1617791916-0
    • Opcode ID: 3b8fd32e934026671a154eaab04067345d8261a616bb3edeb66e502125c838e4
    • Instruction ID: bde894491479189d3b1f5eebab22c4b3ed8ecf1545fe5f6ce09b75d7522e2936
    • Opcode Fuzzy Hash: 3b8fd32e934026671a154eaab04067345d8261a616bb3edeb66e502125c838e4
    • Instruction Fuzzy Hash: F8416E21A08A42C6EA149F56E502179ABB0FF89F94F598134CF5E8B7A4DF3CEC468300
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00007FF665A3C828: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF665A3C866
      • Part of subcall function 00007FF665A3C828: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF665A3C87A
      • Part of subcall function 00007FF665A3C828: memmove.MSVCRT ref: 00007FF665A3C897
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF665A3F349
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0 ref: 00007FF665A3F360
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF665A3F713), ref: 00007FF665A3F55D
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF665A3F713), ref: 00007FF665A3F573
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Process$Alloc$Freememmove
    • String ID:
    • API String ID: 4047584235-0
    • Opcode ID: a179c7c869220021086d0b1c3e626983815b20538cc4e231da7b06faa497f2e8
    • Instruction ID: 12d5189c30d5385ed3925c77a918ce854ad78d8590ac2a4f6fe7c4e557dcd8fe
    • Opcode Fuzzy Hash: a179c7c869220021086d0b1c3e626983815b20538cc4e231da7b06faa497f2e8
    • Instruction Fuzzy Hash: 6671AB22A19B42C6EB148F56E44527966B1EF89F98F588139DE4ECB394DF3DEC45C300
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: String$Free$#170AllocArrayDestroySafe
    • String ID:
    • API String ID: 280707029-0
    • Opcode ID: 2090eb09321799808ec08f1bf7a679c2363292f8ec9890f1625c44d6807c9e25
    • Instruction ID: 2b3ec4224f9eebc0e5ec5d1e8c123a2907391923fa76c6ff9b71ef677c13eb1b
    • Opcode Fuzzy Hash: 2090eb09321799808ec08f1bf7a679c2363292f8ec9890f1625c44d6807c9e25
    • Instruction Fuzzy Hash: 0AA12625B0AA53C6EB109FA6E85217967B1BF48F89B148032EE0DCB765DF7DEC448350
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: TimeVariant$System$ClearInit$ErrorFileLast
    • String ID:
    • API String ID: 3722993077-0
    • Opcode ID: ca731bc622532af89c6b98cbe2234c5eeba0b88abb80220fb6aabdd62e9c7679
    • Instruction ID: 47fc36c7dcb1a57dbdb7c9b50578a152db14b2148126842b09b726454abf337f
    • Opcode Fuzzy Hash: ca731bc622532af89c6b98cbe2234c5eeba0b88abb80220fb6aabdd62e9c7679
    • Instruction Fuzzy Hash: E6416D26A14B92DAE7019FA1D8420BCB7B0FF59F58B45A132DF098B754EF78E895C310
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Process$FreeTime$AllocDateFromSystemVariant
    • String ID:
    • API String ID: 297023416-0
    • Opcode ID: 8ef3c66c08d285beaa8af497a0e25921d9eb69a54ed368faee913849b8511309
    • Instruction ID: 1ce1e9e6b98fe69a7c2313ce397228cc032a29b8d44f263a7d9b3acf955a2ded
    • Opcode Fuzzy Hash: 8ef3c66c08d285beaa8af497a0e25921d9eb69a54ed368faee913849b8511309
    • Instruction Fuzzy Hash: 05310921A18B82C6E7009BA2F94517AAAB1FF8AF84F458135DE4DCB755DF3CE8468600
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Variant$Clear$Init
    • String ID:
    • API String ID: 3740757921-0
    • Opcode ID: f23c89b3d0001e82b7fa9390aff1daa36116dbeea918a5813f2f648cf382305e
    • Instruction ID: f2c737230854b9b345f80cc2ec4095342ff5d5ac36dfb5d4da9859b7749c64b4
    • Opcode Fuzzy Hash: f23c89b3d0001e82b7fa9390aff1daa36116dbeea918a5813f2f648cf382305e
    • Instruction Fuzzy Hash: C0D1A326B05E56C6EB04CFA9E8911A82771FF48F89B554032DE0E9BB68DF79EC45C300
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • _wcsicmp.MSVCRT ref: 00007FF665A39387
    • _wcsicmp.MSVCRT ref: 00007FF665A393AC
    • SysAllocString.OLEAUT32 ref: 00007FF665A393F9
    • SysFreeString.OLEAUT32 ref: 00007FF665A395C0
      • Part of subcall function 00007FF665A38C5C: #170.API-MS-WIN-SHCORE-PATH-L1-1-0(?,?,?,?,00000003,00000000,?,00007FF665A39EE3), ref: 00007FF665A38CBF
      • Part of subcall function 00007FF665A38C5C: SysFreeString.OLEAUT32 ref: 00007FF665A38F43
      • Part of subcall function 00007FF665A38C5C: SysFreeString.OLEAUT32 ref: 00007FF665A38F57
      • Part of subcall function 00007FF665A38C5C: SafeArrayDestroy.OLEAUT32 ref: 00007FF665A38F6B
      • Part of subcall function 00007FF665A390A4: GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000003,00000000,?,00007FF665A39EE3), ref: 00007FF665A390C6
      • Part of subcall function 00007FF665A390A4: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000003,00000000,?,00007FF665A39EE3), ref: 00007FF665A390DD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: String$Free$AllocHeap_wcsicmp$#170ArrayDestroyProcessSafe
    • String ID: mmddhhmm$nnnnnn
    • API String ID: 2715546783-2666863168
    • Opcode ID: 71b197583b609deaf72ec081c22b87ab1773176f0a43cf3a7d8c6ee57f790235
    • Instruction ID: 36e3300e649e7fdf21a9c040eb385ac09ff85b970246964e0f35d401787e88f6
    • Opcode Fuzzy Hash: 71b197583b609deaf72ec081c22b87ab1773176f0a43cf3a7d8c6ee57f790235
    • Instruction Fuzzy Hash: 36914061B0C643CAFB549F5AEA9213926B5AF48F89F444135DA0ECF3A5DE3CEC858700
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: String$AllocFree$ArrayDestroySafe
    • String ID:
    • API String ID: 2618382806-0
    • Opcode ID: ad4ed5dcc9d218c2befe8663d1be73388acfffe0db7459eece0a7c6c32be8417
    • Instruction ID: b61b94dcbee93b236986b102107659240c09b2d22e72b42c8ba2e9e3e67b0141
    • Opcode Fuzzy Hash: ad4ed5dcc9d218c2befe8663d1be73388acfffe0db7459eece0a7c6c32be8417
    • Instruction Fuzzy Hash: 6C71FD26A0AA47C6EB508F65E85227867B0BF88F89F494136DA4DCB364DF3CEC45C711
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Variant$ClearInit$String$AllocFree
    • String ID: logman.xsl
    • API String ID: 1429121160-611824906
    • Opcode ID: bc3ddd7204e269528c4a3ffd5188b1adfa29419c7fd8874098c3201a3da701c8
    • Instruction ID: 324f79181be983d356f065a5a80bca44d83c14fd4f4154fee3521482343a8462
    • Opcode Fuzzy Hash: bc3ddd7204e269528c4a3ffd5188b1adfa29419c7fd8874098c3201a3da701c8
    • Instruction Fuzzy Hash: 7A412822B14A56C6EB019B66D8522A86BB1FF49FC9F458032DE0E9B765DF38EC458310
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000001,00000000,00000000,00007FF665A3AB3F), ref: 00007FF665A3A787
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000001,00000000,00000000,00007FF665A3AB3F), ref: 00007FF665A3A79E
    • StringFromGUID2.API-MS-WIN-CORE-COM-L1-1-0(?,?,?,?,00000001,00000000,00000000,00007FF665A3AB3F), ref: 00007FF665A3A7CA
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000001,00000000,00000000,00007FF665A3AB3F), ref: 00007FF665A3A84E
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000001,00000000,00000000,00007FF665A3AB3F), ref: 00007FF665A3A862
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Process$AllocFreeFromString
    • String ID:
    • API String ID: 1592319463-0
    • Opcode ID: 6620021ebeaa957f9d75ccc6ab9bf6efa276a40b17019acb6afe4bb1711d4bf2
    • Instruction ID: ff18a75b3f91985c5dd2b6d7e326e04cd89288c25e800dbf4a9fa2aca58c4115
    • Opcode Fuzzy Hash: 6620021ebeaa957f9d75ccc6ab9bf6efa276a40b17019acb6afe4bb1711d4bf2
    • Instruction Fuzzy Hash: 07312A21B08A92C6EA108B56E8462796AB1FF8DFC5F458135DE4E8B764DF3CD8468700
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: CloseOpenQueryValue_wcsnicmp
    • String ID: Locale$Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11CF-8B85-00AA005B4383}
    • API String ID: 2262609651-1161606707
    • Opcode ID: 14d1c757d91ac24a21972e11ea89e99e1d46283fb26e97f50747c00b3d1f08c9
    • Instruction ID: e749ffd112c8c0a4f68470d0b4442b81562e03788f6640192ddb72d20f5c8090
    • Opcode Fuzzy Hash: 14d1c757d91ac24a21972e11ea89e99e1d46283fb26e97f50747c00b3d1f08c9
    • Instruction Fuzzy Hash: C9317A32A18B42C6EB108FA5E44516977B1FF89F90F904131DA5D8B794DF3DE844CB00
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Variant$AllocClearString$CreateInitInstance
    • String ID:
    • API String ID: 431318470-0
    • Opcode ID: d0efa196d4e7141bb6d94861a8fc7feed3d993593326fa1d669127e86c095b8c
    • Instruction ID: bf1f81930cd0143f91426c8227ad16946b6e71beb06874aa6bdbb2235bd559a8
    • Opcode Fuzzy Hash: d0efa196d4e7141bb6d94861a8fc7feed3d993593326fa1d669127e86c095b8c
    • Instruction Fuzzy Hash: EFD10226B09B46CAEB508FA5D6921B923B4BF48F88B444036DE0EDB764DF39EC45C350
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000001,?,00000001,00000000,?,00000002,?,00007FF665A35368), ref: 00007FF665A3AE90
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000001,?,00000001,00000000,?,00000002,?,00007FF665A35368), ref: 00007FF665A3AEA6
    • qsort.MSVCRT ref: 00007FF665A3AF4F
    • SysFreeString.OLEAUT32 ref: 00007FF665A3AFC1
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000001,?,00000001,00000000,?,00000002,?,00007FF665A35368), ref: 00007FF665A3AFF8
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,00000001,?,00000001,00000000,?,00000002,?,00007FF665A35368), ref: 00007FF665A3B00C
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$FreeProcess$AllocStringqsort
    • String ID:
    • API String ID: 2546129487-0
    • Opcode ID: 07ea276afa83eb74051b5d209921b635dec16792e39456f9a31a3bd7a02946d9
    • Instruction ID: d3c063e0acc5e3bf8c13ed7a2a171e612ccf17e76e9eff88e040467440a9a030
    • Opcode Fuzzy Hash: 07ea276afa83eb74051b5d209921b635dec16792e39456f9a31a3bd7a02946d9
    • Instruction Fuzzy Hash: CF518F32A14A66CAEB05CF69E8412AD7B71FF48F89F158135EE0A9B714DF39EC458340
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Process$Alloc$Freememmovewcstok
    • String ID:
    • API String ID: 1457313128-0
    • Opcode ID: ae3230fd5b862c756589a95ef7c9d22ee6bf97aac2a89b5efd6e78d40ab19d73
    • Instruction ID: 7fbb4fb098a8807d10b7a051fc2f29e72b58756afa9af22300d75ce75f7267ff
    • Opcode Fuzzy Hash: ae3230fd5b862c756589a95ef7c9d22ee6bf97aac2a89b5efd6e78d40ab19d73
    • Instruction Fuzzy Hash: BA314E25A19B42C6EA559B96E405179BAB0FF89F84F498138CE4ECB795EE3CEC05C700
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF665A3DEE3,?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3FCD2
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF665A3DEE3,?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3FCE7
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF665A3DEE3,?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3FD37
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF665A3DEE3,?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3FD4E
    • _wfopen.MSVCRT ref: 00007FF665A3FD77
    • _errno.MSVCRT ref: 00007FF665A3FD8C
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$AllocProcess$_errno_wfopen
    • String ID:
    • API String ID: 3346283745-0
    • Opcode ID: d6047d9a7d9fac2cd3974ac98a5e5c848385ceb342b2da517d5eafb97ad054ea
    • Instruction ID: ee960c28f864227ac9622dbb62c53050f3c60ef3f99a3329a3797e68392dfef1
    • Opcode Fuzzy Hash: d6047d9a7d9fac2cd3974ac98a5e5c848385ceb342b2da517d5eafb97ad054ea
    • Instruction Fuzzy Hash: 01311A32A15B42CAE7148F51F4450697BB4FF89F88B948139DA8D8B724EF3CE865C740
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: File$CloseCreateHandle$LibraryLoadMappingView
    • String ID:
    • API String ID: 1262414356-0
    • Opcode ID: 2c7d4b9669b024abbd5c980492fb2d0d2dcd22018dbfd3fe4917dc6bbf14e63d
    • Instruction ID: 85f498c1484bbcd45c1fe61b212235fedf465ec3845a64b4ae8cde2a6d6c4204
    • Opcode Fuzzy Hash: 2c7d4b9669b024abbd5c980492fb2d0d2dcd22018dbfd3fe4917dc6bbf14e63d
    • Instruction Fuzzy Hash: 0A215E35A18B52C7E7208F55F505529BAB1FF89FA4B199234CE5D47B58DF3C98058A00
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Variant$Clear$Init
    • String ID:
    • API String ID: 3740757921-0
    • Opcode ID: 1b5306229c6c1118e6ae0a55da821b2c76ab74581ef4e983c35217193c0925a9
    • Instruction ID: 45d2addf0664e90eaa7b8291b726d44a489d477d8223f09381e461c69994d1e7
    • Opcode Fuzzy Hash: 1b5306229c6c1118e6ae0a55da821b2c76ab74581ef4e983c35217193c0925a9
    • Instruction Fuzzy Hash: 8391B426B05A46C6EB01DFA5E4922AC6771FF48F89F414132DE0E9B769DF78E905C340
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$FreeProcess_wcsicmp
    • String ID:
    • API String ID: 624438734-0
    • Opcode ID: a29f2d0d946e92caead90d3e78cea09dde3356660a10d7e2746af4661e807340
    • Instruction ID: 127a3caf1c4ff70313d52003381baa5e6f75281e4b9764c5559f4ec6388525aa
    • Opcode Fuzzy Hash: a29f2d0d946e92caead90d3e78cea09dde3356660a10d7e2746af4661e807340
    • Instruction Fuzzy Hash: B9711472A18A46CAEB508F61D8463B927B1FF48F8CF544036DA0DCB698DF78EC45C240
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(00000001,00000000,00000000,00007FF665A3D0DB,00000000,00000000,00000000,00007FF665A3D15E,00000000,00000000,?,00007FF665A3DF96), ref: 00007FF665A3C402
    • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,00007FF665A3DF96,?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3C419
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,00007FF665A3DF96,?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3C532
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,00007FF665A3DF96,?,?,?,?,?,?,00000000,00000000,?,00007FF665A34F4E), ref: 00007FF665A3C546
      • Part of subcall function 00007FF665A3BDF8: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF665A3BE1E
      • Part of subcall function 00007FF665A3BDF8: WriteConsoleW.KERNELBASE(?,?,?,?,?,00000000,00007FF665A3C160), ref: 00007FF665A3BE8C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$Process$AllocConsoleFreeHandleWrite
    • String ID: %1!s!
    • API String ID: 2134094217-1485915839
    • Opcode ID: 102afc81578587306dcdf7ac50bddcdd48089c6338b9417b23d1ff438d5f18f7
    • Instruction ID: c53c2a5e8eb590be62e42e0c6e026328078da77002f87cd7d61c58921a149535
    • Opcode Fuzzy Hash: 102afc81578587306dcdf7ac50bddcdd48089c6338b9417b23d1ff438d5f18f7
    • Instruction Fuzzy Hash: 7051E621F0CA62C2EB249B65D81E17996B1BF84F88F954036DA4ECB791DE7DEC418310
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: ArraySafe$Data$AccessAllocCreateDestroyStringUnaccessVector
    • String ID:
    • API String ID: 2177256657-0
    • Opcode ID: 9ef660b1661b8b01e200de58bb8b5fdf737335e33039b4573c90660d9da01980
    • Instruction ID: 0f555a74ac33acf830ee9d22de3726d5d7fc8eb97bcabf08b454b8508a8807ba
    • Opcode Fuzzy Hash: 9ef660b1661b8b01e200de58bb8b5fdf737335e33039b4573c90660d9da01980
    • Instruction Fuzzy Hash: 2131EE22A08B41C2E6119F51E8421B9AB70FF89FA4F588230CE6E8B784DFBCDC55C700
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • fclose.MSVCRT ref: 00007FF665A3FC4B
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF665A3FDB9,?,?,00000000,00007FF665A3DEE3,?,?,?,?,?,?,00000000,00000000), ref: 00007FF665A3FC60
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF665A3FDB9,?,?,00000000,00007FF665A3DEE3,?,?,?,?,?,?,00000000,00000000), ref: 00007FF665A3FC74
    • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF665A3FDB9,?,?,00000000,00007FF665A3DEE3,?,?,?,?,?,?,00000000,00000000), ref: 00007FF665A3FC85
    • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FF665A3FDB9,?,?,00000000,00007FF665A3DEE3,?,?,?,?,?,?,00000000,00000000), ref: 00007FF665A3FC99
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Heap$FreeProcess$fclose
    • String ID:
    • API String ID: 916384275-0
    • Opcode ID: 0462fb4797b3b6797991485470a4b5633faf3aacbb359a49fe1fe749b8ec038e
    • Instruction ID: 7007d424efc8c8f086f74332463f4d6fc38125f8e134c5a0689f441e548335db
    • Opcode Fuzzy Hash: 0462fb4797b3b6797991485470a4b5633faf3aacbb359a49fe1fe749b8ec038e
    • Instruction Fuzzy Hash: E0011D32A19A41CAEB048F92F445278ABB1FF8EF95F599138CE0E8A754CF3CD845C600
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Variant$AllocClearCreateInitInstanceString
    • String ID:
    • API String ID: 3126708813-0
    • Opcode ID: bfe94621eca50100cb919f2d55dcb6240be1b4cce8e2bf259d0dfd3adbc1d24e
    • Instruction ID: 2089adc85346dfbdbde887d53892b4d5603435d965ed46ff3fe93c12fafba1fe
    • Opcode Fuzzy Hash: bfe94621eca50100cb919f2d55dcb6240be1b4cce8e2bf259d0dfd3adbc1d24e
    • Instruction Fuzzy Hash: 0151E526F04B56C6EB118FA6D8562AC27B0BF48F88F554136DE0D9B768DF79E849C300
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: _vsnwprintf
    • String ID:
    • API String ID: 1036211903-0
    • Opcode ID: eb8563e2293d5362b0112a5e805a54d3f693922d22de05abfbc8c2ffed6e55f2
    • Instruction ID: b91068f9ba3116becba1e514f3d421a75ff9283ce1639dd9c208d481aec2a0a4
    • Opcode Fuzzy Hash: eb8563e2293d5362b0112a5e805a54d3f693922d22de05abfbc8c2ffed6e55f2
    • Instruction Fuzzy Hash: 3331A122B19B42C6EA209B95E8522BA62F0BF99F84F444535DE4DCF791EF3CEC418710
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Variant$Clear$Init$AllocCreateInstanceString
    • String ID:
    • API String ID: 78311616-0
    • Opcode ID: f78e717284691bb1b3071f40d5654da807e72fda6bdff1f2f957a8da6bb13197
    • Instruction ID: 81deb663528ef08998bc04d3373e0c18a3148af98d5f966646eb3409d56355f6
    • Opcode Fuzzy Hash: f78e717284691bb1b3071f40d5654da807e72fda6bdff1f2f957a8da6bb13197
    • Instruction Fuzzy Hash: FB313436B04B46CAEB018F65E9420AC67B1FF48F88B458135DE0E9BB19EF38E855C300
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: StringVariant$AllocClearFreeInit
    • String ID:
    • API String ID: 760788290-0
    • Opcode ID: b82c9e5cbb70415a525eb397670e1e24aec5a6e491ef82c5843ababeaf98c2ba
    • Instruction ID: 81329f2e0f8ee2a45f1f33e14d1af436eb29264bdba4f87f5568750f0a991025
    • Opcode Fuzzy Hash: b82c9e5cbb70415a525eb397670e1e24aec5a6e491ef82c5843ababeaf98c2ba
    • Instruction Fuzzy Hash: EC211736618B92C2EB118F56E852169ABB0FF89F94F498071DE4E8B764DF7CEC458700
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: fgetws$ferroriswspace
    • String ID:
    • API String ID: 565302097-0
    • Opcode ID: 5328180d120dc827a6cab6a1cc27cf10d973ba6f043c487eb31d2d2bb319958f
    • Instruction ID: db2b21b6265ce4af71dbd524fceee15046557a486008e67fbeaaa7de90861cd2
    • Opcode Fuzzy Hash: 5328180d120dc827a6cab6a1cc27cf10d973ba6f043c487eb31d2d2bb319958f
    • Instruction Fuzzy Hash: B5215C22A18A42C6E7204F51F44117966B0FF48FA8F548235EB9ECB794DF3CEC928340
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: Variant$AllocClearInitString
    • String ID:
    • API String ID: 2213243845-0
    • Opcode ID: 783d2c435612e8b662e8a72583ad2d3018e3f67a92ec5de13cb6e881d3ebacd2
    • Instruction ID: 385e26aa387004a7880cfde9368fb2989c96ed4a7021b5f27254ab2fcc750b0a
    • Opcode Fuzzy Hash: 783d2c435612e8b662e8a72583ad2d3018e3f67a92ec5de13cb6e881d3ebacd2
    • Instruction Fuzzy Hash: C1112832608A92D7E7218F54E441169BBB0FF8CB98B558135EA8E8BB14DF3CDD59CB04
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.666582694.00007FF665A31000.00000020.00020000.sdmp, Offset: 00007FF665A30000, based on PE: true
    • Associated: 00000000.00000002.666572885.00007FF665A30000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666599416.00007FF665A42000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.666610897.00007FF665A4B000.00000004.00020000.sdmp Download File
    • Associated: 00000000.00000002.666625102.00007FF665A4F000.00000002.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff665a30000_logman.jbxd
    Similarity
    • API ID: _wcsicmp
    • String ID: bin$bincirc
    • API String ID: 2081463915-363318931
    • Opcode ID: 7d4de597bd397381b489a5ed02c0a307c78f16c3ef1be78329f8b77ec3ae1ea1
    • Instruction ID: 5ef2196c647351c38e2422e9385fe5dff43dc9d3f278cac3f78f56ce46367f23
    • Opcode Fuzzy Hash: 7d4de597bd397381b489a5ed02c0a307c78f16c3ef1be78329f8b77ec3ae1ea1
    • Instruction Fuzzy Hash: AD012C21B09947C1EB108B56E85613AA7B0FF89F98F549131E60DCB2A4DE7CEC468340
    Uniqueness

    Uniqueness Score: -1.00%