Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Mega.nz Spreader.exe

Overview

General Information

Sample name:Mega.nz Spreader.exe
Analysis ID:1485496
MD5:56b45c6edd70b8d85df6399eea6d24d1
SHA1:15a65e88ec6dc89e35fef0c5e786ac255d6d4a6e
SHA256:70f06035e9cc9a891f2959b80e3be9bea2ba07b72bce4fac125249c29c0d9d1c
Tags:exe
Infos:

Detection

Laplas Clipper, Meduza Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Laplas Clipper
Yara detected Meduza Stealer
.NET source code contains potential unpacker
.NET source code contains very large strings
AI detected suspicious sample
Drops large PE files
Found many strings related to Crypto-Wallets (likely being stolen)
Found pyInstaller with non standard icon
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Mega.nz Spreader.exe (PID: 5572 cmdline: "C:\Users\user\Desktop\Mega.nz Spreader.exe" MD5: 56B45C6EDD70B8D85DF6399EEA6D24D1)
    • leaf.exe (PID: 5340 cmdline: "C:\Users\user\AppData\Local\Temp\leaf.exe" MD5: 8C8C3BCF475B5C95673A810B10A2FC52)
      • leaf.exe (PID: 1292 cmdline: "{path}" MD5: 8C8C3BCF475B5C95673A810B10A2FC52)
      • leaf.exe (PID: 1784 cmdline: "{path}" MD5: 8C8C3BCF475B5C95673A810B10A2FC52)
        • cmd.exe (PID: 6980 cmdline: "cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 4788 cmdline: schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f MD5: 48C2FE20575769DE916F48EF0676A965)
    • api.exe (PID: 5656 cmdline: "C:\Users\user\AppData\Local\Temp\api.exe" MD5: 9022192413DDA223B6E8AFD73A22CFAA)
    • lib.exe (PID: 6600 cmdline: "C:\Users\user\AppData\Local\Temp\lib.exe" MD5: D1540618704ECACA1A503B496ED7B801)
      • conhost.exe (PID: 4204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • lib.exe (PID: 5808 cmdline: "C:\Users\user\AppData\Local\Temp\lib.exe" MD5: D1540618704ECACA1A503B496ED7B801)
  • svcupdater.exe (PID: 5692 cmdline: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe MD5: A0E117D70EEB8A8AEAB628C95E78F524)
    • svcupdater.exe (PID: 2568 cmdline: "{path}" MD5: A0E117D70EEB8A8AEAB628C95E78F524)
  • svcupdater.exe (PID: 3184 cmdline: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe MD5: A0E117D70EEB8A8AEAB628C95E78F524)
    • svcupdater.exe (PID: 5600 cmdline: "{path}" MD5: A0E117D70EEB8A8AEAB628C95E78F524)
    • svcupdater.exe (PID: 5084 cmdline: "{path}" MD5: A0E117D70EEB8A8AEAB628C95E78F524)
  • svcupdater.exe (PID: 2468 cmdline: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe MD5: A0E117D70EEB8A8AEAB628C95E78F524)
  • cleanup
{"C2 url": "http://45.159.189.105/bot/", "API key": "6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d"}
{"C2 url": "77.105.147.1:15666"}
SourceRuleDescriptionAuthorStrings
00000011.00000002.3289763270.0000000002DF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LaplasClipperYara detected Laplas ClipperJoe Security
    Process Memory Space: leaf.exe PID: 5340JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      Process Memory Space: api.exe PID: 5656JoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
        Process Memory Space: svcupdater.exe PID: 5692JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: svcupdater.exe PID: 2568JoeSecurity_LaplasClipperYara detected Laplas ClipperJoe Security
            Click to see the 1 entries

            System Summary

            barindex
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f, CommandLine: "cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "{path}", ParentImage: C:\Users\user\AppData\Local\Temp\leaf.exe, ParentProcessId: 1784, ParentProcessName: leaf.exe, ProcessCommandLine: "cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f, ProcessId: 6980, ProcessName: cmd.exe
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f, CommandLine: "cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "{path}", ParentImage: C:\Users\user\AppData\Local\Temp\leaf.exe, ParentProcessId: 1784, ParentProcessName: leaf.exe, ProcessCommandLine: "cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f, ProcessId: 6980, ProcessName: cmd.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f, CommandLine: schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f, CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6980, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f, ProcessId: 4788, ProcessName: schtasks.exe
            No Snort rule has matched
            Timestamp:2024-07-31T18:30:04.889268+0200
            SID:2039775
            Source Port:49721
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-31T18:27:57.316101+0200
            SID:2039775
            Source Port:49722
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-31T18:28:05.682770+0200
            SID:2050807
            Source Port:49704
            Destination Port:15666
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-31T18:29:20.997850+0200
            SID:2039775
            Source Port:49719
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-31T18:28:05.687876+0200
            SID:2050807
            Source Port:49704
            Destination Port:15666
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-31T18:29:42.420442+0200
            SID:2039775
            Source Port:49720
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Mega.nz Spreader.exeAvira: detected
            Source: C:\Users\user\AppData\Local\Temp\api.exeAvira: detection malicious, Label: TR/Meduza.A
            Source: 3.0.api.exe.d90000.0.unpackMalware Configuration Extractor: Meduza Stealer {"C2 url": "77.105.147.1:15666"}
            Source: svcupdater.exe.2568.17.memstrminMalware Configuration Extractor: Laplas Clipper {"C2 url": "http://45.159.189.105/bot/", "API key": "6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d"}
            Source: C:\Users\user\AppData\Local\Temp\api.exeReversingLabs: Detection: 75%
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeReversingLabs: Detection: 79%
            Source: Mega.nz Spreader.exeReversingLabs: Detection: 71%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\Temp\api.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeJoe Sandbox ML: detected
            Source: Mega.nz Spreader.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DD8840 WideCharToMultiByte,WideCharToMultiByte,CryptUnprotectData,LocalFree,3_2_00DD8840
            Source: Mega.nz Spreader.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49705 version: TLS 1.2
            Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2087957246.00007FF8B9063000.00000002.00000001.01000000.00000012.sdmp, select.pyd.5.dr
            Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: kaikoBF.pdb source: Mega.nz Spreader.exe, 00000000.00000002.2038521099.00000000011BE000.00000004.00000020.00020000.00000000.sdmp, leaf.exe, 00000001.00000000.2029236657.00000000008A2000.00000002.00000001.01000000.00000005.sdmp, leaf.exe.0.dr, svcupdater.exe.9.dr
            Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: lib.exe, 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmp, _ctypes.pyd.5.dr
            Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.5.dr
            Source: Binary string: kaikoBF.pdbSHA256 source: Mega.nz Spreader.exe, 00000000.00000002.2038521099.00000000011BE000.00000004.00000020.00020000.00000000.sdmp, leaf.exe, 00000001.00000000.2029236657.00000000008A2000.00000002.00000001.01000000.00000005.sdmp, leaf.exe.0.dr, svcupdater.exe.9.dr
            Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Cassa.pdb source: leaf.exe, 00000001.00000002.2188032639.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, leaf.exe, 00000001.00000002.2187846427.0000000002B00000.00000004.08000000.00040000.00000000.sdmp, leaf.exe, 00000001.00000002.2188032639.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.0000000002A27000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.0000000002927000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: Cassa.pdbSHA256 source: leaf.exe, 00000001.00000002.2188032639.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, leaf.exe, 00000001.00000002.2187846427.0000000002B00000.00000004.08000000.00040000.00000000.sdmp, leaf.exe, 00000001.00000002.2188032639.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.0000000002A27000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.0000000002927000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.5.dr
            Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: lib.exe, 00000005.00000003.2038247890.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmp
            Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: lib.exe, 00000005.00000003.2038247890.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmp
            Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2087738939.00007FF8B8F88000.00000002.00000001.01000000.00000011.sdmp, _socket.pyd.5.dr
            Source: Binary string: D:\a\1\b\bin\amd64\_multiprocessing.pdb source: lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: lib.exe, 00000007.00000002.2084707630.00007FF8A88BB000.00000002.00000001.01000000.0000000D.sdmp
            Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: _ssl.pyd.5.dr
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E149AF FindClose,FindFirstFileExW,GetLastError,3_2_00E149AF
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E149CF FindFirstFileExW,3_2_00E149CF
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E14A34 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,3_2_00E14A34
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E16B69 FindFirstFileExW,3_2_00E16B69
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759966878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,5_2_00007FF759966878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759970A34 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,5_2_00007FF759970A34
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759966878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,5_2_00007FF759966878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599569E0 FindFirstFileExW,FindClose,5_2_00007FF7599569E0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759970A34 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,7_2_00007FF759970A34
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759966878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,7_2_00007FF759966878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599569E0 FindFirstFileExW,FindClose,7_2_00007FF7599569E0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759966878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,7_2_00007FF759966878
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h18_2_06D90508
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h18_2_06D904F7
            Source: global trafficTCP traffic: 192.168.2.5:49704 -> 77.105.147.1:15666
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1Host: 45.159.189.105Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1Host: 45.159.189.105Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1Host: 45.159.189.105Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1Host: 45.159.189.105Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewIP Address: 45.159.189.105 45.159.189.105
            Source: Joe Sandbox ViewASN Name: PLUSTELECOM-ASRU PLUSTELECOM-ASRU
            Source: Joe Sandbox ViewASN Name: HOSTING-SOLUTIONSUS HOSTING-SOLUTIONSUS
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.1
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DDFC60 recv,closesocket,WSACleanup,InternetOpenA,InternetOpenUrlA,HttpQueryInfoW,HttpQueryInfoW,InternetQueryDataAvailable,InternetReadFile,InternetQueryDataAvailable,InternetCloseHandle,Concurrency::cancel_current_task,3_2_00DDFC60
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1Host: 45.159.189.105Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1Host: 45.159.189.105Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1Host: 45.159.189.105Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1Host: 45.159.189.105Connection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: svcupdater.exe, 00000011.00000002.3289763270.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000011.00000002.3289763270.0000000002E85000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000011.00000002.3289763270.0000000002E68000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000011.00000002.3289763270.0000000002E5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.159.189.105
            Source: svcupdater.exe, 00000011.00000002.3289763270.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000011.00000002.3289763270.0000000002E85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.159.189.105/bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co
            Source: lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.coj
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.cok
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.dr, _socket.pyd.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.dr, _socket.pyd.5.dr, _ssl.pyd.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.dr, _socket.pyd.5.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.dr, _socket.pyd.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.dr, _socket.pyd.5.dr, _ssl.pyd.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
            Source: _ssl.pyd.5.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.dr, _socket.pyd.5.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
            Source: api.exe, 00000003.00000003.2260052741.000000000109D000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2259726725.000000000109C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.aap
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.dr, _socket.pyd.5.drString found in binary or memory: http://ocsp.digicert.com0
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.dr, _socket.pyd.5.drString found in binary or memory: http://ocsp.digicert.com0A
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.drString found in binary or memory: http://ocsp.digicert.com0C
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.dr, _socket.pyd.5.dr, _ssl.pyd.5.drString found in binary or memory: http://ocsp.digicert.com0X
            Source: leaf.exe, 00000001.00000002.2188032639.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000011.00000002.3289763270.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.00000000027D1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000015.00000002.3290066052.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: lib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2048755908.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2051694298.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FC8000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2050288208.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038655650.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2041762314.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2042615497.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, select.pyd.5.dr, _lzma.pyd.5.dr, _ctypes.pyd.5.dr, _socket.pyd.5.drString found in binary or memory: http://www.digicert.com/CPS0
            Source: api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: api.exe, 00000003.00000002.2260386826.0000000000C3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: api.exe, 00000003.00000002.2260386826.0000000000C3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/5
            Source: api.exe, 00000003.00000002.2260386826.0000000000C3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org2x
            Source: lib.exe, 00000007.00000003.2067488525.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2066562018.0000026B4E184000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2075968258.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2074018307.0000026B4DF15000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2065469810.0000026B4E184000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bugs.python.org/issue42195.
            Source: api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: lib.exe, 00000007.00000003.2075465060.0000026B4D9D1000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2064008323.0000026B4DF23000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2067488525.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077249450.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2075968258.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077640294.0000026B4DF49000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2081537469.0000026B4D9EF000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076861094.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2074018307.0000026B4DF15000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2061947765.0000026B4DF1D000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076697687.0000026B4DF2E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2063331817.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060050613.0000026B4D9E4000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2065651958.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060729690.0000026B4DF0E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077823055.0000026B4D9E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062263084.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062530738.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077548067.0000026B4D9E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
            Source: lib.exe, 00000007.00000002.2081606147.0000026B4DA88000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
            Source: lib.exe, 00000007.00000003.2077548067.0000026B4D9E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
            Source: lib.exe, 00000007.00000003.2075465060.0000026B4D9D1000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2064008323.0000026B4DF23000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2067488525.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077249450.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2075968258.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077640294.0000026B4DF49000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2081537469.0000026B4D9EF000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076861094.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2082286891.0000026B4DF4A000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2074018307.0000026B4DF15000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2061947765.0000026B4DF1D000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076697687.0000026B4DF2E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2063331817.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060050613.0000026B4D9E4000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2065651958.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060729690.0000026B4DF0E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077823055.0000026B4D9E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062263084.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062530738.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077548067.0000026B4D9E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
            Source: lib.exe, 00000007.00000003.2075465060.0000026B4D9D1000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2064008323.0000026B4DF23000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2067488525.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077249450.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2075968258.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077640294.0000026B4DF49000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2081537469.0000026B4D9EF000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076861094.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2074018307.0000026B4DF15000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2061947765.0000026B4DF1D000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076697687.0000026B4DF2E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2063331817.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060050613.0000026B4D9E4000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2065651958.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060729690.0000026B4DF0E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077823055.0000026B4D9E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062263084.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062530738.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077548067.0000026B4D9E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
            Source: lib.exe, 00000007.00000002.2081774717.0000026B4DCB0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://peps.python.org/pep-0205/
            Source: lib.exe, 00000007.00000002.2084707630.00007FF8A88BB000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: https://peps.python.org/pep-0263/
            Source: lib.exe, 00000007.00000003.2074697379.0000026B4E0E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2083307702.0000026B4FB28000.00000004.00001000.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2082984704.0000026B4E0F2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2069569579.0000026B4E0E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076202808.0000026B4E0E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076459074.0000026B4E0F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/royalleaks
            Source: lib.exe, 00000007.00000002.2083307702.0000026B4FB28000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://t.me/royalleaksh__
            Source: api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: lib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.openssl.org/H
            Source: lib.exe, 00000007.00000003.2057719232.0000026B4DF02000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2058100018.0000026B4DEC3000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2057579099.0000026B4DF00000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2081606147.0000026B4DA00000.00000004.00001000.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2057579099.0000026B4DEC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
            Source: lib.exe, 00000007.00000002.2085170372.00007FF8A8958000.00000004.00000001.01000000.0000000D.sdmpString found in binary or memory: https://www.python.org/psf/license/
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49705 version: TLS 1.2
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DE0840 GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetDC,GetDeviceCaps,GetDeviceCaps,GetDeviceCaps,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,CreateStreamOnHGlobal,EnterCriticalSection,LeaveCriticalSection,GetObjectW,IStream_Size,IStream_Reset,IStream_Read,SelectObject,DeleteDC,ReleaseDC,DeleteObject,DeleteObject,DeleteObject,EnterCriticalSection,EnterCriticalSection,EnterCriticalSection,GdiplusShutdown,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,LeaveCriticalSection,3_2_00DE0840

            System Summary

            barindex
            Source: leaf.exe.0.dr, Registro.csLong String: Length: 167423
            Source: svcupdater.exe.9.dr, Registro.csLong String: Length: 167423
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeFile dump: svcupdater.exe.9.dr 659151360Jump to dropped file
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeCode function: 1_2_0119C4D41_2_0119C4D4
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeCode function: 1_2_0119DC601_2_0119DC60
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DDF1903_2_00DDF190
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DCC9403_2_00DCC940
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DFC2B03_2_00DFC2B0
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DF72653_2_00DF7265
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DD53103_2_00DD5310
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DF07C03_2_00DF07C0
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E177293_2_00E17729
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E018B03_2_00E018B0
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DE8AD03_2_00DE8AD0
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E08AB13_2_00E08AB1
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DF1BC03_2_00DF1BC0
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DEDD903_2_00DEDD90
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E0AE313_2_00E0AE31
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DEFE203_2_00DEFE20
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E05F9A3_2_00E05F9A
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75996FA885_2_00007FF75996FA88
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759974EA05_2_00007FF759974EA0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759975DEC5_2_00007FF759975DEC
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599558E05_2_00007FF7599558E0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599668785_2_00007FF759966878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75997324C5_2_00007FF75997324C
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759962A185_2_00007FF759962A18
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759970A345_2_00007FF759970A34
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599668785_2_00007FF759966878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75996D1F85_2_00007FF75996D1F8
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599621DC5_2_00007FF7599621DC
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599601505_2_00007FF759960150
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75997511C5_2_00007FF75997511C
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759968D005_2_00007FF759968D00
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599574205_2_00007FF759957420
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759978BE85_2_00007FF759978BE8
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599603545_2_00007FF759960354
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75996132C5_2_00007FF75996132C
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599616C45_2_00007FF7599616C4
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599666C45_2_00007FF7599666C4
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759972DB05_2_00007FF759972DB0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599626145_2_00007FF759962614
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75996FA885_2_00007FF75996FA88
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75995FD405_2_00007FF75995FD40
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75996CD645_2_00007FF75996CD64
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599605605_2_00007FF759960560
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599758A05_2_00007FF7599758A0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599670FC5_2_00007FF7599670FC
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75996D8785_2_00007FF75996D878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759964FC05_2_00007FF759964FC0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75995FF445_2_00007FF75995FF44
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599607645_2_00007FF759960764
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599621DC7_2_00007FF7599621DC
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75996132C7_2_00007FF75996132C
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759975DEC7_2_00007FF759975DEC
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75997324C7_2_00007FF75997324C
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759962A187_2_00007FF759962A18
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759970A347_2_00007FF759970A34
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75996FA887_2_00007FF75996FA88
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599668787_2_00007FF759966878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75996D1F87_2_00007FF75996D1F8
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599601507_2_00007FF759960150
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75997511C7_2_00007FF75997511C
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759968D007_2_00007FF759968D00
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599574207_2_00007FF759957420
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759978BE87_2_00007FF759978BE8
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599603547_2_00007FF759960354
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599616C47_2_00007FF7599616C4
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599666C47_2_00007FF7599666C4
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759974EA07_2_00007FF759974EA0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759972DB07_2_00007FF759972DB0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599626147_2_00007FF759962614
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75996FA887_2_00007FF75996FA88
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75995FD407_2_00007FF75995FD40
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75996CD647_2_00007FF75996CD64
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599605607_2_00007FF759960560
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599758A07_2_00007FF7599758A0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599670FC7_2_00007FF7599670FC
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599558E07_2_00007FF7599558E0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599668787_2_00007FF759966878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75996D8787_2_00007FF75996D878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759964FC07_2_00007FF759964FC0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75995FF447_2_00007FF75995FF44
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599607647_2_00007FF759960764
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B8F810607_2_00007FF8B8F81060
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B93C32007_2_00007FF8B93C3200
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B98427A07_2_00007FF8B98427A0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B9842ED07_2_00007FF8B9842ED0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B98439F07_2_00007FF8B98439F0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B98432E07_2_00007FF8B98432E0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B9843F507_2_00007FF8B9843F50
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B9841F507_2_00007FF8B9841F50
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B9F677787_2_00007FF8B9F67778
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B9F696207_2_00007FF8B9F69620
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 14_2_00BDC4D414_2_00BDC4D4
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 14_2_00BDDC6014_2_00BDDC60
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_00ECAEA018_2_00ECAEA0
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_00ECC4D418_2_00ECC4D4
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_00ECDC6018_2_00ECDC60
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_0535CE3818_2_0535CE38
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_05355AA118_2_05355AA1
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_0535240118_2_05352401
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_0535540018_2_05355400
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_053537A018_2_053537A0
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_0535560818_2_05355608
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_0535164118_2_05351641
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_053541B918_2_053541B9
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_053591E918_2_053591E9
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_053541C818_2_053541C8
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_0535506918_2_05355069
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_053553F118_2_053553F1
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_0535320018_2_05353200
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_053592B718_2_053592B7
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_0535028018_2_05350280
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_053532F018_2_053532F0
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_05354D7818_2_05354D78
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_05354D6918_2_05354D69
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_05359FE018_2_05359FE0
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_05350E0018_2_05350E00
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_0535391918_2_05353919
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_053558B818_2_053558B8
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_053558A918_2_053558A9
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 18_2_06D90E0018_2_06D90E00
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 21_2_0125C4D421_2_0125C4D4
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 21_2_0125DC6021_2_0125DC60
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\_MEI66002\VCRUNTIME140.dll A8F950B4357EC12CFCCDDC9094CCA56A3D5244B95E09EA6E9A746489F2D58736
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\_MEI66002\_bz2.pyd EBCAC51449F323AE3AE961A33843029C34B6A82138CCD9214CF99F98DD2148C2
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: String function: 00E10300 appears 52 times
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: String function: 00007FF759951C50 appears 90 times
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: String function: 00007FF759951CB0 appears 38 times
            Source: unicodedata.pyd.5.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
            Source: Mega.nz Spreader.exe, 00000000.00000002.2038521099.00000000011BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekaikoBF.exeF vs Mega.nz Spreader.exe
            Source: Mega.nz Spreader.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@28/26@1/3
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759956670 GetLastError,FormatMessageW,WideCharToMultiByte,5_2_00007FF759956670
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\leaf.exe.logJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5028:120:WilError_03
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4204:120:WilError_03
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeFile created: C:\Users\user\AppData\Local\Temp\leaf.exeJump to behavior
            Source: Mega.nz Spreader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Mega.nz Spreader.exeReversingLabs: Detection: 71%
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_0-52
            Source: unknownProcess created: C:\Users\user\Desktop\Mega.nz Spreader.exe "C:\Users\user\Desktop\Mega.nz Spreader.exe"
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeProcess created: C:\Users\user\AppData\Local\Temp\leaf.exe "C:\Users\user\AppData\Local\Temp\leaf.exe"
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeProcess created: C:\Users\user\AppData\Local\Temp\api.exe "C:\Users\user\AppData\Local\Temp\api.exe"
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeProcess created: C:\Users\user\AppData\Local\Temp\lib.exe "C:\Users\user\AppData\Local\Temp\lib.exe"
            Source: C:\Users\user\AppData\Local\Temp\lib.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Local\Temp\lib.exeProcess created: C:\Users\user\AppData\Local\Temp\lib.exe "C:\Users\user\AppData\Local\Temp\lib.exe"
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess created: C:\Users\user\AppData\Local\Temp\leaf.exe "{path}"
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess created: C:\Users\user\AppData\Local\Temp\leaf.exe "{path}"
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe "{path}"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe "{path}"
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe "{path}"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeProcess created: C:\Users\user\AppData\Local\Temp\leaf.exe "C:\Users\user\AppData\Local\Temp\leaf.exe" Jump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeProcess created: C:\Users\user\AppData\Local\Temp\api.exe "C:\Users\user\AppData\Local\Temp\api.exe" Jump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeProcess created: C:\Users\user\AppData\Local\Temp\lib.exe "C:\Users\user\AppData\Local\Temp\lib.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess created: C:\Users\user\AppData\Local\Temp\leaf.exe "{path}"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess created: C:\Users\user\AppData\Local\Temp\leaf.exe "{path}"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeProcess created: C:\Users\user\AppData\Local\Temp\lib.exe "C:\Users\user\AppData\Local\Temp\lib.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /fJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /fJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe "{path}"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe "{path}"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe "{path}"Jump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeSection loaded: vcruntime140.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeSection loaded: python3.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeSection loaded: libffi-8.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: mscoree.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: version.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: mscoree.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: version.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: uxtheme.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: profapi.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: cryptsp.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: rsaenh.dll
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeSection loaded: cryptbase.dll
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: Mega.nz Spreader.exeStatic file information: File size 8953856 > 1048576
            Source: Mega.nz Spreader.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x888c00
            Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: lib.exe, 00000005.00000003.2052982801.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2087957246.00007FF8B9063000.00000002.00000001.01000000.00000012.sdmp, select.pyd.5.dr
            Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: lib.exe, 00000005.00000003.2053206684.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: kaikoBF.pdb source: Mega.nz Spreader.exe, 00000000.00000002.2038521099.00000000011BE000.00000004.00000020.00020000.00000000.sdmp, leaf.exe, 00000001.00000000.2029236657.00000000008A2000.00000002.00000001.01000000.00000005.sdmp, leaf.exe.0.dr, svcupdater.exe.9.dr
            Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: lib.exe, 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmp, _ctypes.pyd.5.dr
            Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: lib.exe, 00000005.00000003.2039566373.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.5.dr
            Source: Binary string: kaikoBF.pdbSHA256 source: Mega.nz Spreader.exe, 00000000.00000002.2038521099.00000000011BE000.00000004.00000020.00020000.00000000.sdmp, leaf.exe, 00000001.00000000.2029236657.00000000008A2000.00000002.00000001.01000000.00000005.sdmp, leaf.exe.0.dr, svcupdater.exe.9.dr
            Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: lib.exe, 00000005.00000003.2041399865.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Cassa.pdb source: leaf.exe, 00000001.00000002.2188032639.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, leaf.exe, 00000001.00000002.2187846427.0000000002B00000.00000004.08000000.00040000.00000000.sdmp, leaf.exe, 00000001.00000002.2188032639.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.0000000002A27000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.0000000002927000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: Cassa.pdbSHA256 source: leaf.exe, 00000001.00000002.2188032639.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, leaf.exe, 00000001.00000002.2187846427.0000000002B00000.00000004.08000000.00040000.00000000.sdmp, leaf.exe, 00000001.00000002.2188032639.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.0000000002A27000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.0000000002927000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmp
            Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.5.dr
            Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: lib.exe, 00000005.00000003.2038462623.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: lib.exe, 00000005.00000003.2038247890.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmp
            Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: lib.exe, 00000005.00000003.2038247890.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmp
            Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: lib.exe, 00000005.00000003.2041546243.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2087738939.00007FF8B8F88000.00000002.00000001.01000000.00000011.sdmp, _socket.pyd.5.dr
            Source: Binary string: D:\a\1\b\bin\amd64\_multiprocessing.pdb source: lib.exe, 00000005.00000003.2040581101.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: lib.exe, 00000007.00000002.2084707630.00007FF8A88BB000.00000002.00000001.01000000.0000000D.sdmp
            Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: _ssl.pyd.5.dr

            Data Obfuscation

            barindex
            Source: 1.2.leaf.exe.2b00000.0.raw.unpack, CCM.cs.Net Code: DeleteMC System.AppDomain.Load(byte[])
            Source: 1.2.leaf.exe.2df1e68.1.raw.unpack, CCM.cs.Net Code: DeleteMC System.AppDomain.Load(byte[])
            Source: 1.2.leaf.exe.2de1df4.3.raw.unpack, CCM.cs.Net Code: DeleteMC System.AppDomain.Load(byte[])
            Source: 14.2.svcupdater.exe.2a27b90.1.raw.unpack, CCM.cs.Net Code: DeleteMC System.AppDomain.Load(byte[])
            Source: lib.exe.0.drStatic PE information: section name: _RDATA
            Source: libcrypto-1_1.dll.5.drStatic PE information: section name: .00cfg
            Source: libssl-1_1.dll.5.drStatic PE information: section name: .00cfg
            Source: python311.dll.5.drStatic PE information: section name: PyRuntim
            Source: VCRUNTIME140.dll.5.drStatic PE information: section name: _RDATA
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeCode function: 1_2_0119E7C2 push eax; ret 1_2_0119E7C9
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E1090C push ecx; ret 3_2_00E1091F
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 21_2_0125C7A7 push cs; iretd 21_2_0125C85F
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 21_2_0125E7C3 push eax; ret 21_2_0125E7C9
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeCode function: 21_2_0125C808 push cs; iretd 21_2_0125C85F

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\AppData\Local\Temp\lib.exeProcess created: "C:\Users\user\AppData\Local\Temp\lib.exe"
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\_ctypes.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\_decimal.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\_hashlib.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\libcrypto-1_1.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\_socket.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\_ssl.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\_queue.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\VCRUNTIME140.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\_bz2.pydJump to dropped file
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeFile created: C:\Users\user\AppData\Local\Temp\api.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\libssl-1_1.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeFile created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\python311.dllJump to dropped file
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeFile created: C:\Users\user\AppData\Local\Temp\lib.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\libffi-8.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\_multiprocessing.pydJump to dropped file
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeFile created: C:\Users\user\AppData\Local\Temp\leaf.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\select.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\_lzma.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\pyexpat.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI66002\unicodedata.pydJump to dropped file

            Boot Survival

            barindex
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759952F20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_00007FF759952F20
            Source: C:\Users\user\AppData\Local\Temp\api.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: leaf.exe PID: 5340, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svcupdater.exe PID: 5692, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svcupdater.exe PID: 3184, type: MEMORYSTR
            Source: leaf.exe, 00000001.00000002.2188032639.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.0000000002ACA000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
            Source: leaf.exe, 00000001.00000002.2188032639.0000000002E41000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.0000000002ACA000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 1190000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 2C70000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 2AB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 7960000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 7080000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 8960000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 9960000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 9CB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: ACB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: BCB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: CCB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: DCB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: ECB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 7A60000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 9CB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: ACB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: BCB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: CCB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 1520000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 2FC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: 4FC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: BD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 28D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 48D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 6D60000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 7D60000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 7EE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 8EE0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 6FF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 91E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: A1E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: B1E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: C1E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 1220000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 2DF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 2D00000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: DD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 27D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: DD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 6B10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 7B10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 7C90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 6E50000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 8C90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 9C90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: AC90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: BC90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: FC0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 29D0000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 2920000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 1200000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 2D10000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory allocated: 2C30000 memory reserve | memory write watch
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599764Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599546Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599327Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599217Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598889Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598780Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598562Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598453Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598343Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598211Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598093Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597874Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597765Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597546Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597328Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597217Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597109Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596999Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596890Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596779Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596670Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596557Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596386Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596280Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596171Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596061Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595843Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595732Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595514Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595296Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595184Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595075Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 594968Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 594750Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 594640Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 594531Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeWindow / User API: threadDelayed 2933Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeWindow / User API: threadDelayed 6918Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\_decimal.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\_ctypes.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\_hashlib.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\libcrypto-1_1.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\_ssl.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\_socket.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\_queue.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\_bz2.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\libssl-1_1.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\python311.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\_multiprocessing.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\select.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\_lzma.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\pyexpat.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI66002\unicodedata.pydJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\lib.exeAPI coverage: 1.5 %
            Source: C:\Users\user\AppData\Local\Temp\leaf.exe TID: 2316Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exe TID: 7136Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4688Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep count: 42 > 30Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -38738162554790034s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 2992Thread sleep count: 2933 > 30Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 2992Thread sleep count: 6918 > 30Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -599764s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -599546s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -599437s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -599327s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -599217s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -599109s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -599000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -598889s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -598780s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -598672s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -598562s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -598453s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -598343s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -598211s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -598093s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -597984s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -597874s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -597765s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -597656s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -597546s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -597437s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -597328s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -597217s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -597109s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -596999s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -596890s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -596779s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -596670s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -596557s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -596386s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -596280s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -596171s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -596061s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -595953s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -595843s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -595732s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -595625s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -595514s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -595406s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -595296s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -595184s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -595075s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -594968s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -594859s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -594750s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -594640s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 4580Thread sleep time: -594531s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 3732Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe TID: 5004Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E149AF FindClose,FindFirstFileExW,GetLastError,3_2_00E149AF
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E149CF FindFirstFileExW,3_2_00E149CF
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E14A34 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,3_2_00E14A34
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E16B69 FindFirstFileExW,3_2_00E16B69
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759966878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,5_2_00007FF759966878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759970A34 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,5_2_00007FF759970A34
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759966878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,5_2_00007FF759966878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF7599569E0 FindFirstFileExW,FindClose,5_2_00007FF7599569E0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759970A34 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,7_2_00007FF759970A34
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759966878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,7_2_00007FF759966878
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF7599569E0 FindFirstFileExW,FindClose,7_2_00007FF7599569E0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759966878 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,7_2_00007FF759966878
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DF867D VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,3_2_00DF867D
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599764Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599546Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599327Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599217Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598889Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598780Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598562Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598453Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598343Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598211Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 598093Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597874Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597765Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597546Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597328Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597217Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 597109Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596999Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596890Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596779Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596670Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596557Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596386Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596280Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596171Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 596061Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595843Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595732Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595514Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595296Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595184Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 595075Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 594968Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 594859Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 594750Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 594640Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 594531Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeThread delayed: delay time: 922337203685477
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
            Source: svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
            Source: api.exe, 00000003.00000003.2053441893.0000000000C9A000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2057217050.0000000000C9B000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000002.2260553543.0000000000C9B000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2256100134.0000000000C9A000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2065711789.0000000000C9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%
            Source: api.exe, 00000003.00000003.2053441893.0000000000C9A000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2057217050.0000000000C9B000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000002.2260553543.0000000000C9B000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000002.2260386826.0000000000C3E000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2256100134.0000000000C9A000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2065711789.0000000000C9A000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2075720717.0000026B4E05B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2066636421.0000026B4E01C000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077476000.0000026B4E05D000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2082653981.0000026B4E05E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2074223292.0000026B4E058000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
            Source: svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
            Source: svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
            Source: svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
            Source: svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
            Source: svcupdater.exe, 00000011.00000002.3285920621.0000000000E75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
            Source: svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
            Source: svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
            Source: svcupdater.exe, 00000012.00000002.2877978549.0000000002910000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
            Source: api.exe, 00000003.00000003.2061946849.0000000003C9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DF491D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00DF491D
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DF867D VirtualProtect ?,-00000001,00000104,?,?,?,0000001C3_2_00DF867D
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E00FF0 mov eax, dword ptr fs:[00000030h]3_2_00E00FF0
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E01034 mov eax, dword ptr fs:[00000030h]3_2_00E01034
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E00ECD mov ecx, dword ptr fs:[00000030h]3_2_00E00ECD
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759972620 GetProcessHeap,5_2_00007FF759972620
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeCode function: 0_2_004014AD EntryPoint,memset,SetUnhandledExceptionFilter,__set_app_type,_controlfp,__argc,__argv,_environ,_environ,__argv,__getmainargs,__argc,__argv,_environ,__argc,__argc,exit,0_2_004014AD
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E1050F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00E1050F
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DF491D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00DF491D
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E0FEB0 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00E0FEB0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75995AA2C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF75995AA2C
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75995A180 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FF75995A180
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF759969C44 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF759969C44
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 5_2_00007FF75995ABD4 SetUnhandledExceptionFilter,5_2_00007FF75995ABD4
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75995AA2C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF75995AA2C
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75995A180 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00007FF75995A180
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF759969C44 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF759969C44
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF75995ABD4 SetUnhandledExceptionFilter,7_2_00007FF75995ABD4
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B8F82600 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00007FF8B8F82600
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B8F82BC0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF8B8F82BC0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B9061B00 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF8B9061B00
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B9061530 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00007FF8B9061530
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B93C6254 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF8B93C6254
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B93C5CB0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00007FF8B93C5CB0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B98452F0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF8B98452F0
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B9844D20 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00007FF8B9844D20
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B9F70468 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00007FF8B9F70468
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeMemory written: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeProcess created: C:\Users\user\AppData\Local\Temp\leaf.exe "C:\Users\user\AppData\Local\Temp\leaf.exe" Jump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeProcess created: C:\Users\user\AppData\Local\Temp\api.exe "C:\Users\user\AppData\Local\Temp\api.exe" Jump to behavior
            Source: C:\Users\user\Desktop\Mega.nz Spreader.exeProcess created: C:\Users\user\AppData\Local\Temp\lib.exe "C:\Users\user\AppData\Local\Temp\lib.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess created: C:\Users\user\AppData\Local\Temp\leaf.exe "{path}"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess created: C:\Users\user\AppData\Local\Temp\leaf.exe "{path}"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeProcess created: C:\Users\user\AppData\Local\Temp\lib.exe "C:\Users\user\AppData\Local\Temp\lib.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /fJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /fJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe "{path}"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe "{path}"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeProcess created: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe "{path}"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E1070C cpuid 3_2_00E1070C
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,3_2_00E09000
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: EnumSystemLocalesW,3_2_00E092ED
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: EnumSystemLocalesW,3_2_00E092A2
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: GetLocaleInfoW,3_2_00DFF22B
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: EnumSystemLocalesW,3_2_00E09388
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_00E09413
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: GetLocaleInfoW,3_2_00E09666
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: GetLocaleInfoEx,FormatMessageA,3_2_00E147AB
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_00E0978F
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: GetLocaleInfoW,3_2_00E09895
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00E09964
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: EnumSystemLocalesW,3_2_00DFEC4F
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeQueries volume information: C:\Users\user\AppData\Local\Temp\leaf.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\_ctypes.pyd VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\_socket.pyd VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\select.pyd VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002\base_library.zip VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\lib.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\lib.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI66002 VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeQueries volume information: C:\Users\user\AppData\Local\Temp\leaf.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\api.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation TimeZoneKeyNameJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E10AC2 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_00E10AC2
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00DE0E60 GetUserNameW,3_2_00DE0E60
            Source: C:\Users\user\AppData\Local\Temp\api.exeCode function: 3_2_00E04380 GetTimeZoneInformation,3_2_00E04380
            Source: C:\Users\user\AppData\Local\Temp\leaf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000011.00000002.3289763270.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: svcupdater.exe PID: 2568, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: api.exe PID: 5656, type: MEMORYSTR
            Source: api.exe, 00000003.00000003.2255435579.0000000000CB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Electrum-LTC\configr;
            Source: api.exe, 00000003.00000002.2260553543.0000000000C9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\ElectronCash\config47efd221b}LMEM
            Source: api.exe, 00000003.00000002.2260386826.0000000000C3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
            Source: api.exe, 00000003.00000002.2260386826.0000000000C3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Exodus\exodus.wallet
            Source: api.exe, 00000003.00000003.2255435579.0000000000CB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Binance\Local Storage\leveldb
            Source: api.exe, 00000003.00000002.2260386826.0000000000C3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
            Source: api.exe, 00000003.00000002.2260386826.0000000000C3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
            Source: C:\Users\user\AppData\Local\Temp\api.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-coreJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\api.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: api.exe PID: 5656, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B8F85610 _PyArg_ParseTuple_SizeT,PyEval_SaveThread,listen,PyEval_RestoreThread,_Py_NoneStruct,7_2_00007FF8B8F85610
            Source: C:\Users\user\AppData\Local\Temp\lib.exeCode function: 7_2_00007FF8B8F845E8 PySys_Audit,PyEval_SaveThread,bind,PyEval_RestoreThread,_Py_NoneStruct,7_2_00007FF8B8F845E8
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Disable or Modify Tools
            1
            OS Credential Dumping
            12
            System Time Discovery
            Remote Services1
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            1
            Scheduled Task/Job
            111
            Process Injection
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol2
            Data from Local System
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            Logon Script (Windows)1
            Scheduled Task/Job
            3
            Obfuscated Files or Information
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Screen Capture
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Software Packing
            NTDS34
            System Information Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets1
            Query Registry
            SSHKeylogging3
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Masquerading
            Cached Domain Credentials221
            Security Software Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
            Virtualization/Sandbox Evasion
            DCSync1
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
            Process Injection
            Proc Filesystem31
            Virtualization/Sandbox Evasion
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            Application Window Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
            System Owner/User Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
            System Network Configuration Discovery
            Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1485496 Sample: Mega.nz Spreader.exe Startdate: 31/07/2024 Architecture: WINDOWS Score: 100 67 api.ipify.org 2->67 75 Found malware configuration 2->75 77 Antivirus / Scanner detection for submitted sample 2->77 79 Multi AV Scanner detection for submitted file 2->79 81 9 other signatures 2->81 10 Mega.nz Spreader.exe 4 2->10         started        13 svcupdater.exe 2 2->13         started        16 svcupdater.exe 3 2->16         started        18 svcupdater.exe 2->18         started        signatures3 process4 file5 61 C:\Users\user\AppData\Local\Temp\lib.exe, PE32+ 10->61 dropped 63 C:\Users\user\AppData\Local\Temp\leaf.exe, PE32 10->63 dropped 65 C:\Users\user\AppData\Local\Temp\api.exe, PE32 10->65 dropped 20 lib.exe 20 10->20         started        24 api.exe 6 10->24         started        27 leaf.exe 3 10->27         started        99 Injects a PE file into a foreign processes 13->99 29 svcupdater.exe 13->29         started        31 svcupdater.exe 13->31         started        33 svcupdater.exe 15 3 16->33         started        signatures6 process7 dnsIp8 51 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 20->51 dropped 53 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 20->53 dropped 55 C:\Users\user\AppData\Local\...\python311.dll, PE32+ 20->55 dropped 57 14 other malicious files 20->57 dropped 83 Found pyInstaller with non standard icon 20->83 35 lib.exe 1 20->35         started        37 conhost.exe 20->37         started        69 77.105.147.1, 15666, 49704 PLUSTELECOM-ASRU Russian Federation 24->69 71 api.ipify.org 104.26.12.205, 443, 49705 CLOUDFLARENETUS United States 24->71 85 Antivirus detection for dropped file 24->85 87 Multi AV Scanner detection for dropped file 24->87 89 Machine Learning detection for dropped file 24->89 95 3 other signatures 24->95 91 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 27->91 93 Drops large PE files 27->93 39 leaf.exe 2 27->39         started        42 leaf.exe 27->42         started        73 45.159.189.105, 49719, 49720, 49721 HOSTING-SOLUTIONSUS Netherlands 33->73 file9 signatures10 process11 file12 59 C:\Users\user\AppData\...\svcupdater.exe, PE32 39->59 dropped 44 cmd.exe 1 39->44         started        process13 signatures14 97 Uses schtasks.exe or at.exe to add and modify task schedules 44->97 47 conhost.exe 44->47         started        49 schtasks.exe 1 44->49         started        process15

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Mega.nz Spreader.exe71%ReversingLabsWin32.Dropper.Dapato
            Mega.nz Spreader.exe100%AviraHEUR/AGEN.1342303
            Mega.nz Spreader.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\api.exe100%AviraTR/Meduza.A
            C:\Users\user\AppData\Local\Temp\api.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\leaf.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\_MEI66002\VCRUNTIME140.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\_bz2.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\_ctypes.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\_decimal.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\_hashlib.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\_lzma.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\_multiprocessing.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\_queue.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\_socket.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\_ssl.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\libcrypto-1_1.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\libffi-8.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\libssl-1_1.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\pyexpat.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\python311.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\select.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\_MEI66002\unicodedata.pyd0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\api.exe75%ReversingLabsWin32.Spyware.Meduza
            C:\Users\user\AppData\Local\Temp\leaf.exe79%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
            C:\Users\user\AppData\Local\Temp\lib.exe0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://api.ipify.org/0%URL Reputationsafe
            https://www.python.org/download/releases/2.3/mro/.0%URL Reputationsafe
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            https://www.openssl.org/H0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%Avira URL Cloudsafe
            https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
            https://t.me/royalleaksh__0%Avira URL Cloudsafe
            https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%Avira URL Cloudsafe
            http://ns.aap0%Avira URL Cloudsafe
            https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
            https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%Avira URL Cloudsafe
            https://api.ipify.org/50%Avira URL Cloudsafe
            https://www.python.org/psf/license/0%Avira URL Cloudsafe
            https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%Avira URL Cloudsafe
            https://bugs.python.org/issue42195.0%Avira URL Cloudsafe
            http://cacerts.digicert.co0%Avira URL Cloudsafe
            https://t.me/royalleaks0%Avira URL Cloudsafe
            https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py0%Avira URL Cloudsafe
            https://peps.python.org/pep-0205/0%Avira URL Cloudsafe
            http://45.159.189.1050%Avira URL Cloudsafe
            https://api.ipify.org2x0%Avira URL Cloudsafe
            http://45.159.189.105/bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d0%Avira URL Cloudsafe
            http://cacerts.digicert.cok0%Avira URL Cloudsafe
            https://peps.python.org/pep-0263/0%Avira URL Cloudsafe
            http://cacerts.digicert.coj0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.ipify.org
            104.26.12.205
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              https://api.ipify.org/false
              • URL Reputation: safe
              unknown
              http://45.159.189.105/bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694dtrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://ns.aapapi.exe, 00000003.00000003.2260052741.000000000109D000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2259726725.000000000109C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688lib.exe, 00000007.00000002.2081606147.0000026B4DA88000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://duckduckgo.com/chrome_newtabapi.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://t.me/royalleaksh__lib.exe, 00000007.00000002.2083307702.0000026B4FB28000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://duckduckgo.com/ac/?q=api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://www.google.com/images/branding/product/ico/googleg_lodp.icoapi.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://www.python.org/download/releases/2.3/mro/.lib.exe, 00000007.00000003.2057719232.0000026B4DF02000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2058100018.0000026B4DEC3000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2057579099.0000026B4DF00000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2081606147.0000026B4DA00000.00000004.00001000.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2057579099.0000026B4DEC3000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerlib.exe, 00000007.00000003.2075465060.0000026B4D9D1000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2064008323.0000026B4DF23000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2067488525.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077249450.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2075968258.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077640294.0000026B4DF49000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2081537469.0000026B4D9EF000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076861094.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2082286891.0000026B4DF4A000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2074018307.0000026B4DF15000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2061947765.0000026B4DF1D000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076697687.0000026B4DF2E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2063331817.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060050613.0000026B4D9E4000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2065651958.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060729690.0000026B4DF0E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077823055.0000026B4D9E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062263084.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062530738.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077548067.0000026B4D9E6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://api.ipify.org/5api.exe, 00000003.00000002.2260386826.0000000000C3E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#lib.exe, 00000007.00000003.2075465060.0000026B4D9D1000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2064008323.0000026B4DF23000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2067488525.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077249450.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2075968258.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077640294.0000026B4DF49000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2081537469.0000026B4D9EF000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076861094.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2074018307.0000026B4DF15000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2061947765.0000026B4DF1D000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076697687.0000026B4DF2E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2063331817.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060050613.0000026B4D9E4000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2065651958.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060729690.0000026B4DF0E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077823055.0000026B4D9E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062263084.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062530738.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077548067.0000026B4D9E6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://www.ecosia.org/newtab/api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sylib.exe, 00000007.00000003.2075465060.0000026B4D9D1000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2064008323.0000026B4DF23000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2067488525.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077249450.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2075968258.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077640294.0000026B4DF49000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2081537469.0000026B4D9EF000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076861094.0000026B4D9D2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2074018307.0000026B4DF15000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2061947765.0000026B4DF1D000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076697687.0000026B4DF2E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2063331817.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060050613.0000026B4D9E4000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2065651958.0000026B4DF14000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2060729690.0000026B4DF0E000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077823055.0000026B4D9E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062263084.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2062530738.0000026B4DF25000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2077548067.0000026B4D9E6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://www.python.org/psf/license/lib.exe, 00000007.00000002.2085170372.00007FF8A8958000.00000004.00000001.01000000.0000000D.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://ac.ecosia.org/autocomplete?q=api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://bugs.python.org/issue42195.lib.exe, 00000007.00000003.2067488525.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2066562018.0000026B4E184000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2075968258.0000026B4DF1B000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2074018307.0000026B4DF15000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2065469810.0000026B4E184000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://cacerts.digicert.colib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://45.159.189.105svcupdater.exe, 00000011.00000002.3289763270.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000011.00000002.3289763270.0000000002E85000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000011.00000002.3289763270.0000000002E68000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000011.00000002.3289763270.0000000002E5E000.00000004.00000800.00020000.00000000.sdmptrue
              • Avira URL Cloud: safe
              unknown
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchapi.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.openssl.org/Hlib.exe, 00000005.00000003.2049182076.00000273A7FBC000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://t.me/royalleakslib.exe, 00000007.00000003.2074697379.0000026B4E0E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2083307702.0000026B4FB28000.00000004.00001000.00020000.00000000.sdmp, lib.exe, 00000007.00000002.2082984704.0000026B4E0F2000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2069569579.0000026B4E0E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076202808.0000026B4E0E7000.00000004.00000020.00020000.00000000.sdmp, lib.exe, 00000007.00000003.2076459074.0000026B4E0F0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://api.ipify.org2xapi.exe, 00000003.00000002.2260386826.0000000000C3E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://peps.python.org/pep-0205/lib.exe, 00000007.00000002.2081774717.0000026B4DCB0000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.pylib.exe, 00000007.00000003.2077548067.0000026B4D9E6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameleaf.exe, 00000001.00000002.2188032639.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 0000000E.00000002.2617772935.00000000028D1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000011.00000002.3289763270.0000000002E5E000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000012.00000002.2877978549.00000000027D1000.00000004.00000800.00020000.00000000.sdmp, svcupdater.exe, 00000015.00000002.3290066052.0000000002D11000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=api.exe, 00000003.00000003.2057014116.0000000003C79000.00000004.00000020.00020000.00000000.sdmp, api.exe, 00000003.00000003.2054880295.0000000003C79000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://peps.python.org/pep-0263/lib.exe, 00000007.00000002.2084707630.00007FF8A88BB000.00000002.00000001.01000000.0000000D.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://cacerts.digicert.coklib.exe, 00000005.00000003.2039007675.00000273A7FBA000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://cacerts.digicert.cojlib.exe, 00000005.00000003.2039763643.00000273A7FBB000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              104.26.12.205
              api.ipify.orgUnited States
              13335CLOUDFLARENETUSfalse
              77.105.147.1
              unknownRussian Federation
              42031PLUSTELECOM-ASRUtrue
              45.159.189.105
              unknownNetherlands
              14576HOSTING-SOLUTIONSUStrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1485496
              Start date and time:2024-07-31 18:27:11 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 10m 30s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:22
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Mega.nz Spreader.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@28/26@1/3
              EGA Information:
              • Successful, ratio: 72.7%
              HCA Information:
              • Successful, ratio: 65%
              • Number of executed functions: 140
              • Number of non-executed functions: 254
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target leaf.exe, PID 1784 because it is empty
              • Execution Graph export aborted for target svcupdater.exe, PID 2568 because it is empty
              • Execution Graph export aborted for target svcupdater.exe, PID 5084 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: Mega.nz Spreader.exe
              TimeTypeDescription
              12:28:14API Interceptor1x Sleep call for process: leaf.exe modified
              12:28:55API Interceptor1208x Sleep call for process: svcupdater.exe modified
              18:28:39Task SchedulerRun new task: eOzNUSwmQA path: C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              104.26.12.205Zoom_workspace.htaGet hashmaliciousCobalt Strike, Clipboard HijackerBrowse
              • api.ipify.org/
              SecuriteInfo.com.Win64.Evo-gen.28044.10443.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
              • api.ipify.org/
              6OiUEubyA8.msiGet hashmaliciousQuasarBrowse
              • api.ipify.org/
              SecuriteInfo.com.Win64.RansomX-gen.22171.1307.exeGet hashmaliciousConti, PureLog Stealer, Targeted RansomwareBrowse
              • api.ipify.org/
              482730621.exeGet hashmaliciousStealitBrowse
              • api.ipify.org/?format=json
              482730621.exeGet hashmaliciousStealitBrowse
              • api.ipify.org/?format=json
              Sonic-Glyder.exeGet hashmaliciousStealitBrowse
              • api.ipify.org/?format=json
              Sky-Beta.exeGet hashmaliciousStealitBrowse
              • api.ipify.org/?format=json
              SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
              • api.ipify.org/
              45.159.189.1059RDOrudEBB.exeGet hashmaliciousLaplas ClipperBrowse
              • 45.159.189.105/bot/online?key=0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e&guid=computer\user
              file.exeGet hashmaliciousLaplas Clipper, RedLineBrowse
              • 45.159.189.105/bot/online?key=ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4&guid=computer\user
              SXm1px9Zg0.exeGet hashmaliciousLaplas ClipperBrowse
              • 45.159.189.105/bot/online?key=7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e&guid=computer\user
              4x8vn385io.exeGet hashmaliciousMinerDownloader, Laplas Clipper, RedLine, XmrigBrowse
              • 45.159.189.105/bot/online?key=ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4&guid=computer\user
              iJ6SIwcNf3.exeGet hashmaliciousLaplas ClipperBrowse
              • 45.159.189.105/bot/online?key=7ee57b1f6d4aff08f9755119b18cf0754b677addcb6a3063066112b10a357a8e&guid=computer\user
              YRcS5GIB02.exeGet hashmaliciousLaplas ClipperBrowse
              • 45.159.189.105/bot/online?key=ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4&guid=computer\user
              F2u0un5xar.exeGet hashmaliciousLaplas ClipperBrowse
              • 45.159.189.105/bot/online?key=0be23a6bec914a7d28f1aae995f036fdba93224093ddb48d02fe43e814862f4e&guid=computer\user
              rGn7jtGZE0.exeGet hashmaliciousLaplas ClipperBrowse
              • 45.159.189.105/bot/online?guid=992547&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
              1DtMIGzTkc.exeGet hashmaliciousLaplas ClipperBrowse
              • 45.159.189.105/bot/online?guid=980108&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
              iYHZhXtc7t.exeGet hashmaliciousLaplas ClipperBrowse
              • 45.159.189.105/bot/online?guid=226533&key=afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              api.ipify.orgRevised PI_2024.exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.12.205
              rM20240731086.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 172.67.74.152
              Zoom_workspace.htaGet hashmaliciousCobalt Strike, Clipboard HijackerBrowse
              • 104.26.12.205
              QUOTATION.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 104.26.12.205
              DHL- INVOICE-1851940333.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 172.67.74.152
              https://hughssherika896572396.pages.dev/help/contact/1741368058003682606:4700:310c::ac42:2f19Get hashmaliciousUnknownBrowse
              • 172.67.74.152
              First order.exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.12.205
              DHL-AIR-WAYBILL.batGet hashmaliciousAgentTeslaBrowse
              • 104.26.12.205
              DHL-INVOICE.scr.exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.12.205
              DHL-INVOICE-4977440333.bat.exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.12.205
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CLOUDFLARENETUSSecuriteInfo.com.Win32.RATX-gen.24742.674.exeGet hashmaliciousFormBook, PureLog StealerBrowse
              • 104.18.35.90
              https://perkinelmer-staffportal-lmofcdoqfmdpzbwhsftftxkbn.vimkesim.com/kiwcmcvfddsvyktlzqmkjcdvu/rueacoiqvefopwnwsizeigdjb/wfvtbncvjymjfkciswigfg11xgen/thgdvnhgkqksinhmhdsinvcbj/pejjvngpzcqurjziqogamybbf/cherylle.galapon/akyfcruunfgxwfrcvhyhatlsy/perkinelmer.com/clyjpwxxuqacstjsckdyzxowjGet hashmaliciousHTMLPhisherBrowse
              • 172.67.174.145
              New Features.htmGet hashmaliciousUnknownBrowse
              • 104.21.233.198
              BraveBrowserSetup-BRV010.exeGet hashmaliciousUnknownBrowse
              • 1.1.1.1
              https://rsms.me/inter/inter.cssGet hashmaliciousUnknownBrowse
              • 104.21.234.234
              BraveBrowserSetup-BRV010.exeGet hashmaliciousUnknownBrowse
              • 1.1.1.1
              http://proposaljennycarlys.wordpress.comGet hashmaliciousUnknownBrowse
              • 104.17.25.14
              Remittance Advice.exeGet hashmaliciousSnake KeyloggerBrowse
              • 188.114.96.3
              https://kaloramapartnersllc.freshdesk.com/en/support/solutions/articles/154000170546-secure-business-documentsGet hashmaliciousUnknownBrowse
              • 162.159.140.147
              https://securemail.financialservicing.net/s/e?m=ABDdawYvyn1dAC6HzNUN8S5p&c=ABB3ZkmVMmRFCMSUS5X9O3wiGet hashmaliciousUnknownBrowse
              • 1.1.1.1
              PLUSTELECOM-ASRUhLaUjkQEf9.exeGet hashmaliciousAtlantida StealerBrowse
              • 77.105.135.19
              LisectAVT_2403002B_223.exeGet hashmaliciousRemcosBrowse
              • 77.105.132.92
              hOYGfIcBVf.exeGet hashmaliciousLummaC, VidarBrowse
              • 77.105.132.27
              file.exeGet hashmaliciousRedLineBrowse
              • 77.105.135.107
              MN3OAv98T9.exeGet hashmaliciousLummaC, VidarBrowse
              • 77.105.132.27
              file.exeGet hashmaliciousRedLineBrowse
              • 77.105.135.107
              file.exeGet hashmaliciousRedLineBrowse
              • 77.105.135.107
              file.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
              • 77.105.133.27
              cKt8r2v7Gy.exeGet hashmaliciousUnknownBrowse
              • 77.105.133.27
              7dZHSgxz2F.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
              • 77.105.135.87
              HOSTING-SOLUTIONSUSfile.exeGet hashmaliciousAmadeyBrowse
              • 185.209.162.226
              http://tqwwwcom.ru/Get hashmaliciousUnknownBrowse
              • 204.155.30.34
              xworm.exeGet hashmaliciousUnknownBrowse
              • 185.209.160.70
              Fb9Ff8L4T7Get hashmaliciousRHADAMANTHYSBrowse
              • 185.209.160.99
              file.exeGet hashmaliciousVidar, XmrigBrowse
              • 185.209.162.208
              file.exeGet hashmaliciousVidar, XmrigBrowse
              • 185.209.162.208
              05F1TC85Up.exeGet hashmaliciousDanaBotBrowse
              • 45.159.189.76
              05F1TC85Up.exeGet hashmaliciousDanaBotBrowse
              • 45.159.189.76
              Green.exeGet hashmaliciousRedLineBrowse
              • 185.209.160.70
              Yellow.exeGet hashmaliciousRedLineBrowse
              • 185.209.160.70
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              37f463bf4616ecd445d4a1937da06e19Geron Steel-Order-79376- Contract 2025.exeGet hashmaliciousRemcosBrowse
              • 104.26.12.205
              setup#U67e5#U8be2.exeGet hashmaliciousUnknownBrowse
              • 104.26.12.205
              0242_FV1_241356.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
              • 104.26.12.205
              zrpPKBbxN0.exeGet hashmaliciousUnknownBrowse
              • 104.26.12.205
              New _Order_0567___Pdf.exeGet hashmaliciousUnknownBrowse
              • 104.26.12.205
              F_7576419.LnK.lnkGet hashmaliciousMalLnkBrowse
              • 104.26.12.205
              PO4541 , PO4537.pdf.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
              • 104.26.12.205
              1604202412475.exeGet hashmaliciousGuLoaderBrowse
              • 104.26.12.205
              Pagos-Confirming_PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
              • 104.26.12.205
              Frsteudgaves.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 104.26.12.205
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Local\Temp\_MEI66002\VCRUNTIME140.dllBuilt.exeGet hashmaliciousBlank GrabberBrowse
                LisectAVT_2403002A_424.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                  LisectAVT_2403002A_424.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                    LisectAVT_2403002A_441.exeGet hashmaliciousUnknownBrowse
                      Lisect_AVT_24003_G1B_83.exeGet hashmaliciousUnknownBrowse
                        QiYc6RUCv8.exeGet hashmaliciousUnknownBrowse
                          explorer.exeGet hashmaliciousNemtyBrowse
                            SecuriteInfo.com.Win64.Evo-gen.23205.20359.exeGet hashmaliciousUnknownBrowse
                              1dAlsYrmjy.exeGet hashmaliciousMint StealerBrowse
                                1dAlsYrmjy.exeGet hashmaliciousMint StealerBrowse
                                  C:\Users\user\AppData\Local\Temp\_MEI66002\_bz2.pydSecuriteInfo.com.FileRepMalware.10144.24483.exeGet hashmaliciousDiscord Token StealerBrowse
                                    SecuriteInfo.com.W64.S-e4cd4610.Eldorado.25276.12705.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Win64.Evo-gen.25988.30409.exeGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.Win64.Evo-gen.4079.4864.exeGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.Win64.Evo-gen.22775.26811.exeGet hashmaliciousUnknownBrowse
                                            bomb.bin.exeGet hashmaliciousLummaC, Amadey, HTMLPhisher, Fabookie, LummaC Stealer, PureLog Stealer, RedLineBrowse
                                              file.exeGet hashmaliciousPython Stealer, Stink StealerBrowse
                                                MultiCheat.exeGet hashmaliciousUnknownBrowse
                                                  baliksabit.exeGet hashmaliciousUnknownBrowse
                                                    G04xjFVx3R.exeGet hashmaliciousCobaltStrikeBrowse
                                                      Process:C:\Users\user\AppData\Local\Temp\leaf.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1314
                                                      Entropy (8bit):5.3387892510515025
                                                      Encrypted:false
                                                      SSDEEP:24:MLU84jE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4sAmE4Ks:MgvjHK5HKH1qHiYHKh3oPtHo6hAHKzeL
                                                      MD5:8C61F9E2B19E0315722C135D70192939
                                                      SHA1:BFC216104805B4183FD0A9153EE0B39076AECCBC
                                                      SHA-256:AFA04F5408E6285A7B01334D40EA524ADB37116790061849F4D6B48D880D93A0
                                                      SHA-512:55CC4879F5AC9C5BDB659D0DC915102B39BC2035CF1C3CADBF3BE6A4447B5613A9D665FC06AD3F461803D04495AAD5EAB0758C02B8F110090FF6F791B80B270D
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                      Process:C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1314
                                                      Entropy (8bit):5.3387892510515025
                                                      Encrypted:false
                                                      SSDEEP:24:MLU84jE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4sAmE4Ks:MgvjHK5HKH1qHiYHKh3oPtHo6hAHKzeL
                                                      MD5:8C61F9E2B19E0315722C135D70192939
                                                      SHA1:BFC216104805B4183FD0A9153EE0B39076AECCBC
                                                      SHA-256:AFA04F5408E6285A7B01334D40EA524ADB37116790061849F4D6B48D880D93A0
                                                      SHA-512:55CC4879F5AC9C5BDB659D0DC915102B39BC2035CF1C3CADBF3BE6A4447B5613A9D665FC06AD3F461803D04495AAD5EAB0758C02B8F110090FF6F791B80B270D
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):109392
                                                      Entropy (8bit):6.641929675972235
                                                      Encrypted:false
                                                      SSDEEP:1536:GcghbEGyzXJZDWnEzWG9q4lVOiVgXjO5/woecbq8qZHg2zuCS+zuecL:GV3iC0h9q4v6XjKwoecbq8qBTq+1cL
                                                      MD5:4585A96CC4EEF6AAFD5E27EA09147DC6
                                                      SHA1:489CFFF1B19ABBEC98FDA26AC8958005E88DD0CB
                                                      SHA-256:A8F950B4357EC12CFCCDDC9094CCA56A3D5244B95E09EA6E9A746489F2D58736
                                                      SHA-512:D78260C66331FE3029D2CC1B41A5D002EC651F2E3BBF55076D65839B5E3C6297955AFD4D9AB8951FBDC9F929DBC65EB18B14B59BCE1F2994318564EB4920F286
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Joe Sandbox View:
                                                      • Filename: Built.exe, Detection: malicious, Browse
                                                      • Filename: LisectAVT_2403002A_424.exe, Detection: malicious, Browse
                                                      • Filename: LisectAVT_2403002A_424.exe, Detection: malicious, Browse
                                                      • Filename: LisectAVT_2403002A_441.exe, Detection: malicious, Browse
                                                      • Filename: Lisect_AVT_24003_G1B_83.exe, Detection: malicious, Browse
                                                      • Filename: QiYc6RUCv8.exe, Detection: malicious, Browse
                                                      • Filename: explorer.exe, Detection: malicious, Browse
                                                      • Filename: SecuriteInfo.com.Win64.Evo-gen.23205.20359.exe, Detection: malicious, Browse
                                                      • Filename: 1dAlsYrmjy.exe, Detection: malicious, Browse
                                                      • Filename: 1dAlsYrmjy.exe, Detection: malicious, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........u...u...u.E.t...u.....u...t...u..v...u..q...u..p...u..u...u......u..w...u.Rich..u.........PE..d..._#;..........." ...".....`......................................................=.....`A........................................`C..4....K...............p.......\..PO...........-..p............................,..@............................................text............................... ..`.rdata...A.......B..................@..@.data...0....`.......D..............@....pdata.......p.......H..............@..@_RDATA..\............T..............@..@.rsrc................V..............@..@.reloc...............Z..............@..B................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):84752
                                                      Entropy (8bit):6.571095276277803
                                                      Encrypted:false
                                                      SSDEEP:1536:MidQz7pZ3catNZTRGE51LOBK5btb8ksfYqZImCVK7SysPxJ:MEQz9Z5VOwtIksAqZImCVKGxJ
                                                      MD5:A62207FC33140DE460444E191AE19B74
                                                      SHA1:9327D3D4F9D56F1846781BCB0A05719DEA462D74
                                                      SHA-256:EBCAC51449F323AE3AE961A33843029C34B6A82138CCD9214CF99F98DD2148C2
                                                      SHA-512:90F9DB9EE225958CB3E872B79F2C70CB1FD2248EBAA8F3282AFFF9250285852156BF668F5CFEC49A4591B416CE7EBAAAC62D2D887152F5356512F2347E3762B7
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Joe Sandbox View:
                                                      • Filename: SecuriteInfo.com.FileRepMalware.10144.24483.exe, Detection: malicious, Browse
                                                      • Filename: SecuriteInfo.com.W64.S-e4cd4610.Eldorado.25276.12705.exe, Detection: malicious, Browse
                                                      • Filename: SecuriteInfo.com.Win64.Evo-gen.25988.30409.exe, Detection: malicious, Browse
                                                      • Filename: SecuriteInfo.com.Win64.Evo-gen.4079.4864.exe, Detection: malicious, Browse
                                                      • Filename: SecuriteInfo.com.Win64.Evo-gen.22775.26811.exe, Detection: malicious, Browse
                                                      • Filename: bomb.bin.exe, Detection: malicious, Browse
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: MultiCheat.exe, Detection: malicious, Browse
                                                      • Filename: baliksabit.exe, Detection: malicious, Browse
                                                      • Filename: G04xjFVx3R.exe, Detection: malicious, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{...............b`.....f......f......f......f......f......0f......b.............0f......0f......0f......0f......Rich............PE..d...0.,d.........." ...".....^......L........................................P......0.....`.........................................p...H............0....... .. ......../...@..........T...........................p...@............................................text............................... ..`.rdata..L>.......@..................@..@.data...............................@....pdata.. .... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):123672
                                                      Entropy (8bit):6.058331301105946
                                                      Encrypted:false
                                                      SSDEEP:3072:+7u5LnIx1If3yJdXfLIOAYX5BO8NImLPcPZx:+wxfijXfLIO9BO8
                                                      MD5:9B344F8D7CE5B57E397A475847CC5F66
                                                      SHA1:AFF1CCC2608DA022ECC8D0ABA65D304FE74CDF71
                                                      SHA-256:B1214D7B7EFD9D4B0F465EC3463512A1CBC5F59686267030F072E6CE4B2A95CF
                                                      SHA-512:2B0D9E1B550BF108FA842324AB26555F2A224AEFFF517FDB16DF85693E05ADAF0D77EBE49382848F1EC68DC9B5AE75027A62C33721E42A1566274D1A2B1BAA41
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........G..&...&...&...^...&...Z...&...Z...&...Z...&...Z...&..eZ...&...^...&...^...&..cZ...&...&..W&..eZ...&..eZ...&..eZv..&..eZ...&..Rich.&..........PE..d...(.,d.........." ..."............p\...................................................`.........................................pP.......P.........................../..............T...........................`...@............................................text............................... ..`.rdata...l.......n..................@..@.data...$=...p...8...^..............@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):253200
                                                      Entropy (8bit):6.550053334419209
                                                      Encrypted:false
                                                      SSDEEP:6144:kH26+xqWUSYJqg2Jda6Rc7nxSelwgozq6t3Vs9qWM53pLW1AGgVMtEIbjf:aWUSYJqge47n8elwHjtl0EIjf
                                                      MD5:692C751A1782CC4B54C203546F238B73
                                                      SHA1:A103017AFB7BADAECE8FEE2721C9A9C924AFD989
                                                      SHA-256:C70F05F6BC564FE400527B30C29461E9642FB973F66EEC719D282D3D0B402F93
                                                      SHA-512:1B1AD0CA648BD50CE6E6AF4BE78AD818487AA336318B272417A2E955EAD546C9E0864B515150CD48751A03CA8C62F9EC91306CDA41BAEA52452E3FCC24D57D39
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........xR....................................................s.................../...s.......s.......s.......s.......s.......Rich....................PE..d.....,d.........." ...".x...:...........................................................`......................................... S..P...pS..................@&......./......P.......T...........................P...@............................................text....v.......x.................. ..`.rdata..L............|..............@..@.data....*...p...$...R..............@....pdata..@&.......(...v..............@..@.rsrc...............................@..@.reloc..P...........................@..B................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):65304
                                                      Entropy (8bit):6.2171557507139275
                                                      Encrypted:false
                                                      SSDEEP:1536:aG8njpnxGkYNEusZE/0Cw6cG1xImOI8K7Sy7Px:a7njpnxBZyw6t1xImOI8K1x
                                                      MD5:787B82D4466F393366657B8F1BC5F1A9
                                                      SHA1:658639CDDDA55AC3BFC452DB4EC9CF88851E606B
                                                      SHA-256:241322647BA9F94BDC3AE387413FFB57AE14C8CF88BD564A31FE193C6CA43E37
                                                      SHA-512:AFCF66962958F38EEC8B591AA30D380EB0E1B41028836058FF91B4D1472658DE9FBA3262F5C27BA688BD73DA018E938F398E45911CD37584F623073067F575B6
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A.g...g...g....2..g.......g.......g.......g.......g..9....g.......g..?....g...g..yg..9....g..9....g..9.^..g..9....g..Rich.g..................PE..d...?.,d.........." ...".T...~......@?....................................................`.............................................P......................,......../......\...0}..T............................{..@............p..(............................text...YR.......T.................. ..`.rdata...N...p...P...X..............@..@.data...8...........................@....pdata..,...........................@..@.rsrc...............................@..@.reloc..\...........................@..B................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):159000
                                                      Entropy (8bit):6.8488302124404905
                                                      Encrypted:false
                                                      SSDEEP:3072:5lirS97HrdVmEkGCm5hvznf49mNo2GOvJ02ZImZ1tUtx:5lirG0EkTQAYO2GQ3
                                                      MD5:0C7EA68CA88C07AE6B0A725497067891
                                                      SHA1:C2B61A3E230B30416BC283D1F3EA25678670EB74
                                                      SHA-256:F74AAF0AA08CF90EB1EB23A474CCB7CB706B1EDE7F911DAF7AE68480765BDF11
                                                      SHA-512:FD52F20496A12E6B20279646663D880B1354CFFEA10793506FE4560ED7DA53E4EFBA900AE65C9996FBB3179C83844A9674051385E6E3C26FB2622917351846B9
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3.*{w.D(w.D(w.D(~..(s.D(8.E)u.D(8.A){.D(8.@)..D(8.G)t.D(..E)t.D(<.E)u.D(w.E(..D(..I)M.D(..D)v.D(..(v.D(..F)v.D(Richw.D(........PE..d...Q.,d.........." ...".b...........5...............................................^....`..........................................%..L...\%..x....p.......P.......>.../......8.......T...........................p...@............................................text....a.......b.................. ..`.rdata..............f..............@..@.data........@......................@....pdata.......P......................@..@.rsrc........p.......2..............@..@.reloc..8............<..............@..B................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):34584
                                                      Entropy (8bit):6.407217347388664
                                                      Encrypted:false
                                                      SSDEEP:768:+HI6RwgJ5xe5Sc88GnJ8hImWtYV5YiSyvBPxWE9yE:2IoJ5U5Sc88GJ8hImWtY77SyZPx2
                                                      MD5:B320EF859E079BCB5FF71EF645B2DAD6
                                                      SHA1:A392A5D74667C22211C50F4684E6B7948ED0E3B1
                                                      SHA-256:B49FE3B3EFD833AAAD131CE25706126B569D1A1F2EBA4D470EC98FFDFA722767
                                                      SHA-512:09532B48B1502C50D0B8308064FE4A3F141354EB45DC84E7C400BF7CEB2D3A7DCB11B45D497013AD0C6E7698DD8B87C6577C1D67FEA37F4046BCA7D5E529B1DE
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Z*\.4y\.4y\.4yU..y^.4y..5x^.4y..1xQ.4y..0xT.4y..7x_.4y..5x^.4y\.5y..4y..5xY.4y..9x^.4y..4x].4y...y].4y..6x].4yRich\.4y................PE..d... .,d.........." ...".....<......0.....................................................`.........................................0D..`....D..x....p.......`.......X.../...........4..T...........................p3..@............0...............................text............................... ..`.rdata..^....0... ..."..............@..@.data........P.......B..............@....pdata.......`.......H..............@..@.rsrc........p.......L..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):32536
                                                      Entropy (8bit):6.446631742280137
                                                      Encrypted:false
                                                      SSDEEP:768:k+yFc6rXtgmk59NImQUx5YiSyvxAPxWE9HJ:k+wdXWP59NImQU/7Sy5APx7
                                                      MD5:06248702A6CD9D2DD20C0B1C6B02174D
                                                      SHA1:3F14D8AF944FE0D35D17701033FF1501049E856F
                                                      SHA-256:AC177CD84C12E03E3A68BCA30290BC0B8F173EEE518EF1FA6A9DCE3A3E755A93
                                                      SHA-512:5B22BBFF56A8B48655332EBD77387D307F5C0A526626F3654267A34BC4863D8AFAF08FF3946606F3CF00B660530389C37BDFAC91843808DBEBC7373040FEC4C1
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_X..1...1...1.......1..0...1..4...1..5...1..2...1.a.0...1..0...1...0...1.a.<...1.a.1...1.a.....1.a.3...1.Rich..1.........PE..d...$.,d.........." ...".....8......................................................b}....`..........................................C..L....C..d....p.......`.......P.../..........p4..T...........................03..@............0..0............................text............................... ..`.rdata..R....0......................@..@.data...x....P.......<..............@....pdata.......`.......@..............@..@.rsrc........p.......D..............@..@.reloc...............N..............@..B................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):79632
                                                      Entropy (8bit):6.284864225554789
                                                      Encrypted:false
                                                      SSDEEP:1536:hJleMWdP0ujH9/s+S+pJGQyivViap5NImLw17SyTPxJK:h7eMgsujH9/sT+pJGkvVpp5NImLw1xxU
                                                      MD5:26DD19A1F5285712068B9E41808E8FA0
                                                      SHA1:90C9A112DD34D45256B4F2ED38C1CBBC9F24DBA5
                                                      SHA-256:EAABF6B78840DAEAF96B5BDBF06ADF0E4E2994DFEEE5C5E27FEFD824DBDA5220
                                                      SHA-512:173E1EDA05D297D7DA2193E8566201F05428437ADCAC80AECEFE80F82D46295B15CE10990B5C080325DC59A432A587EEF84A15EC688A62B82493AD501A1E4520
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NXY..97..97..97..A...97.EE6..97.EE2..97.EE3..97.EE4..97..E6..97..96..97.AA6..97..E:..97..E7..97..E...97..E5..97.Rich.97.................PE..d...M.,d.........." ...".l...........%.......................................P............`.........................................@...P............0....... ..x......../...@..........T...............................@............................................text...&k.......l.................. ..`.rdata..Dt.......v...p..............@..@.data...............................@....pdata..x.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):161048
                                                      Entropy (8bit):6.026444402255808
                                                      Encrypted:false
                                                      SSDEEP:3072:iMxkIQQ8JHl+HPXeLeDgcuM8BYZxn8xfCA+nbUtgGoo4AyclUZImC7cbnx:iMxH8JFSGLAuMdnx1UZUf
                                                      MD5:AB0E4FBFFB6977D0196C7D50BC76CF2D
                                                      SHA1:680E581C27D67CD1545C810DBB175C2A2A4EF714
                                                      SHA-256:680AD2DE8A6CFF927822C1D7DD22112A3E8A824E82A7958EE409A7B9CE45EC70
                                                      SHA-512:2BFF84A8EC7A26DDE8D1BB09792EAD8636009C8EF3FA68300A75420197CD7B6C8EAAF8DB6A5F97442723E5228AFA62961F002948E0EEEE8C957C6517547DFFBA
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........i...i...i.......i..h...i..l...i..m...i..j...i.o.h...i.i.h...i...h.'.i..h...i.o.d...i.o.i...i.o.....i.o.k...i.Rich..i.........................PE..d...R.,d.........." ..."............l+....................................................`.............................................d............`.......P.......F.../...p..4...0...T...............................@............................................text............................... ..`.rdata..............................@..@.data....j.......f..................@....pdata.......P......."..............@..@.rsrc........`......................@..@.reloc..4....p.......8..............@..B........................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                      Category:dropped
                                                      Size (bytes):1750221
                                                      Entropy (8bit):5.5762045216313085
                                                      Encrypted:false
                                                      SSDEEP:24576:mQR5pATt7xm4lUKdcubgAnyfbas0iwhpM2dYf9P3sL3TWLdma0uHH7:mQR5pQxmmG+KLgaT
                                                      MD5:EBB4F1A115F0692698B5640869F30853
                                                      SHA1:9BA77340A6A32AF08899E7F3C97841724DD78C3F
                                                      SHA-256:4AB0DEB6A298D14A0F50D55DC6CE5673B6C5320817EC255ACF282191642A4576
                                                      SHA-512:3F6BA7D86C9F292344F4AD196F4AE863BF936578DD7CFAC7DC4AAF05C2C78E68D5F813C4ED36048B6678451F1717DEEB77493D8557EE6778C6A70BEB5294D21A
                                                      Malicious:false
                                                      Preview:PK..........!.h%..b...b......._collections_abc.pyc............................................d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.........................Z...e.d...............Z.d...Z...e.e...............Z.[.g.d...Z.d.Z...e...e.d.............................Z...e...e...e...........................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.g.............................Z...e...e...e.g...........................................Z...e...e...e.d...........................................Z...e...e...e.d.d.z.............................................Z...e...e...e...........................................Z...e...e.d.............................Z ..e...e.d.............................Z!..e...e...e"..........................................Z#..e.i.......................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):3450648
                                                      Entropy (8bit):6.098075450035195
                                                      Encrypted:false
                                                      SSDEEP:98304:YP+uemAdn67xfxw6rKsK1CPwDv3uFfJz1CmiX:OZemAYxfxw6HK1CPwDv3uFfJzUmA
                                                      MD5:9D7A0C99256C50AFD5B0560BA2548930
                                                      SHA1:76BD9F13597A46F5283AA35C30B53C21976D0824
                                                      SHA-256:9B7B4A0AD212095A8C2E35C71694D8A1764CD72A829E8E17C8AFE3A55F147939
                                                      SHA-512:CB39AA99B9D98C735FDACF1C5ED68A4D09D11F30262B91F6AA48C3F8520EFF95E499400D0CE7E280CA7A90FF6D7141D2D893EF0B33A8803A1CADB28BA9A9E3E2
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........].q...q...q....M..q.......q.......q.......q.......q...q..[q.......q.......q.......s.......q....!..q.......q..Rich.q..........................PE..d......c.........." ..."..$.................................................. 5......%5...`.........................................../..h...Z4.@.....4.|.....2......x4../....4..O....-.8.............................-.@............P4..............................text.....$.......$................. ..`.rdata..&.....%.......$.............@..@.data...!z....2..,....1.............@....pdata........2.......2.............@..@.idata..^#...P4..$....3.............@..@.00cfg..u.....4.......3.............@..@.rsrc...|.....4.......3.............@..@.reloc...y....4..z....3.............@..B................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):39696
                                                      Entropy (8bit):6.641880464695502
                                                      Encrypted:false
                                                      SSDEEP:768:NiQfxQemQJNrPN+moyijAc5YiSyvkIPxWEqG:dfxIQvPkmoyijP7SytPxF
                                                      MD5:0F8E4992CA92BAAF54CC0B43AACCCE21
                                                      SHA1:C7300975DF267B1D6ADCBAC0AC93FD7B1AB49BD2
                                                      SHA-256:EFF52743773EB550FCC6CE3EFC37C85724502233B6B002A35496D828BD7B280A
                                                      SHA-512:6E1B223462DC124279BFCA74FD2C66FE18B368FFBCA540C84E82E0F5BCBEA0E10CC243975574FA95ACE437B9D8B03A446ED5EE0C9B1B094147CEFAF704DFE978
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........iV...8...8...8..p....8.t9...8.p9...8...9...8.t=...8.t<...8.t;...8.1t<...8.1t;...8.1t8...8.1t:...8.Rich..8.........................PE..d...Sh.c.........." ...".H...(.......L...............................................n....`......................................... l.......p..P...............P....l.../......,...@d...............................c..@............`.. ............................text....G.......H.................. ..`.rdata..h....`.......L..............@..@.data................b..............@....pdata..P............d..............@..@.reloc..,............j..............@..B................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):704792
                                                      Entropy (8bit):5.5573527806738126
                                                      Encrypted:false
                                                      SSDEEP:12288:WhO7/rNKmrouK/POt6h+7ToRLgo479dQwwLOpWW/dQ0TGqwfU2lvz2:2is/POtrzbLp5dQ0TGqcU2lvz2
                                                      MD5:BEC0F86F9DA765E2A02C9237259A7898
                                                      SHA1:3CAA604C3FFF88E71F489977E4293A488FB5671C
                                                      SHA-256:D74CE01319AE6F54483A19375524AA39D9F5FD91F06CF7DF238CA25E043130FD
                                                      SHA-512:FFBC4E5FFDB49704E7AA6D74533E5AF76BBE5DB297713D8E59BD296143FE5F145FBB616B343EED3C48ECEACCCCC2431630470D8975A4A17C37EAFCC12EDD19F4
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1}q.1}q.1}q.8..=}q.~.p.3}q.z.p.3}q.~.t.=}q.~.u.9}q.~.r.5}q...p.2}q.1}p..|q...u..}q...q.0}q.....0}q...s.0}q.Rich1}q.........PE..d......c.........." ...".D...T......<................................................i....`..........................................A...N..@U..........s........N......./......h.......8...............................@............@..@............................text....B.......D.................. ..`.rdata.../...`...0...H..............@..@.data...AM.......D...x..............@....pdata...V.......X..................@..@.idata..%W...@...X..................@..@.00cfg..u............l..............@..@.rsrc...s............n..............@..@.reloc..q............v..............@..B................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):199440
                                                      Entropy (8bit):6.378531856504304
                                                      Encrypted:false
                                                      SSDEEP:3072:w1AiI0h9FR8smBjTMZh0b+5giDxbcKinkjXIopWz2nPVQpS1VOWgGbNImLheXxC:1iIqM9T00hiDxbcKkzcPapveZ
                                                      MD5:48E6930E3095F5A2DCF9BAA67098ACFB
                                                      SHA1:DDCD143F386E74E9820A3F838058C4CAA7123A65
                                                      SHA-256:C1ED7017CE55119DF27563D470E7DC3FB29234A7F3CD5FC82D317B6FE559300B
                                                      SHA-512:B50F42F6C7DDBD64BF0FF37F40B8036D253A235FB67693A7F1ED096F5C3B94C2BDE67D0DB63D84A8C710505A891B43F913E1B1044C42B0F5F333D0FE0386A62C
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........T..5.5.5.Mu..5..I.5..I.5..I.5..I.5.ZI.5..M.5.5..5.ZI.5.ZI.5.ZI...5.ZI.5.Rich.5.........PE..d...".,d.........." ..."..................................................... ...........`.............................................P................................/..........`3..T........................... 2..@............ ...............................text...W........................... ..`.rdata....... ......................@..@.data...@!..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):5760784
                                                      Entropy (8bit):6.086079559835769
                                                      Encrypted:false
                                                      SSDEEP:98304:AtcGVQE2EKmLX3N1fn/q+VHzMzDPFE+syIqPzlJ0:AtcGVQE2XmLX3ffGzJENyIqH0
                                                      MD5:E2BD5AE53427F193B42D64B8E9BF1943
                                                      SHA1:7C317AAD8E2B24C08D3B8B3FBA16DD537411727F
                                                      SHA-256:C4844B05E3A936B130ADEDB854D3C04D49EE54EDB43E9D36F8C4AE94CCB78400
                                                      SHA-512:AE23A6707E539C619FD5C5B4FC6E4734EDC91F89EBE024D25FF2A70168DA6105AC0BD47CF6BF3715AF6411963CAF0ACBB4632464E1619CA6361ABF53ADFE7036
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........D..*..*..*..+..*.....*../..*.....*..)..*......*..+..*..+..*.(.'.).*.(.*..*.(....*.(.(..*.Rich.*.........PE..d.....,d.........." ...".R%..27.....,B........................................\.......X...`..........................................@.....lUA......p[.......V.40....W../....[. C....).T...........................@.).@............p%..............................text..."P%......R%................. ..`.rdata.......p%......V%.............@..@.data.........A..L...`A.............@....pdata..40....V..2....Q.............@..@PyRuntim......X.......S.............@....rsrc........p[......jV.............@..@.reloc.. C....[..D...tV.............@..B........................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):30480
                                                      Entropy (8bit):6.57935111855582
                                                      Encrypted:false
                                                      SSDEEP:768:ReUeJVHqbbDNImQGN5YiSyvaAPxWE9Uux:ReUeJVKbbDNImQGT7SyFPxBx
                                                      MD5:756C95D4D9B7820B00A3099FAF3F4F51
                                                      SHA1:893954A45C75FB45FE8048A804990CA33F7C072D
                                                      SHA-256:13E4D9A734A453A3613E11B6A518430099AD7E3D874EA407D1F9625B7F60268A
                                                      SHA-512:0F54F0262CF8D71F00BF5666EB15541C6ECC5246CD298EFD3B7DD39CDD29553A8242D204C42CFB28C537C3D61580153200373C34A94769F102B3BAA288F6C398
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r..t6.t'6.t'6.t'?..'4.t'y.u&4.t'y.q&:.t'y.p&>.t'y.w&2.t'.u&4.t'6.u't.t'}.u&3.t'.y&7.t'.t&7.t'.'7.t'.v&7.t'Rich6.t'........PE..d...$.,d.........." ...".....2............................................................`..........................................@..L...,A..x....p.......`.......H.../......L....3..T............................2..@............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......6..............@....pdata.......`.......8..............@..@.rsrc........p.......<..............@..@.reloc..L............F..............@..B................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1141016
                                                      Entropy (8bit):5.435136508956488
                                                      Encrypted:false
                                                      SSDEEP:12288:i3kYbfjwR6nbKonRiPDjRrO5184EPYPx++ZiLKGZ5KXyVH4eD1J:iUYbM30IDJcjEwPgPOG6Xyd461J
                                                      MD5:58F7988B50CBA7B793884F580C7083E1
                                                      SHA1:D52C06B19861F074E41D8B521938DEE8B56C1F2E
                                                      SHA-256:E36D14CF49CA2AF44FAE8F278E883341167BC380099DAC803276A11E57C9CFA1
                                                      SHA-512:397FA46B90582F8A8CD7DF23B722204C38544717BF546837C45E138B39112F33A1850BE790E248FCA5B5ECD9ED7C91CD1AF1864F72717D9805C486DB0505FB9C
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............................................................................y.........Rich..........................PE..d...'.,d.........." ...".@..........P*...............................................%....`.............................................X............`.......P..0....:.../...p.......]..T............................[..@............P..x............................text....>.......@.................. ..`.rdata.......P.......D..............@..@.data...H....0......................@....pdata..0....P.......&..............@..@.rsrc........`......................@..@.reloc.......p.......8..............@..B................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Mega.nz Spreader.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):693248
                                                      Entropy (8bit):6.436857574671814
                                                      Encrypted:false
                                                      SSDEEP:12288:naIB/iXRYmN7aE2SgCK8Z5+/iMp+Ns9hNCgZ7kvPukrhaPV:naIB/iXRt7aE2SgCm/BFNCgcr4PV
                                                      MD5:9022192413DDA223B6E8AFD73A22CFAA
                                                      SHA1:DBFC6D6667FCC47DAA13A317C8791A93F5E495B0
                                                      SHA-256:F575EB5246B5C6B9044EA04610528C040C982904A5FB3DC1909CE2F0EC15C9EF
                                                      SHA-512:D5311BA2138F184B44B73E63067E5446A77640BFE9F75C87E81935E120EE3CA1918AD3D36EBCF24EBADFF0D9AFEC10AB1D3276D4B20D9821466BA8183C80B7AB
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Avira, Detection: 100%
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 75%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......mmG.).).).).).)..~..(.)..~/.(.)..r,.s.)..r-.8.)..r*.1.)..~*.$.)..~,...)..~-.0.).).(...)..~(.>.).=s .,.).=s.(.).=s+.(.).Rich).).................PE..L....8.d...............$..........................@.......................................@.................................$D...................................>......8...............................@............................................text............................... ..`.rdata...S.......T..................@..@.data....*...`.......:..............@....rsrc................R..............@..@.reloc...>.......@...T..............@..B........................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\Mega.nz Spreader.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):645632
                                                      Entropy (8bit):5.807176492039975
                                                      Encrypted:false
                                                      SSDEEP:6144:DAG1HGwefBgOvKGpDzjjXzfncN3xw/PSEX1cbR1nE4QawEhaxKgQ76qhQ8Oz0Yt:DAGF/+hl/jwN63L6bgOPQVz
                                                      MD5:8C8C3BCF475B5C95673A810B10A2FC52
                                                      SHA1:268CB3A6A4194EFB14C1BDC82CFAB3485C64FA73
                                                      SHA-256:7F02583173F6E150677AF6FE09226FA6B4FC9EFA2523F393A89B31155A1122C0
                                                      SHA-512:F1948CE32F46A34E425D2F59F5C4E6DE56CBC1E29ECFD706C95F4B00EC2831CCC21A44B81CD18D8D03FE6681463276CD4C8D31B19BFF712574B1FF765BB4E846
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 79%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....K.d..............P.............*.... ........@.. .......................@............@.....................................O............................ ..........T............................................ ............... ..H............text...0.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H.......................(...`............................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0..<........~.....(1.....,!r...p.....(2...o3...s4............~.....+..*.0......
                                                      Process:C:\Users\user\Desktop\Mega.nz Spreader.exe
                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):7608923
                                                      Entropy (8bit):7.9911405088090985
                                                      Encrypted:true
                                                      SSDEEP:196608:3uFYeaJDfyGlW21X5Sp6GemDMPwuWsYPFqk7t2:iYeaJDfDllpfaMP9g72
                                                      MD5:D1540618704ECACA1A503B496ED7B801
                                                      SHA1:047C0E7C3B0D03470177DFE17053FDB34EA378A4
                                                      SHA-256:1C864D2DEC413DF7D389BF89CC5B0F38C879A93C043A22C98570C1EEA12099AA
                                                      SHA-512:8C91198512C946D1D0AA5583B8EAF96F111091E75EA26A853597B2791D44965E8005FC8E19267CE4CB7180B715968832D15AF987DAE7B6AAA1EEF6B459F043B9
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............................1...........-......................................H......H......Rich............................PE..d....y.d.........."....".....T.................@.............................0........t...`.....................................................<.... ........... ........... ..\...P...................................@...............P............................text............................... ..`.rdata...'.......(..................@..@.data...............................@....pdata... ......."..................@..@_RDATA..\...........................@..@.rsrc........ ......................@..@.reloc..\.... ......................@..B................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\leaf.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):659151360
                                                      Entropy (8bit):7.999983666087618
                                                      Encrypted:true
                                                      SSDEEP:
                                                      MD5:A0E117D70EEB8A8AEAB628C95E78F524
                                                      SHA1:05A9334BE808DCAF101DF6384A9B8FBAE1D4DA32
                                                      SHA-256:7DBBA01DF332F75EC96FFA691CF3F771F94819F36DC7CDB9DB8F5F7865C70D0A
                                                      SHA-512:8FAE02CE65B169966C3BF53DB1ECE51C691401B8EA15CA5DEDEE8155149DCE852843E3DD883A8A3BCCC4ABCC4CAA98C8EA9150058AAA23976929BA0056EF6A88
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....K.d..............P.............*.... ........@.. .......................@............@.....................................O............................ ..........T............................................ ............... ..H............text...0.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H.......................(...`............................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0..<........~.....(1.....,!r...p.....(2...o3...s4............~.....+..*.0......
                                                      Process:C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):4
                                                      Entropy (8bit):2.0
                                                      Encrypted:false
                                                      SSDEEP:3:6n:6
                                                      MD5:48C3EC5C3A93A9E294A8A6392CCEDEB4
                                                      SHA1:4286E9C7CC9E2CD29BFCA3B079055A325EC21A33
                                                      SHA-256:9028DCE6614EB1F7A5FDC2F564F671475CAE5CEC22AE87054199BF38034E0595
                                                      SHA-512:270FE580FFB002BDC32CFC807B6F74CE9C217BBE912A89AFF26F42E808E263E4406ED7307126E0820C8E25EC104341AEA735896716D2CA00ACABFD730F620FB0
                                                      Malicious:false
                                                      Preview:2568
                                                      Process:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      File Type:JSON data
                                                      Category:dropped
                                                      Size (bytes):70
                                                      Entropy (8bit):4.437244045356168
                                                      Encrypted:false
                                                      SSDEEP:3:vqFIBFReNmI4gELvUAuF5QEyn:jMmI4gELH3
                                                      MD5:9932E9C577764DAA67B544E8C6CCA970
                                                      SHA1:E842DC67307E54799B90739EC74CC8C5455BB1E3
                                                      SHA-256:441E42CF0C4EB813DF84707248AD799437D4CCFE975395570F1831B6FF569029
                                                      SHA-512:1D0D5209D9F2F0DE2FA3D4A9B2AB551FDE4F556276AAA4B20979F85DFB53CBE51874B3ECA6A8455D8D235B54BD3943423BC19FA4E53B4CE0E13D16117A22D0D7
                                                      Malicious:false
                                                      Preview:[5808] Failed to execute script 'meganz' due to unhandled exception!..
                                                      File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                      Entropy (8bit):7.988017693219756
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.94%
                                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • VXD Driver (31/22) 0.00%
                                                      File name:Mega.nz Spreader.exe
                                                      File size:8'953'856 bytes
                                                      MD5:56b45c6edd70b8d85df6399eea6d24d1
                                                      SHA1:15a65e88ec6dc89e35fef0c5e786ac255d6d4a6e
                                                      SHA256:70f06035e9cc9a891f2959b80e3be9bea2ba07b72bce4fac125249c29c0d9d1c
                                                      SHA512:55275a2511cbd72ce38732ae9d677b753bf813949338182fe2ecdaf026e7438e219bf287ee88805100ed8768377f63009c4b1655fd5de14c5db41501c16b96cc
                                                      SSDEEP:196608:P0akhW+OUggVe3hwHqxogDycV3B7+JULH9XO8WIu:P06+FZKxoM33YURc1
                                                      TLSH:0B96121991E44C87607C2062F4A17EFD426CF236BD9B8E188A620889E53DCF6D77771B
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.................................................@..................................6.....................................
                                                      Icon Hash:00928e8e8686b000
                                                      Entrypoint:0x4014ad
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                                      DLL Characteristics:
                                                      Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:a9c887a4f18a3fede2cc29ceea138ed3
                                                      Instruction
                                                      push ebp
                                                      mov ebp, esp
                                                      sub esp, 00000008h
                                                      nop
                                                      mov eax, 00000004h
                                                      push eax
                                                      mov eax, 00000000h
                                                      push eax
                                                      lea eax, dword ptr [ebp-04h]
                                                      push eax
                                                      call 00007FD3A50B57E1h
                                                      add esp, 0Ch
                                                      mov eax, 0040148Bh
                                                      push eax
                                                      call 00007FD3A50B5823h
                                                      mov eax, 00000001h
                                                      push eax
                                                      call 00007FD3A50B5820h
                                                      add esp, 04h
                                                      mov eax, 00030000h
                                                      push eax
                                                      mov eax, 00010000h
                                                      push eax
                                                      call 00007FD3A50B5814h
                                                      add esp, 08h
                                                      mov eax, dword ptr [00C8A944h]
                                                      mov ecx, dword ptr [00C8A948h]
                                                      mov edx, dword ptr [00C8A94Ch]
                                                      mov dword ptr [ebp-08h], eax
                                                      lea eax, dword ptr [ebp-04h]
                                                      push eax
                                                      mov eax, dword ptr [00C8B000h]
                                                      push eax
                                                      push edx
                                                      push ecx
                                                      mov eax, dword ptr [ebp-08h]
                                                      push eax
                                                      call 00007FD3A50B57EEh
                                                      add esp, 14h
                                                      mov eax, dword ptr [00C8A944h]
                                                      mov ecx, dword ptr [00C8A948h]
                                                      mov edx, dword ptr [00C8A94Ch]
                                                      mov dword ptr [ebp-08h], eax
                                                      mov eax, dword ptr [edx]
                                                      push eax
                                                      mov eax, dword ptr [ecx]
                                                      push eax
                                                      mov eax, dword ptr [ebp-08h]
                                                      mov eax, dword ptr [eax]
                                                      push eax
                                                      call 00007FD3A50B55CCh
                                                      add esp, 0Ch
                                                      push eax
                                                      call 00007FD3A50B57C4h
                                                      add esp, 04h
                                                      leave
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      sub esp, 00000004h
                                                      nop
                                                      mov eax, dword ptr [00C8A944h]
                                                      mov ecx, dword ptr [ebp+08h]
                                                      mov dword ptr [eax], ecx
                                                      mov eax, dword ptr [00000000h]
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x88a8d00x50.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x88c0000x630.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x88a9200x58.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x6400x80040e72b673992ed1a54f335093a30fd8fFalse0.40234375data4.567461402397821IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x20000x888ad30x888c009a1b2bfc2c495e583a23dd80f63a598aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .bss0x88b0000x40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0x88c0000x6300x800d25a3e6d8b5537cfe3c48f5f70f53c9eFalse0.31787109375data3.7268319190943355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_VERSION0x88c0a00x2e4dataEnglishUnited States0.37972972972972974
                                                      RT_MANIFEST0x88c3880x2a6XML 1.0 document, ASCII textEnglishUnited States0.4749262536873156
                                                      DLLImport
                                                      msvcrt.dllmalloc, memset, strcmp, strcpy, getenv, sprintf, fopen, fwrite, fclose, __argc, __argv, _environ, _XcptFilter, __set_app_type, _controlfp, __getmainargs, exit
                                                      shell32.dllShellExecuteA
                                                      kernel32.dllSetUnhandledExceptionFilter
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishUnited States
                                                      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                      2024-07-31T18:30:04.889268+0200TCP2039775ET MALWARE Laplas Clipper - Regex CnC Request4972180192.168.2.545.159.189.105
                                                      2024-07-31T18:27:57.316101+0200TCP2039775ET MALWARE Laplas Clipper - Regex CnC Request4972280192.168.2.545.159.189.105
                                                      2024-07-31T18:28:05.682770+0200TCP2050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)4970415666192.168.2.577.105.147.1
                                                      2024-07-31T18:29:20.997850+0200TCP2039775ET MALWARE Laplas Clipper - Regex CnC Request4971980192.168.2.545.159.189.105
                                                      2024-07-31T18:28:05.687876+0200TCP2050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)4970415666192.168.2.577.105.147.1
                                                      2024-07-31T18:29:42.420442+0200TCP2039775ET MALWARE Laplas Clipper - Regex CnC Request4972080192.168.2.545.159.189.105
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jul 31, 2024 18:28:01.145054102 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:01.372059107 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:01.372394085 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:01.599441051 CEST49705443192.168.2.5104.26.12.205
                                                      Jul 31, 2024 18:28:01.599498987 CEST44349705104.26.12.205192.168.2.5
                                                      Jul 31, 2024 18:28:01.599576950 CEST49705443192.168.2.5104.26.12.205
                                                      Jul 31, 2024 18:28:01.698863029 CEST49705443192.168.2.5104.26.12.205
                                                      Jul 31, 2024 18:28:01.698908091 CEST44349705104.26.12.205192.168.2.5
                                                      Jul 31, 2024 18:28:02.197586060 CEST44349705104.26.12.205192.168.2.5
                                                      Jul 31, 2024 18:28:02.197694063 CEST49705443192.168.2.5104.26.12.205
                                                      Jul 31, 2024 18:28:02.558557987 CEST49705443192.168.2.5104.26.12.205
                                                      Jul 31, 2024 18:28:02.558597088 CEST44349705104.26.12.205192.168.2.5
                                                      Jul 31, 2024 18:28:02.559555054 CEST44349705104.26.12.205192.168.2.5
                                                      Jul 31, 2024 18:28:02.559670925 CEST49705443192.168.2.5104.26.12.205
                                                      Jul 31, 2024 18:28:02.563410044 CEST49705443192.168.2.5104.26.12.205
                                                      Jul 31, 2024 18:28:02.608506918 CEST44349705104.26.12.205192.168.2.5
                                                      Jul 31, 2024 18:28:02.683998108 CEST44349705104.26.12.205192.168.2.5
                                                      Jul 31, 2024 18:28:02.684158087 CEST44349705104.26.12.205192.168.2.5
                                                      Jul 31, 2024 18:28:02.684319973 CEST49705443192.168.2.5104.26.12.205
                                                      Jul 31, 2024 18:28:02.714570045 CEST49705443192.168.2.5104.26.12.205
                                                      Jul 31, 2024 18:28:02.714642048 CEST44349705104.26.12.205192.168.2.5
                                                      Jul 31, 2024 18:28:05.682770014 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.687817097 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.687839031 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.687853098 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.687866926 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.687875986 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.687877893 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.687922001 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.687952995 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.687997103 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.688004017 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.688009024 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.688041925 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.688055038 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.688113928 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.688127041 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.688178062 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.695698023 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.695710897 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.695723057 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.695763111 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.695780993 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.695782900 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.695796013 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.695807934 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.695827007 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.695852041 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.697185993 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.697277069 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.742947102 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.743066072 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.795320988 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.795419931 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.843261003 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.843359947 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.894798994 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.894870043 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.946984053 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.947047949 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:05.995172977 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:05.995249987 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.050709009 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.050760031 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.099056005 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.099126101 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.151000977 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.151082039 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.198751926 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.198817015 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.253525019 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.253590107 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.306622982 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.306704998 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.363132000 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.363199949 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.412836075 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.412913084 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.458847046 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.460139990 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.502880096 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.502962112 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.551083088 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.551203012 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.603106022 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.603197098 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.654923916 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.655040026 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.702806950 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.702900887 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.754729986 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.754795074 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.806844950 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.808413982 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.854763031 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.854876041 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.906793118 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.906867981 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:06.958764076 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:06.958842993 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.006839037 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.008311033 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.054951906 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.055773973 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.103234053 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.108447075 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.163305044 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.163423061 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.210985899 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.211071014 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.258754015 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.258956909 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.306983948 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.307044029 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.358961105 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.359021902 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.406769037 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.406826973 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.455291033 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.455387115 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.520469904 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.520740986 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.566867113 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.566997051 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.618799925 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.618999004 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.670732975 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.670795918 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.722817898 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.722898006 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.770714998 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.770781040 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.818871975 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.818947077 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.867050886 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.867120981 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:07.924123049 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:07.924175024 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:08.378865004 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:08.410104990 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:08.410187006 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:08.419292927 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:08.420080900 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:08.420156002 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:08.470710993 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:08.470767975 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:08.522888899 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:08.523000956 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:08.578833103 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:08.578906059 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:08.630764008 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:08.630853891 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:08.678689003 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:08.678745031 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:08.727185965 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:08.727251053 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.065973043 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.208009005 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.208093882 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.218009949 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.218266964 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.218336105 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.266851902 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.266916990 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.314764977 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.316421986 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.366827011 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.368424892 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.418718100 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.420409918 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.466784000 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.468425989 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.514755964 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.516410112 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.562844038 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.564450026 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.622728109 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.624411106 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.674746990 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.675345898 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.722826958 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.724411011 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.770972967 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.771056890 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.866830111 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.866944075 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:09.935262918 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:09.936408043 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.059623957 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.059675932 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.106745958 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.108433962 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.154802084 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.155019045 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.209012032 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.209089994 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.254841089 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.256488085 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.306807995 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.306893110 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.354748011 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.354852915 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.407083035 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.407157898 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.458745956 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.458822966 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.511092901 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.511200905 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.558742046 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.558828115 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.606693029 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.606801987 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.654787064 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.654891968 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.706809044 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.706873894 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.758642912 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.758737087 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.823348999 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.823422909 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.880814075 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.880908012 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.930716038 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.930787086 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:10.983062029 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:10.983123064 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.031872034 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.031939030 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.079941034 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.080013037 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.127465963 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.127640963 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.185633898 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.185688972 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.248193026 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.248269081 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.299840927 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.299925089 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.350975990 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.351090908 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.399825096 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.399903059 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.542350054 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.542463064 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.620243073 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.620312929 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.674602985 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.674700975 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.723229885 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.723309994 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.770714998 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.770793915 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.822832108 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.822907925 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.870769024 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.870865107 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.918714046 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.918782949 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:11.967021942 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:11.967117071 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.018726110 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.018806934 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.066704035 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.066785097 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.118884087 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.118988991 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.166714907 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.166774035 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.218704939 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.218770981 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.274394035 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.274471045 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.325766087 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.325853109 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.375885010 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.375961065 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.422732115 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.422826052 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.470741034 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.470818996 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.518737078 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.518810987 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.566762924 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.566831112 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.618998051 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.619088888 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.670795918 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.670957088 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.718853951 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.718916893 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.766829967 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.766899109 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.819094896 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.819144964 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.870634079 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.870713949 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:12.919023037 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:12.919251919 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:13.029254913 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:13.029386044 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:13.074707985 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:13.074791908 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:13.126735926 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:13.126827955 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:13.176433086 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:13.176518917 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:13.230829954 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:13.230906963 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:13.282829046 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:13.282937050 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:13.376852989 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:13.376949072 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:13.862885952 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.009321928 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.009418964 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.019973040 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.022762060 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.022838116 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.071024895 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.071185112 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.122726917 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.122869015 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.174803019 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.174957991 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.222765923 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.222877026 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.270953894 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.271050930 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.318859100 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.326176882 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.374859095 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.374982119 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.422734022 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.422811031 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.500834942 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.500896931 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.546758890 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.546861887 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.594782114 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.594841003 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.646873951 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.646943092 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.694880962 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.695000887 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.743756056 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.743887901 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.794917107 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.795037031 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.847407103 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.847507000 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.898756981 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.898830891 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.946850061 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.946944952 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:14.994942904 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:14.995076895 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.050697088 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.050806046 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.098751068 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.098843098 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.142748117 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.142818928 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.195051908 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.195137024 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.246907949 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.247006893 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.298839092 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.299001932 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.346698046 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.346786022 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.398654938 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.398752928 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.446809053 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.446887970 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.496936083 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.497014046 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.548856020 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.548963070 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.598853111 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.598948002 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.646737099 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.646821976 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.694789886 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.694858074 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.747036934 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.747122049 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.801460981 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.801563025 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.847189903 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.847266912 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.894761086 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.894836903 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.947279930 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.947381020 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:15.996074915 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:15.996146917 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.042840004 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.043056011 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.094822884 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.094888926 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.142641068 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.142719030 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.190845966 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.190922976 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.242785931 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.242841959 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.294686079 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.294815063 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.342868090 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.342950106 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.395477057 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.395551920 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.442694902 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.442775011 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.494792938 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.494873047 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.542766094 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.542877913 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.590783119 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.590832949 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.639213085 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.639266968 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.686851025 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:16.686944962 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:16.987776995 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.014183998 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.014244080 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.020097017 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.020471096 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.020519018 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.067059040 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.067141056 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.115118980 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.115196943 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.163050890 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.163125992 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.214996099 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.215126038 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.263266087 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.263323069 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.312642097 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.316395998 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.364430904 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.368398905 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.414757967 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.416400909 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.462816000 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.464411020 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.516680956 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.516777992 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.578838110 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.579076052 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.630956888 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:17.631015062 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:17.940905094 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.233270884 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.233346939 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.243801117 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.244899988 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.244962931 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.290796995 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.290875912 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.338886976 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.338967085 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.386693954 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.386759996 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.438716888 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.438786030 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.486706018 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.486763000 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.537029982 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.537097931 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.587347031 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.587399960 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.634677887 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.634737015 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.682790041 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.682847023 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.734769106 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.734842062 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.783058882 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.783122063 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.839458942 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.839520931 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.886784077 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.886862993 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.934953928 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.935017109 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:18.986736059 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:18.986814976 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.038680077 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.038769007 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.086755037 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.086833954 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.139137983 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.139214993 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.187273026 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.187350035 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.231161118 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.231245041 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.278726101 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.278793097 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.334379911 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.336427927 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.398035049 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.398113012 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.451141119 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.452411890 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.528386116 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.532409906 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.576716900 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.580437899 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.626952887 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.627007961 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.682812929 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.682883024 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.731590986 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.731698036 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.778749943 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.778814077 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.826853991 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.826956034 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.878989935 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.879060030 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.928343058 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.928431034 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:19.976437092 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:19.976501942 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.023420095 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.023597002 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.070828915 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.070898056 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.118776083 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.118843079 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.166754961 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.166810036 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.218985081 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.219058037 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.266751051 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.266815901 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.318689108 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.325236082 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.378813982 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.378885984 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.426691055 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.426749945 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.483331919 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.483681917 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.547127008 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.548423052 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.594701052 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.596437931 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.646878004 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.647151947 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.698730946 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.698816061 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.750754118 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.750812054 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.798702955 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.798768997 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.847605944 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.847665071 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.899501085 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.899580956 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.947424889 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.947642088 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:20.994757891 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:20.994813919 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:21.042746067 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:21.042821884 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:21.090713024 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:21.090775013 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:21.139017105 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:21.139077902 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:21.191211939 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:21.191273928 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:21.238668919 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:21.238734961 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:21.290767908 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:21.290832043 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:21.342736006 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:21.342803955 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:21.390737057 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:21.390794039 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:21.443126917 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:21.443186045 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:21.490756035 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:21.490839958 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:21.909652948 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:22.519023895 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:22.641212940 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:22.641315937 CEST4970415666192.168.2.577.105.147.1
                                                      Jul 31, 2024 18:28:23.106286049 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:23.107573032 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:23.113677025 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:23.117141008 CEST156664970477.105.147.1192.168.2.5
                                                      Jul 31, 2024 18:28:59.636603117 CEST4971980192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:28:59.644372940 CEST804971945.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:28:59.644460917 CEST4971980192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:28:59.645414114 CEST4971980192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:28:59.656184912 CEST804971945.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:29:20.997602940 CEST804971945.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:29:20.997849941 CEST4971980192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:29:21.026458025 CEST4971980192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:29:21.031033039 CEST4972080192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:29:21.031886101 CEST804971945.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:29:21.039715052 CEST804972045.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:29:21.039798975 CEST4972080192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:29:21.039943933 CEST4972080192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:29:21.044986963 CEST804972045.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:29:42.420341015 CEST804972045.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:29:42.420442104 CEST4972080192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:29:42.420564890 CEST4972080192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:29:42.425820112 CEST804972045.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:29:43.535388947 CEST4972180192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:29:43.541018009 CEST804972145.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:29:43.541127920 CEST4972180192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:29:43.541286945 CEST4972180192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:29:43.546192884 CEST804972145.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:30:04.889183044 CEST804972145.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:30:04.889267921 CEST4972180192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:30:04.889765978 CEST4972180192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:30:04.890146971 CEST4972280192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:30:04.895308971 CEST804972145.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:30:04.895342112 CEST804972245.159.189.105192.168.2.5
                                                      Jul 31, 2024 18:30:04.895411015 CEST4972280192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:30:04.895703077 CEST4972280192.168.2.545.159.189.105
                                                      Jul 31, 2024 18:30:04.901513100 CEST804972245.159.189.105192.168.2.5
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jul 31, 2024 18:28:01.574095011 CEST5887353192.168.2.51.1.1.1
                                                      Jul 31, 2024 18:28:01.582536936 CEST53588731.1.1.1192.168.2.5
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jul 31, 2024 18:28:01.574095011 CEST192.168.2.51.1.1.10x18a9Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jul 31, 2024 18:28:01.582536936 CEST1.1.1.1192.168.2.50x18a9No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                      Jul 31, 2024 18:28:01.582536936 CEST1.1.1.1192.168.2.50x18a9No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                      Jul 31, 2024 18:28:01.582536936 CEST1.1.1.1192.168.2.50x18a9No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                      • api.ipify.org
                                                      • 45.159.189.105
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.54971945.159.189.105802568C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jul 31, 2024 18:28:59.645414114 CEST142OUTGET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1
                                                      Host: 45.159.189.105
                                                      Connection: Keep-Alive


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.54972045.159.189.105802568C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jul 31, 2024 18:29:21.039943933 CEST142OUTGET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1
                                                      Host: 45.159.189.105
                                                      Connection: Keep-Alive


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      2192.168.2.54972145.159.189.105802568C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jul 31, 2024 18:29:43.541286945 CEST142OUTGET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1
                                                      Host: 45.159.189.105
                                                      Connection: Keep-Alive


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      3192.168.2.54972245.159.189.105802568C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jul 31, 2024 18:30:04.895703077 CEST142OUTGET /bot/regex?key=6c78a6e987dfc45100108d0fd40e03bd210668f370b6f27ea666ba07cdab694d HTTP/1.1
                                                      Host: 45.159.189.105
                                                      Connection: Keep-Alive


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.549705104.26.12.2054435656C:\Users\user\AppData\Local\Temp\api.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-07-31 16:28:02 UTC100OUTGET / HTTP/1.1
                                                      Accept: text/html; text/plain; */*
                                                      Host: api.ipify.org
                                                      Cache-Control: no-cache
                                                      2024-07-31 16:28:02 UTC211INHTTP/1.1 200 OK
                                                      Date: Wed, 31 Jul 2024 16:28:02 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 11
                                                      Connection: close
                                                      Vary: Origin
                                                      CF-Cache-Status: DYNAMIC
                                                      Server: cloudflare
                                                      CF-RAY: 8abef59458bfc452-EWR
                                                      2024-07-31 16:28:02 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                                      Data Ascii: 8.46.123.33


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:12:27:59
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\Desktop\Mega.nz Spreader.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\Mega.nz Spreader.exe"
                                                      Imagebase:0x400000
                                                      File size:8'953'856 bytes
                                                      MD5 hash:56B45C6EDD70B8D85DF6399EEA6D24D1
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:12:27:59
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Local\Temp\leaf.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Local\Temp\leaf.exe"
                                                      Imagebase:0x8a0000
                                                      File size:645'632 bytes
                                                      MD5 hash:8C8C3BCF475B5C95673A810B10A2FC52
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Antivirus matches:
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 79%, ReversingLabs
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:12:27:59
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Local\Temp\api.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Local\Temp\api.exe"
                                                      Imagebase:0xd90000
                                                      File size:693'248 bytes
                                                      MD5 hash:9022192413DDA223B6E8AFD73A22CFAA
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Antivirus matches:
                                                      • Detection: 100%, Avira
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 75%, ReversingLabs
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:12:28:00
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\AppData\Local\Temp\lib.exe"
                                                      Imagebase:0x7ff759950000
                                                      File size:7'608'923 bytes
                                                      MD5 hash:D1540618704ECACA1A503B496ED7B801
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Antivirus matches:
                                                      • Detection: 0%, ReversingLabs
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:12:28:00
                                                      Start date:31/07/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:7
                                                      Start time:12:28:02
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Local\Temp\lib.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\AppData\Local\Temp\lib.exe"
                                                      Imagebase:0x7ff759950000
                                                      File size:7'608'923 bytes
                                                      MD5 hash:D1540618704ECACA1A503B496ED7B801
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:8
                                                      Start time:12:28:15
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Local\Temp\leaf.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"{path}"
                                                      Imagebase:0x30000
                                                      File size:645'632 bytes
                                                      MD5 hash:8C8C3BCF475B5C95673A810B10A2FC52
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:9
                                                      Start time:12:28:15
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Local\Temp\leaf.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"{path}"
                                                      Imagebase:0xc60000
                                                      File size:645'632 bytes
                                                      MD5 hash:8C8C3BCF475B5C95673A810B10A2FC52
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:11
                                                      Start time:12:28:37
                                                      Start date:31/07/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"cmd.exe" /C schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                                      Imagebase:0x790000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:12
                                                      Start time:12:28:37
                                                      Start date:31/07/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:13
                                                      Start time:12:28:38
                                                      Start date:31/07/2024
                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:schtasks /create /tn \eOzNUSwmQA /tr "C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                                      Imagebase:0xd80000
                                                      File size:187'904 bytes
                                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:14
                                                      Start time:12:28:42
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      Imagebase:0x530000
                                                      File size:659'151'360 bytes
                                                      MD5 hash:A0E117D70EEB8A8AEAB628C95E78F524
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:17
                                                      Start time:12:28:58
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"{path}"
                                                      Imagebase:0x960000
                                                      File size:659'151'360 bytes
                                                      MD5 hash:A0E117D70EEB8A8AEAB628C95E78F524
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_LaplasClipper, Description: Yara detected Laplas Clipper, Source: 00000011.00000002.3289763270.0000000002DF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:false

                                                      Target ID:18
                                                      Start time:12:29:05
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      Imagebase:0x3a0000
                                                      File size:659'151'360 bytes
                                                      MD5 hash:A0E117D70EEB8A8AEAB628C95E78F524
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:19
                                                      Start time:12:29:20
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"{path}"
                                                      Imagebase:0x200000
                                                      File size:659'151'360 bytes
                                                      MD5 hash:A0E117D70EEB8A8AEAB628C95E78F524
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:20
                                                      Start time:12:29:24
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"{path}"
                                                      Imagebase:0x5d0000
                                                      File size:659'151'360 bytes
                                                      MD5 hash:A0E117D70EEB8A8AEAB628C95E78F524
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:21
                                                      Start time:12:30:05
                                                      Start date:31/07/2024
                                                      Path:C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\AppData\Roaming\eOzNUSwmQA\svcupdater.exe
                                                      Imagebase:0x8d0000
                                                      File size:659'151'360 bytes
                                                      MD5 hash:A0E117D70EEB8A8AEAB628C95E78F524
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:79.6%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:9.1%
                                                        Total number of Nodes:22
                                                        Total number of Limit Nodes:1

                                                        Callgraph

                                                        • Executed
                                                        • Not Executed
                                                        • Opacity -> Relevance
                                                        • Disassembly available
                                                        callgraph 0 Function_00401000 1 Function_00401390 2 Function_00401437 2->1 3 Function_0040108C 2->3 4 Function_004013EC 2->4 3->0 5 Function_004014AD 5->2

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2036585757.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2036548693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2036603684.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2037949080.0000000000C8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_Mega.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled__getmainargs__set_app_type_controlfpexitmemset
                                                        • String ID:
                                                        • API String ID: 3649950142-0
                                                        • Opcode ID: fda98f6c57ce562671f2aded5df477c9688c81d109744525940a9da66ad68092
                                                        • Instruction ID: 9276c2e774000c42ff709b9735208b177da51b3f110f19c2a6def3996bbd4299
                                                        • Opcode Fuzzy Hash: fda98f6c57ce562671f2aded5df477c9688c81d109744525940a9da66ad68092
                                                        • Instruction Fuzzy Hash: 6E111BF5E02204AFDB00EBA8EC85F5F73ACAB48314F144476F804E3361E639E9448B69

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2036585757.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2036548693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2036603684.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2037949080.0000000000C8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_Mega.jbxd
                                                        Similarity
                                                        • API ID: memset$ExecuteShellfclosefopenfwritegetenvmallocsprintfstrcmpstrcpy
                                                        • String ID: ! @$%s\%s$& @$/ @
                                                        • API String ID: 1891165703-4153036209
                                                        • Opcode ID: b8bc0b74d28364ce14bffabdb9981fb3b3134ad2479d98d2446ae6e908179b13
                                                        • Instruction ID: 6225b31dba5bb502cda7e23a87bcd47e15d777aa3482ef3ed33ecdab620989a9
                                                        • Opcode Fuzzy Hash: b8bc0b74d28364ce14bffabdb9981fb3b3134ad2479d98d2446ae6e908179b13
                                                        • Instruction Fuzzy Hash: FD81DBF0E001049BEB54DBACCC41B9D77A9EB49308F14417AE50AFB391E639AE45CB69

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 22 401000-40102e malloc 23 401031-401039 22->23 24 401087-40108b 23->24 25 40103f-401085 23->25 25->23
                                                        APIs
                                                        Strings
                                                        • v@,uz^/&i.q7v>2m:fa:>p/4z&u[h*kc, xrefs: 0040106E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2036585757.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2036548693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2036603684.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2037949080.0000000000C8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_Mega.jbxd
                                                        Similarity
                                                        • API ID: malloc
                                                        • String ID: v@,uz^/&i.q7v>2m:fa:>p/4z&u[h*kc
                                                        • API String ID: 2803490479-1775486065
                                                        • Opcode ID: 6ad473e3d7fe9158c1acde196af2d92c49358fc5d47a9cc217abf66bd194a4d8
                                                        • Instruction ID: 01b69ddd6a7163423e12e5d848ef507565a3d8b94cc01782238194285892dabd
                                                        • Opcode Fuzzy Hash: 6ad473e3d7fe9158c1acde196af2d92c49358fc5d47a9cc217abf66bd194a4d8
                                                        • Instruction Fuzzy Hash: AF110C74A05248EFCB04CFACD4907ADBBF1AF49308F1480AAE856E7391D635AE41DB45

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 28 401437-40148a call 401390 call 40108c call 4013ec
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2036585757.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2036548693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2036603684.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2037949080.0000000000C8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_Mega.jbxd
                                                        Similarity
                                                        • API ID: memset$strcmp
                                                        • String ID: D`:vD`:v$D`:vD`:v
                                                        • API String ID: 4285334728-3916433284
                                                        • Opcode ID: 3381f43681460bab8f107108c2fd5181c50eee10433915af29f8995304d91e7d
                                                        • Instruction ID: ee77992f571a48f282871b5bf01f8c63e07388c962f319f1110e6b87e063dff6
                                                        • Opcode Fuzzy Hash: 3381f43681460bab8f107108c2fd5181c50eee10433915af29f8995304d91e7d
                                                        • Instruction Fuzzy Hash: 11F0ACB9A05208EFDB40DFACD981E9E77FCAB48318F104065F948D7351E634EA448B59

                                                        Execution Graph

                                                        Execution Coverage:8.5%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:207
                                                        Total number of Limit Nodes:17
                                                        execution_graph 28035 1197278 28036 11972be 28035->28036 28040 1197458 28036->28040 28043 1197447 28036->28043 28037 11973ab 28047 1196354 28040->28047 28044 119744b 28043->28044 28045 1196354 DuplicateHandle 28044->28045 28046 1197486 28045->28046 28046->28037 28048 11974c0 DuplicateHandle 28047->28048 28049 1197486 28048->28049 28049->28037 28050 1196a98 28051 1196aa8 28050->28051 28052 1196ab9 28051->28052 28055 1196bbf 28051->28055 28061 1196af7 28051->28061 28056 1196bc4 28055->28056 28057 1196c29 28056->28057 28067 11971b8 28056->28067 28072 1197160 28056->28072 28076 1197151 28056->28076 28057->28052 28062 1196b32 28061->28062 28063 1196c29 28062->28063 28064 11971b8 5 API calls 28062->28064 28065 1197151 5 API calls 28062->28065 28066 1197160 5 API calls 28062->28066 28063->28052 28064->28063 28065->28063 28066->28063 28068 11971d9 28067->28068 28069 1197164 28067->28069 28068->28057 28070 11971a7 28069->28070 28080 1196f74 28069->28080 28070->28057 28073 1197164 28072->28073 28074 11971a7 28073->28074 28075 1196f74 5 API calls 28073->28075 28074->28057 28075->28074 28077 1197160 28076->28077 28078 11971a7 28077->28078 28079 1196f74 5 API calls 28077->28079 28078->28057 28079->28078 28081 1196f79 28080->28081 28083 1197ab8 28081->28083 28084 11970ac 28081->28084 28083->28083 28085 11970b7 28084->28085 28089 119d198 28085->28089 28098 119d1b0 28085->28098 28086 1197f61 28086->28083 28091 119d1e1 28089->28091 28092 119d2e2 28089->28092 28090 119d1ed 28090->28086 28091->28090 28107 119d509 28091->28107 28111 119d518 28091->28111 28092->28086 28093 119d22e 28093->28092 28115 119e838 28093->28115 28125 119e827 28093->28125 28100 119d2e2 28098->28100 28101 119d1e1 28098->28101 28099 119d1ed 28099->28086 28100->28086 28101->28099 28105 119d509 4 API calls 28101->28105 28106 119d518 4 API calls 28101->28106 28102 119d22e 28102->28100 28103 119e838 2 API calls 28102->28103 28104 119e827 2 API calls 28102->28104 28103->28100 28104->28100 28105->28102 28106->28102 28108 119d522 28107->28108 28135 119d558 28107->28135 28145 119d568 28107->28145 28108->28093 28113 119d558 3 API calls 28111->28113 28114 119d568 3 API calls 28111->28114 28112 119d522 28112->28093 28113->28112 28114->28112 28116 119e863 28115->28116 28173 119eda0 28116->28173 28178 119ed94 28116->28178 28117 119e8e6 28118 119c690 GetModuleHandleW 28117->28118 28120 119e912 28117->28120 28119 119e956 28118->28119 28121 119f720 CreateWindowExW 28119->28121 28122 119f6b0 CreateWindowExW 28119->28122 28121->28120 28122->28120 28126 119e838 28125->28126 28131 119eda0 GetModuleHandleW 28126->28131 28132 119ed94 GetModuleHandleW 28126->28132 28127 119e8e6 28128 119c690 GetModuleHandleW 28127->28128 28130 119e912 28127->28130 28129 119e956 28128->28129 28203 119f6b0 28129->28203 28207 119f720 28129->28207 28131->28127 28132->28127 28136 119d568 28135->28136 28140 119d59c 28136->28140 28155 119c690 28136->28155 28139 119d594 28139->28140 28141 119d7a0 GetModuleHandleW 28139->28141 28140->28108 28142 119d7cd 28141->28142 28142->28108 28146 119d579 28145->28146 28149 119d59c 28145->28149 28147 119c690 GetModuleHandleW 28146->28147 28148 119d584 28147->28148 28148->28149 28153 119d7f1 2 API calls 28148->28153 28154 119d800 2 API calls 28148->28154 28149->28108 28150 119d594 28150->28149 28151 119d7a0 GetModuleHandleW 28150->28151 28152 119d7cd 28151->28152 28152->28108 28153->28150 28154->28150 28156 119d758 GetModuleHandleW 28155->28156 28158 119d584 28156->28158 28158->28140 28159 119d7f1 28158->28159 28164 119d800 28158->28164 28160 119c690 GetModuleHandleW 28159->28160 28161 119d814 28160->28161 28163 119d839 28161->28163 28169 119c6e8 28161->28169 28163->28139 28165 119c690 GetModuleHandleW 28164->28165 28167 119d814 28164->28167 28165->28167 28166 119d839 28166->28139 28167->28166 28168 119c6e8 LoadLibraryExW 28167->28168 28168->28166 28170 119d9e0 LoadLibraryExW 28169->28170 28172 119da59 28170->28172 28172->28163 28174 119edcd 28173->28174 28175 119ee4e 28174->28175 28183 119ef10 28174->28183 28193 119ef02 28174->28193 28179 119edcd 28178->28179 28180 119ee4e 28179->28180 28181 119ef10 GetModuleHandleW 28179->28181 28182 119ef02 GetModuleHandleW 28179->28182 28181->28180 28182->28180 28184 119ef25 28183->28184 28185 119c690 GetModuleHandleW 28184->28185 28186 119ef49 28184->28186 28185->28186 28187 119c690 GetModuleHandleW 28186->28187 28192 119f105 28186->28192 28188 119f08b 28187->28188 28189 119c690 GetModuleHandleW 28188->28189 28188->28192 28190 119f0d9 28189->28190 28191 119c690 GetModuleHandleW 28190->28191 28190->28192 28191->28192 28192->28175 28194 119ef10 28193->28194 28195 119c690 GetModuleHandleW 28194->28195 28196 119ef49 28194->28196 28195->28196 28197 119c690 GetModuleHandleW 28196->28197 28202 119f105 28196->28202 28198 119f08b 28197->28198 28199 119c690 GetModuleHandleW 28198->28199 28198->28202 28200 119f0d9 28199->28200 28201 119c690 GetModuleHandleW 28200->28201 28200->28202 28201->28202 28202->28175 28204 119f720 28203->28204 28210 119c85c 28204->28210 28208 119c85c CreateWindowExW 28207->28208 28209 119f755 28208->28209 28209->28130 28211 119f770 CreateWindowExW 28210->28211 28213 119f894 28211->28213 28253 11908c1 28254 11908a0 28253->28254 28258 5274720 28254->28258 28263 5274730 28254->28263 28255 11908b8 28259 5274730 28258->28259 28261 5274799 28259->28261 28268 527508f 28259->28268 28261->28255 28264 527475b 28263->28264 28266 5274799 28264->28266 28267 527508f CreateActCtxA 28264->28267 28265 5274791 28265->28255 28266->28255 28267->28265 28269 5275059 28268->28269 28270 527509a 28268->28270 28271 5274791 28270->28271 28274 5275307 28270->28274 28278 5275318 28270->28278 28271->28255 28275 5275318 28274->28275 28276 527532d 28275->28276 28282 5275431 28275->28282 28276->28271 28279 5275327 28278->28279 28280 527532d 28278->28280 28281 5275431 CreateActCtxA 28279->28281 28280->28271 28281->28280 28286 5275451 28282->28286 28290 5275460 28282->28290 28287 5275460 28286->28287 28289 5275564 28287->28289 28294 5274cbc 28287->28294 28291 5275487 28290->28291 28292 5275564 28291->28292 28293 5274cbc CreateActCtxA 28291->28293 28293->28292 28295 52758e0 CreateActCtxA 28294->28295 28297 52759a3 28295->28297 28297->28297 28214 113d01c 28215 113d034 28214->28215 28216 113d08e 28215->28216 28219 5270c4a 28215->28219 28225 5270c58 28215->28225 28220 5270c2c 28219->28220 28222 5270c52 28219->28222 28220->28216 28221 5270cb7 28222->28221 28230 5270de0 28222->28230 28235 5270dd2 28222->28235 28226 5270c85 28225->28226 28227 5270cb7 28226->28227 28228 5270dd2 CallWindowProcW 28226->28228 28229 5270de0 CallWindowProcW 28226->28229 28228->28227 28229->28227 28232 5270df4 28230->28232 28231 5270e80 28231->28221 28240 5270e88 28232->28240 28243 5270e98 28232->28243 28237 5270de0 28235->28237 28236 5270e80 28236->28221 28238 5270e88 CallWindowProcW 28237->28238 28239 5270e98 CallWindowProcW 28237->28239 28238->28236 28239->28236 28241 5270ea9 28240->28241 28246 52722d0 28240->28246 28241->28231 28244 5270ea9 28243->28244 28245 52722d0 CallWindowProcW 28243->28245 28244->28231 28245->28244 28249 527232e 28246->28249 28250 5272342 28249->28250 28252 52722ea 28249->28252 28251 527239a CallWindowProcW 28250->28251 28250->28252 28251->28252 28252->28241

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1714 119d568-119d577 1715 119d579-119d586 call 119c690 1714->1715 1716 119d5a3-119d5a7 1714->1716 1722 119d588 1715->1722 1723 119d59c 1715->1723 1718 119d5a9-119d5b3 1716->1718 1719 119d5bb-119d5fc 1716->1719 1718->1719 1725 119d609-119d617 1719->1725 1726 119d5fe-119d606 1719->1726 1771 119d58e call 119d7f1 1722->1771 1772 119d58e call 119d800 1722->1772 1723->1716 1727 119d619-119d61e 1725->1727 1728 119d63b-119d63d 1725->1728 1726->1725 1731 119d629 1727->1731 1732 119d620-119d627 call 119c69c 1727->1732 1730 119d640-119d647 1728->1730 1729 119d594-119d596 1729->1723 1733 119d6d8-119d798 1729->1733 1736 119d649-119d651 1730->1736 1737 119d654-119d65b 1730->1737 1734 119d62b-119d639 1731->1734 1732->1734 1764 119d79a-119d79d 1733->1764 1765 119d7a0-119d7cb GetModuleHandleW 1733->1765 1734->1730 1736->1737 1740 119d668-119d671 call 119c6ac 1737->1740 1741 119d65d-119d665 1737->1741 1745 119d67e-119d683 1740->1745 1746 119d673-119d67b 1740->1746 1741->1740 1747 119d6a1-119d6a5 1745->1747 1748 119d685-119d68c 1745->1748 1746->1745 1769 119d6a8 call 119dad1 1747->1769 1770 119d6a8 call 119dae0 1747->1770 1748->1747 1750 119d68e-119d69e call 119a514 call 119c6bc 1748->1750 1750->1747 1752 119d6ab-119d6ae 1755 119d6d1-119d6d7 1752->1755 1756 119d6b0-119d6ce 1752->1756 1756->1755 1764->1765 1766 119d7cd-119d7d3 1765->1766 1767 119d7d4-119d7e8 1765->1767 1766->1767 1769->1752 1770->1752 1771->1729 1772->1729
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187593367.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_1190000_leaf.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 7160b2b4b76a42044e562f5e83bdf29b9a6156ebda5c4866cc81bdbd64ea9ce0
                                                        • Instruction ID: 219c344fd9bf31d1a9ef10644852aeb5a5a7b536971f03db48647a306c470fd1
                                                        • Opcode Fuzzy Hash: 7160b2b4b76a42044e562f5e83bdf29b9a6156ebda5c4866cc81bdbd64ea9ce0
                                                        • Instruction Fuzzy Hash: 74712670A00B058FEB28DF69E14475ABBF1FF88304F008929D59AD7A50DB74E949CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1773 119f764-119f7d6 1775 119f7d8-119f7de 1773->1775 1776 119f7e1-119f7e8 1773->1776 1775->1776 1777 119f7ea-119f7f0 1776->1777 1778 119f7f3-119f82b 1776->1778 1777->1778 1779 119f833-119f892 CreateWindowExW 1778->1779 1780 119f89b-119f8d3 1779->1780 1781 119f894-119f89a 1779->1781 1785 119f8e0 1780->1785 1786 119f8d5-119f8d8 1780->1786 1781->1780 1787 119f8e1 1785->1787 1786->1785 1787->1787
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0119F882
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187593367.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_1190000_leaf.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 2795ecbc8caceeb4125bf89c32cc21f05b3b9735de3f4297103895d04bdbd96d
                                                        • Instruction ID: da28c3d69741944679a104831f6f32e1f6eed8452b0b1731ea074f241717c3e2
                                                        • Opcode Fuzzy Hash: 2795ecbc8caceeb4125bf89c32cc21f05b3b9735de3f4297103895d04bdbd96d
                                                        • Instruction Fuzzy Hash: 9F51C0B1D00359AFDF14CF99C984ADEBFB5BF48304F24812AE518AB250D774A845CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1788 119c85c-119f7d6 1790 119f7d8-119f7de 1788->1790 1791 119f7e1-119f7e8 1788->1791 1790->1791 1792 119f7ea-119f7f0 1791->1792 1793 119f7f3-119f892 CreateWindowExW 1791->1793 1792->1793 1795 119f89b-119f8d3 1793->1795 1796 119f894-119f89a 1793->1796 1800 119f8e0 1795->1800 1801 119f8d5-119f8d8 1795->1801 1796->1795 1802 119f8e1 1800->1802 1801->1800 1802->1802
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0119F882
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187593367.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_1190000_leaf.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 72a4877d6a61e57764eefaab39c62813490d57e817fdd05c98cd84b53b07fe0a
                                                        • Instruction ID: fe93f9e7dc8a3819468f40372d41b8c5b5d260f24fd57c7380416ce7a0f7596f
                                                        • Opcode Fuzzy Hash: 72a4877d6a61e57764eefaab39c62813490d57e817fdd05c98cd84b53b07fe0a
                                                        • Instruction Fuzzy Hash: 7851B2B1D10319AFDF18CF99C984ADDBFB5BF48314F24812AE519AB250D774A845CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1803 5274cbc-52759a1 CreateActCtxA 1806 52759a3-52759a9 1803->1806 1807 52759aa-5275a04 1803->1807 1806->1807 1814 5275a06-5275a09 1807->1814 1815 5275a13-5275a17 1807->1815 1814->1815 1816 5275a19-5275a25 1815->1816 1817 5275a28 1815->1817 1816->1817 1819 5275a29 1817->1819 1819->1819
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 05275991
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2191614361.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5270000_leaf.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 134fb69374759968c6f04815d2af4a9587aab724591887c0175657e7041eb758
                                                        • Instruction ID: bec9d1a6ac98e4cc94edf89d3585f4b4218b05958f96107893e62dc8705a099e
                                                        • Opcode Fuzzy Hash: 134fb69374759968c6f04815d2af4a9587aab724591887c0175657e7041eb758
                                                        • Instruction Fuzzy Hash: 3C41EFB0D1061DCBDB24DFA9C884B9DFBF5BF49304F20806AE418AB254DBB56946CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1820 52758d6-527595b 1821 5275963-52759a1 CreateActCtxA 1820->1821 1822 52759a3-52759a9 1821->1822 1823 52759aa-5275a04 1821->1823 1822->1823 1830 5275a06-5275a09 1823->1830 1831 5275a13-5275a17 1823->1831 1830->1831 1832 5275a19-5275a25 1831->1832 1833 5275a28 1831->1833 1832->1833 1835 5275a29 1833->1835 1835->1835
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 05275991
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2191614361.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5270000_leaf.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 2fd8ac0fdc4818718ed88405cc4cb8d1c9dc84cb2cd918a89097ce9ce3b0ac5a
                                                        • Instruction ID: 37202ad2d063a309d952ac38ccbe69b8294dc4f6068d7cdf0accd029d65feaa3
                                                        • Opcode Fuzzy Hash: 2fd8ac0fdc4818718ed88405cc4cb8d1c9dc84cb2cd918a89097ce9ce3b0ac5a
                                                        • Instruction Fuzzy Hash: B741E0B0D0061DCBDB24CFA9C884B8DFBB5BF49304F20816AE418AB254DBB55945CF91
                                                        APIs
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 052723C1
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2191614361.0000000005270000.00000040.00000800.00020000.00000000.sdmp, Offset: 05270000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_5270000_leaf.jbxd
                                                        Similarity
                                                        • API ID: CallProcWindow
                                                        • String ID:
                                                        • API String ID: 2714655100-0
                                                        • Opcode ID: 818fb2bc2a85f78caae0139b944b1d26c0e89c1ac4475092f9ee4648bf7beabb
                                                        • Instruction ID: 6f8b737f25db7d41ed8f6f0ccd16b65dccb5a5ccb3562a274ef0cf2fefe265d6
                                                        • Opcode Fuzzy Hash: 818fb2bc2a85f78caae0139b944b1d26c0e89c1ac4475092f9ee4648bf7beabb
                                                        • Instruction Fuzzy Hash: 47312DB9910209CFDB18CF55C448AAABBF6FF89314F14C459D5199B321D774A841CBA0
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,01197486,?,?,?,?,?), ref: 01197547
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187593367.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_1190000_leaf.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: ac5ff93b4b9e477ea2f381af01db17a5566e80a1eca90f7f144eb8f40770824c
                                                        • Instruction ID: d1c90f63032fc83842323b815c4aeddd641896f58f8c9e97dcdbc07bbf9115a2
                                                        • Opcode Fuzzy Hash: ac5ff93b4b9e477ea2f381af01db17a5566e80a1eca90f7f144eb8f40770824c
                                                        • Instruction Fuzzy Hash: 5521E3B59002489FDB10CF9AD984AEEBFF8FF48310F14801AE918A3350D378A954CFA5
                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,01197486,?,?,?,?,?), ref: 01197547
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187593367.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_1190000_leaf.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: a75ea1e39edc804a69490723163c87452754737dfb1f0909973ff75ba2954de9
                                                        • Instruction ID: df7ce9463d482666451e572b06ca0b9493a94b52183bf6d387cb3207f227bf5f
                                                        • Opcode Fuzzy Hash: a75ea1e39edc804a69490723163c87452754737dfb1f0909973ff75ba2954de9
                                                        • Instruction Fuzzy Hash: 3921E5B59002489FDB10CF9AD985ADEBFF4FB48310F14841AE918A3350D378A954CFA0
                                                        APIs
                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0119D839,00000800,00000000,00000000), ref: 0119DA4A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187593367.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_1190000_leaf.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 57906048e94eff25edf71129bc8d17e4f06713f59ad31c4be16581c2d3aa0ab9
                                                        • Instruction ID: 0440faf8e887600e6218b98d812ae3d186a5471fe3c473f5108f94f0c7df2d37
                                                        • Opcode Fuzzy Hash: 57906048e94eff25edf71129bc8d17e4f06713f59ad31c4be16581c2d3aa0ab9
                                                        • Instruction Fuzzy Hash: 712138B68043488FDB14DFAAD544ADEBBF4EF89310F14806AD559A7210C778A944CFA5
                                                        APIs
                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0119D839,00000800,00000000,00000000), ref: 0119DA4A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187593367.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_1190000_leaf.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: faaa217baa8e92b82964b82dd7fc54467c5f4c1bcb09e6b738cc60e2457babc7
                                                        • Instruction ID: 2d3e2e80f442056073cd17ed4ca7df590d9db2c49f573eef9dac2447983b0962
                                                        • Opcode Fuzzy Hash: faaa217baa8e92b82964b82dd7fc54467c5f4c1bcb09e6b738cc60e2457babc7
                                                        • Instruction Fuzzy Hash: A71114B69043088FDB14DF9AD544BDEFBF4EB88310F10842AE529A7200C379A944CFA5
                                                        APIs
                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0119D839,00000800,00000000,00000000), ref: 0119DA4A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187593367.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_1190000_leaf.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: c09e924d45b9aa5ac4c32d873be23d6977706d36b307a8d7672febafb7ec8e35
                                                        • Instruction ID: 0c0b2d3bf808830aaa99afda48cc5f0b84f22b9c7a8fcb7910b5d84fbf59e08a
                                                        • Opcode Fuzzy Hash: c09e924d45b9aa5ac4c32d873be23d6977706d36b307a8d7672febafb7ec8e35
                                                        • Instruction Fuzzy Hash: 8411E2B6D002498FDB14CFAAD544ADEFBF4AB48310F14841AE929B7700C779A645CFA5
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,0119D584), ref: 0119D7BE
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187593367.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_1190000_leaf.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 1fe2363b4831cce676140b73b4d3e296210faa0e9d014b24ca326d0c5867064d
                                                        • Instruction ID: 0db8e7c6cec36b8ed6a308efe8870b924779429f540259c36285d3486cd6a339
                                                        • Opcode Fuzzy Hash: 1fe2363b4831cce676140b73b4d3e296210faa0e9d014b24ca326d0c5867064d
                                                        • Instruction Fuzzy Hash: 451132B5C006888FCF18DF9AD544A9EFBF4EB88214F10842AD528B7600C378A545CFA1
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187022163.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_112d000_leaf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 87e19859f0aa8ba277f572ddb344637aa982cf772740a99665914e4339f839fe
                                                        • Instruction ID: 7a98a9d16c8a5258b34bf49e2731648b1345f32639be525e2fc4d505621fd101
                                                        • Opcode Fuzzy Hash: 87e19859f0aa8ba277f572ddb344637aa982cf772740a99665914e4339f839fe
                                                        • Instruction Fuzzy Hash: FF212571504244DFDF09DF98E9C4F26BFB5FB88318F208569E9090B256C37AD466CBA2
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187129526.000000000113D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0113D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_113d000_leaf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c0d809510cc20ac39f7aa30ac5b89e1e131c8130c44d6a83526c3d3771e1d837
                                                        • Instruction ID: 2456ac1a711542b6a8c08dd6a2dd9f23748b3e8802c4df2f38752fda8ec2260b
                                                        • Opcode Fuzzy Hash: c0d809510cc20ac39f7aa30ac5b89e1e131c8130c44d6a83526c3d3771e1d837
                                                        • Instruction Fuzzy Hash: BB21F571504204DFDF09DFA8E5C0B26BF65FBC4324F60C56DE9494B25AC33AD406CA62
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187129526.000000000113D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0113D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_113d000_leaf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f196911d6aefb393f784555fa402cdfd4837248b0c169bf2f972271054869c95
                                                        • Instruction ID: 3c59d1c46d7b31c557343b6598e98a018db98aa733ef74847803c38939afd89e
                                                        • Opcode Fuzzy Hash: f196911d6aefb393f784555fa402cdfd4837248b0c169bf2f972271054869c95
                                                        • Instruction Fuzzy Hash: 21210071604200DFDF19DFA8E980B26FF65FB88714F60C569E94A0B25AC33AD406CA62
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187129526.000000000113D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0113D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_113d000_leaf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ed2abb2bccde7827d42c7a59aaa43e8ed39c4d52164bd8b83b7af2a007c4d36e
                                                        • Instruction ID: e594d8c0af72ccea2959db82aed2301ebf81e5510725d091c75516d2b0c390fd
                                                        • Opcode Fuzzy Hash: ed2abb2bccde7827d42c7a59aaa43e8ed39c4d52164bd8b83b7af2a007c4d36e
                                                        • Instruction Fuzzy Hash: 8B2180755083809FCB07CF64D994B11BF71FB86214F28C5DAD8498F2A7C33A981ACB62
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187022163.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_112d000_leaf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                        • Instruction ID: fd74f3300a6ea5ec899d7a35e102689914f4b2f4fd2e1ffd4c8bc63c7a057636
                                                        • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                        • Instruction Fuzzy Hash: 0811AF76504280CFDF16CF54D5C4B16BF71FB88314F2486A9D9094B256C33AD46ACBA2
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187129526.000000000113D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0113D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_113d000_leaf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                        • Instruction ID: 17b54801c864de75d7154d06222c8082f6f2a159f9a8cf82ccb559cb4fd377cf
                                                        • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                        • Instruction Fuzzy Hash: 9111BB75504280DFDB06CF54D5C4B15BFA1FB84224F24C6A9E8494B29AC33AD40ACB62
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187593367.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_1190000_leaf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 95d3dc02fbb912b63e06f5cf9cb159af830de5a7baf3bf248c7823219f953cb5
                                                        • Instruction ID: e0d081aa5ae8cf95a46241b5a4e79db63abec29a71bf288fb9e0707866a20e64
                                                        • Opcode Fuzzy Hash: 95d3dc02fbb912b63e06f5cf9cb159af830de5a7baf3bf248c7823219f953cb5
                                                        • Instruction Fuzzy Hash: 49528CB4529705CFFB14CF18E8AA1997FB2FB40B18F924609E1615B2E1DBB465CACF40
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.2187593367.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_1190000_leaf.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d86a4cfd860e4efac02929c862a7d14f4cb3b6c5fe18f3022939e3d90da252ba
                                                        • Instruction ID: c572e1b001c0177fd3bc78b4cbbdcf5af49577f998c313f37a331dd083f81c9b
                                                        • Opcode Fuzzy Hash: d86a4cfd860e4efac02929c862a7d14f4cb3b6c5fe18f3022939e3d90da252ba
                                                        • Instruction Fuzzy Hash: F9A16F32F00216CFDF19DFB4C94069EBBB2FF85304B15456AE916AB261DB31E955CB80

                                                        Execution Graph

                                                        Execution Coverage:12%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:9.2%
                                                        Total number of Nodes:1580
                                                        Total number of Limit Nodes:89
                                                        execution_graph 26276 e0ebe6 58 API calls 6 library calls 26211 df50d8 81 API calls ___scrt_uninitialize_crt 26212 dff0d5 6 API calls _unexpected 26280 dda1d0 79 API calls 25090 de7dd0 25091 dd93d0 44 API calls 25090->25091 25092 de7e28 25091->25092 25099 dea060 25092->25099 25094 de7e4c 25098 de7e7a 25094->25098 25106 de94f0 25094->25106 25095 dd93d0 44 API calls 25097 de7edb 25095->25097 25098->25095 25100 dea093 25099->25100 25101 dea0c0 25099->25101 25103 dd93d0 44 API calls 25100->25103 25102 dea0cc 25101->25102 25109 ddafc0 44 API calls 25101->25109 25102->25094 25104 dea0ac 25103->25104 25104->25094 25110 dda310 25106->25110 25109->25102 25111 dda336 25110->25111 25113 dda3a0 25111->25113 25120 ddc320 25111->25120 25114 e0f67d _ValidateLocalCookies 5 API calls 25113->25114 25116 dda421 25114->25116 25115 dda36b 25115->25113 25117 dda38c 25115->25117 25139 df8609 25115->25139 25116->25098 25117->25113 25145 df7bf2 25117->25145 25121 ddc33d 25120->25121 25122 ddc3dc 25120->25122 25121->25122 25128 ddc347 25121->25128 25123 e0f67d _ValidateLocalCookies 5 API calls 25122->25123 25124 ddc3e9 25123->25124 25124->25115 25125 ddc3ca 25126 e0f67d _ValidateLocalCookies 5 API calls 25125->25126 25127 ddc3d8 25126->25127 25127->25115 25128->25125 25129 ddc392 25128->25129 25130 ddc378 25128->25130 25132 ddc3b3 25129->25132 25159 df5a75 79 API calls __fread_nolock 25129->25159 25130->25125 25131 ddc37d 25130->25131 25133 e0f67d _ValidateLocalCookies 5 API calls 25131->25133 25135 e0f67d _ValidateLocalCookies 5 API calls 25132->25135 25136 ddc38e 25133->25136 25138 ddc3c6 25135->25138 25136->25115 25137 ddc3ac 25137->25125 25137->25132 25138->25115 25140 df861c __fread_nolock 25139->25140 25160 df83a8 25140->25160 25144 df863e 25144->25117 25146 df7bfd 25145->25146 25147 df7c12 25145->25147 25229 dfcbf3 14 API calls __dosmaperr 25146->25229 25149 df7c2f 25147->25149 25150 df7c1a 25147->25150 25223 e02b92 25149->25223 25231 dfcbf3 14 API calls __dosmaperr 25150->25231 25152 df7c02 25230 df4b19 44 API calls __fread_nolock 25152->25230 25155 df7c1f 25232 df4b19 44 API calls __fread_nolock 25155->25232 25156 df7c0d 25156->25113 25158 df7c2a 25158->25113 25159->25137 25161 df83b4 __FrameHandler3::FrameUnwindToState 25160->25161 25162 df83ba 25161->25162 25164 df83ee 25161->25164 25182 df4a9c 44 API calls 2 library calls 25162->25182 25172 df575d EnterCriticalSection 25164->25172 25165 df83d5 25171 df4855 44 API calls __fread_nolock 25165->25171 25167 df83fa 25173 df851d 25167->25173 25169 df8411 25183 df843a LeaveCriticalSection __fread_nolock 25169->25183 25171->25144 25172->25167 25174 df8543 25173->25174 25175 df8530 25173->25175 25184 df8444 25174->25184 25175->25169 25177 df85f4 25177->25169 25178 df8566 25178->25177 25188 df5001 25178->25188 25182->25165 25183->25165 25185 df8455 25184->25185 25187 df84ad 25184->25187 25185->25187 25197 e037af 46 API calls 2 library calls 25185->25197 25187->25178 25189 df501a 25188->25189 25193 df5041 25188->25193 25190 dff56b __fread_nolock 44 API calls 25189->25190 25189->25193 25191 df5036 25190->25191 25198 e003fb 77 API calls 3 library calls 25191->25198 25194 e037ef 25193->25194 25199 e036ce 25194->25199 25196 e03808 25196->25177 25197->25187 25198->25193 25205 e0a042 25199->25205 25201 e036e0 25202 e036fc SetFilePointerEx 25201->25202 25204 e036e8 __wsopen_s 25201->25204 25203 e03714 GetLastError 25202->25203 25202->25204 25203->25204 25204->25196 25206 e0a064 25205->25206 25207 e0a04f 25205->25207 25212 e0a089 25206->25212 25220 dfcbe0 14 API calls __dosmaperr 25206->25220 25218 dfcbe0 14 API calls __dosmaperr 25207->25218 25209 e0a054 25219 dfcbf3 14 API calls __dosmaperr 25209->25219 25212->25201 25213 e0a094 25221 dfcbf3 14 API calls __dosmaperr 25213->25221 25215 e0a05c 25215->25201 25216 e0a09c 25222 df4b19 44 API calls __fread_nolock 25216->25222 25218->25209 25219->25215 25220->25213 25221->25216 25222->25215 25224 e02ba6 __fread_nolock 25223->25224 25233 e025a7 25224->25233 25228 e02bc0 25228->25158 25229->25152 25230->25156 25231->25155 25232->25158 25234 e025b3 __FrameHandler3::FrameUnwindToState 25233->25234 25235 e025ba 25234->25235 25236 e025dd 25234->25236 25260 df4a9c 44 API calls 2 library calls 25235->25260 25245 df575d EnterCriticalSection 25236->25245 25239 e025eb 25246 e02636 25239->25246 25240 e025d3 25244 df4855 44 API calls __fread_nolock 25240->25244 25242 e025fa 25261 e0262c LeaveCriticalSection __fread_nolock 25242->25261 25244->25228 25245->25239 25247 e02645 25246->25247 25248 e0266d 25246->25248 25265 df4a9c 44 API calls 2 library calls 25247->25265 25250 dff56b __fread_nolock 44 API calls 25248->25250 25251 e02676 25250->25251 25262 e03791 25251->25262 25254 e02720 25266 e02996 49 API calls 4 library calls 25254->25266 25255 e02660 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 25255->25242 25257 e02737 25257->25255 25267 e027d7 48 API calls 2 library calls 25257->25267 25258 e0272f 25258->25255 25260->25240 25261->25240 25268 e035a8 25262->25268 25265->25255 25266->25258 25267->25255 25270 e035b4 __FrameHandler3::FrameUnwindToState 25268->25270 25269 e03692 25281 df4a9c 44 API calls 2 library calls 25269->25281 25270->25269 25272 e03610 25270->25272 25278 e02694 25270->25278 25279 e09dc6 EnterCriticalSection 25272->25279 25274 e03616 25275 e0363b 25274->25275 25276 e036ce __wsopen_s 46 API calls 25274->25276 25280 e0368a LeaveCriticalSection __wsopen_s 25275->25280 25276->25275 25278->25254 25278->25255 25278->25257 25279->25274 25280->25278 25281->25278 25282 de0dd0 25289 df4b7a GetSystemTimeAsFileTime 25282->25289 25284 de0df5 25291 dfcae6 63 API calls _strftime 25284->25291 25286 de0e16 25287 e0f67d _ValidateLocalCookies 5 API calls 25286->25287 25288 de0e55 25287->25288 25290 df4bb3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 25289->25290 25290->25284 25291->25286 26216 de7cd0 80 API calls 26218 e09cf3 15 API calls __freea 26188 df0ac0 26189 df0b14 _Yarn error_info_injector 26188->26189 26190 df0cc0 26189->26190 26191 df0ce2 26189->26191 26193 df0ce7 26189->26193 26195 df0cec 26189->26195 26198 e0f894 44 API calls std::_Facet_Register 26189->26198 26208 dc64c0 44 API calls std::_Throw_Cpp_error 26191->26208 26209 dc6420 44 API calls 3 library calls 26193->26209 26196 df4b29 std::_Throw_Cpp_error 44 API calls 26195->26196 26197 df0cf1 26196->26197 26199 df0d80 26197->26199 26200 dd3400 44 API calls 26197->26200 26198->26189 26201 dd11f0 44 API calls 26199->26201 26200->26199 26202 df0d93 26201->26202 26203 dd1260 44 API calls 26202->26203 26204 df0d9b 26203->26204 26205 df0dad 26204->26205 26206 dd39a0 44 API calls 26204->26206 26207 df0de9 26206->26207 26209->26195 26283 e0fbc0 88 API calls ___scrt_uninitialize_crt 26284 e153c6 9 API calls 3 library calls 26285 e0ffcb GetStartupInfoW __fread_nolock 26288 dda5f0 58 API calls 2 library calls 25292 ded9f0 25293 deda0c 25292->25293 25295 deda06 25292->25295 25296 deda20 25293->25296 25300 dda7a0 25293->25300 25294 deda77 25295->25294 25321 df1030 25295->25321 25296->25295 25298 dd93d0 44 API calls 25296->25298 25298->25295 25301 dda7d8 25300->25301 25303 dda846 25301->25303 25304 dda830 25301->25304 25309 dda7e4 error_info_injector 25301->25309 25302 e0f67d _ValidateLocalCookies 5 API calls 25305 ddaa06 25302->25305 25307 df54ab 46 API calls 25303->25307 25335 df54ab 25304->25335 25305->25296 25315 dda86c _Yarn 25307->25315 25308 dda968 25308->25309 25311 ddaa0a 25308->25311 25309->25302 25310 dd39a0 44 API calls 25310->25315 25312 df4b29 std::_Throw_Cpp_error 44 API calls 25311->25312 25313 ddaa0f 25312->25313 25314 ddaa27 25313->25314 25320 dda7a0 46 API calls 25313->25320 25314->25296 25315->25308 25315->25310 25318 df54ab 46 API calls 25315->25318 25319 dda9a8 25315->25319 25316 ddaa34 25316->25296 25318->25315 25319->25308 25355 df7f5f 46 API calls 3 library calls 25319->25355 25320->25316 25322 df1058 25321->25322 25323 df1165 25321->25323 25324 df1072 25322->25324 25327 df10b7 25322->25327 25371 dd2020 44 API calls 2 library calls 25323->25371 25326 df116a 25324->25326 25328 e0f894 std::_Facet_Register 44 API calls 25324->25328 25372 dc6420 44 API calls 3 library calls 25326->25372 25331 e0f894 std::_Facet_Register 44 API calls 25327->25331 25333 df1082 _Yarn 25327->25333 25328->25333 25330 df116f 25331->25333 25332 df4b29 std::_Throw_Cpp_error 44 API calls 25332->25323 25333->25332 25334 df1136 error_info_injector 25333->25334 25334->25294 25336 df54b7 __FrameHandler3::FrameUnwindToState 25335->25336 25337 df54d9 25336->25337 25338 df54c1 25336->25338 25356 df575d EnterCriticalSection 25337->25356 25364 dfcbf3 14 API calls __dosmaperr 25338->25364 25341 df54c6 25365 df4b19 44 API calls __fread_nolock 25341->25365 25342 df54e3 25344 df557f 25342->25344 25345 dff56b __fread_nolock 44 API calls 25342->25345 25357 df546f 25344->25357 25349 df5500 25345->25349 25347 df5585 25368 df55af LeaveCriticalSection __fread_nolock 25347->25368 25349->25344 25350 df5557 25349->25350 25366 dfcbf3 14 API calls __dosmaperr 25350->25366 25352 df555c 25367 df4b19 44 API calls __fread_nolock 25352->25367 25354 df54d1 25354->25309 25355->25319 25356->25342 25358 df547b 25357->25358 25362 df5490 __fread_nolock 25357->25362 25369 dfcbf3 14 API calls __dosmaperr 25358->25369 25360 df5480 25370 df4b19 44 API calls __fread_nolock 25360->25370 25362->25347 25363 df548b 25363->25347 25364->25341 25365->25354 25366->25352 25367->25354 25368->25354 25369->25360 25370->25363 25371->25326 25372->25330 26290 dff7ea 47 API calls 26223 e074d7 57 API calls 5 library calls 25387 e00fda 25390 e00dc2 25387->25390 25391 e00e01 25390->25391 25392 e00def 25390->25392 25402 e00c8a 25391->25402 25417 e00e8a GetModuleHandleW 25392->25417 25396 e00df4 25396->25391 25418 e00eef GetModuleHandleExW 25396->25418 25397 e00e3e 25401 e00e53 25403 e00c96 __FrameHandler3::FrameUnwindToState 25402->25403 25424 dffa81 EnterCriticalSection 25403->25424 25405 e00ca0 25425 e00cd7 25405->25425 25407 e00cad 25429 e00ccb 25407->25429 25410 e00e59 25462 e00ecd 25410->25462 25413 e00e77 25415 e00eef CallUnexpected 3 API calls 25413->25415 25414 e00e67 GetCurrentProcess TerminateProcess 25414->25413 25416 e00e7f ExitProcess 25415->25416 25417->25396 25419 e00f2e GetProcAddress 25418->25419 25420 e00f4f 25418->25420 25419->25420 25423 e00f42 25419->25423 25421 e00f55 FreeLibrary 25420->25421 25422 e00e00 25420->25422 25421->25422 25422->25391 25423->25420 25424->25405 25426 e00ce3 __FrameHandler3::FrameUnwindToState 25425->25426 25427 e00d4a CallUnexpected 25426->25427 25432 e0ac1f 25426->25432 25427->25407 25461 dffac9 LeaveCriticalSection 25429->25461 25431 e00cb9 25431->25397 25431->25410 25433 e0ac2b __EH_prolog3 25432->25433 25436 e0a977 25433->25436 25435 e0ac52 CallUnexpected 25435->25427 25437 e0a983 __FrameHandler3::FrameUnwindToState 25436->25437 25444 dffa81 EnterCriticalSection 25437->25444 25439 e0a991 25445 e0ab2f 25439->25445 25443 e0a9af 25443->25435 25444->25439 25446 e0a99e 25445->25446 25449 e0ab4e 25445->25449 25452 e0a9c6 LeaveCriticalSection std::_Lockit::~_Lockit 25446->25452 25447 e0abdc 25447->25446 25448 e00703 __freea 14 API calls 25447->25448 25448->25446 25449->25446 25449->25447 25451 df4b29 44 API calls 25449->25451 25453 e1e990 25449->25453 25451->25449 25452->25443 25454 dd15f0 std::_Throw_Cpp_error 44 API calls 25453->25454 25458 df4b29 error_info_injector 25454->25458 25455 df4b29 std::_Throw_Cpp_error 44 API calls 25455->25458 25456 e1ea55 error_info_injector 25456->25449 25458->25453 25458->25455 25458->25456 25459 df4b46 __wsopen_s 11 API calls 25458->25459 25460 df4a65 44 API calls __fread_nolock 25458->25460 25459->25458 25460->25458 25461->25431 25467 e01034 6 API calls CallUnexpected 25462->25467 25464 e00ed2 25465 e00ed7 GetPEB 25464->25465 25466 e00e63 25464->25466 25465->25466 25466->25413 25466->25414 25467->25464 26225 dc6ae0 8 API calls _ValidateLocalCookies 26291 dd59e0 45 API calls 3 library calls 26106 dea1e0 26107 dea21d 26106->26107 26108 ddcca0 88 API calls 26107->26108 26109 dea296 26108->26109 26121 ddc5f0 26109->26121 26112 dea321 26114 dd93d0 44 API calls 26112->26114 26120 dea2fc 26114->26120 26116 dea2d7 26132 ddc3f0 44 API calls _ValidateLocalCookies 26116->26132 26118 dea2e1 26133 ddd070 78 API calls 7 library calls 26118->26133 26122 ddcdd0 48 API calls 26121->26122 26123 ddc609 26122->26123 26123->26112 26124 e15558 26123->26124 26125 e154de 26124->26125 26126 dea2d0 26125->26126 26134 e166db 26125->26134 26126->26112 26126->26116 26130 e15542 26130->26126 26152 df5252 82 API calls __fread_nolock 26130->26152 26132->26118 26133->26120 26136 e16625 __FrameHandler3::FrameUnwindToState 26134->26136 26135 e16638 26161 dfcbf3 14 API calls __dosmaperr 26135->26161 26136->26135 26139 e1665a 26136->26139 26138 e1663d 26162 df4b19 44 API calls __fread_nolock 26138->26162 26140 e1666c 26139->26140 26141 e1665f 26139->26141 26153 e00941 26140->26153 26163 dfcbf3 14 API calls __dosmaperr 26141->26163 26145 e15527 26145->26126 26151 df8643 79 API calls __fread_nolock 26145->26151 26147 e16688 26165 e166c4 LeaveCriticalSection __fread_nolock 26147->26165 26148 e1667b 26164 dfcbf3 14 API calls __dosmaperr 26148->26164 26151->26130 26152->26126 26154 e0094d __FrameHandler3::FrameUnwindToState 26153->26154 26166 dffa81 EnterCriticalSection 26154->26166 26156 e0095b 26167 e009e5 26156->26167 26161->26138 26162->26145 26163->26145 26164->26145 26165->26145 26166->26156 26169 e00a08 26167->26169 26168 e00a60 26170 e00c2d _unexpected 14 API calls 26168->26170 26169->26168 26176 e00968 26169->26176 26183 df575d EnterCriticalSection 26169->26183 26184 df5771 LeaveCriticalSection 26169->26184 26172 e00a69 26170->26172 26173 e00703 __freea 14 API calls 26172->26173 26174 e00a72 26173->26174 26174->26176 26185 dff2eb 6 API calls _unexpected 26174->26185 26180 e009a1 26176->26180 26177 e00a91 26186 df575d EnterCriticalSection 26177->26186 26187 dffac9 LeaveCriticalSection 26180->26187 26182 e0098c 26182->26147 26182->26148 26183->26169 26184->26169 26185->26177 26186->26176 26187->26182 26227 e0fea6 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 26296 ddb590 82 API calls error_info_injector 26297 dff592 79 API calls __fread_nolock 26299 e169b1 45 API calls 7 library calls 26229 e08ab1 55 API calls 5 library calls 26300 df55b7 45 API calls 4 library calls 26230 dc6480 44 API calls ___std_exception_copy 26301 dd9180 60 API calls 26302 dddd80 GetCurrentThreadId EnterCriticalSection LeaveCriticalSection error_info_injector 26305 e15987 DecodePointer 26235 e0fa88 4 API calls 2 library calls 26308 e1518a 16 API calls 2 library calls 26237 dc84b0 58 API calls 26310 dc63b0 14 API calls 2 library calls 24595 deacb0 24596 deae1e 24595->24596 24597 deacd5 24595->24597 24694 dc64c0 44 API calls std::_Throw_Cpp_error 24596->24694 24600 dead1c 24597->24600 24601 dead46 24597->24601 24599 deae23 24695 dc6420 44 API calls 3 library calls 24599->24695 24600->24599 24603 dead27 24600->24603 24606 e0f894 std::_Facet_Register 44 API calls 24601->24606 24610 dead2d __fread_nolock _Yarn 24601->24610 24680 e0f894 24603->24680 24606->24610 24607 deae2d 24619 deae60 24607->24619 24609 deae3b 24611 deadd1 __fread_nolock _Yarn error_info_injector 24610->24611 24612 df4b29 24610->24612 24727 df4a65 44 API calls __fread_nolock 24612->24727 24614 df4b46 __wsopen_s 11 API calls 24617 df4b38 error_info_injector 24614->24617 24616 df4b29 std::_Throw_Cpp_error 44 API calls 24616->24617 24617->24612 24617->24614 24617->24616 24618 e1ea55 error_info_injector 24617->24618 24696 dd15f0 24617->24696 24618->24607 24620 deae8e error_info_injector 24619->24620 24621 deaef0 error_info_injector 24620->24621 24623 deaf50 24620->24623 24622 deaf40 24621->24622 24761 dd93d0 24621->24761 24622->24609 24625 df4b29 std::_Throw_Cpp_error 44 API calls 24623->24625 24626 deaf55 24625->24626 24627 deb2d7 24626->24627 24629 deafbc __fread_nolock 24626->24629 24739 def220 24627->24739 24771 debca0 44 API calls 24629->24771 24631 deb303 24635 debdf0 57 API calls 24631->24635 24675 deb44d error_info_injector 24631->24675 24632 deb024 24772 dee3d0 57 API calls 2 library calls 24632->24772 24634 deb2d2 error_info_injector 24636 e0f67d _ValidateLocalCookies 5 API calls 24634->24636 24640 deb36a 24635->24640 24637 deb59e 24636->24637 24637->24609 24638 deb5d0 24642 df4b29 std::_Throw_Cpp_error 44 API calls 24638->24642 24639 dd15f0 std::_Throw_Cpp_error 44 API calls 24645 deb554 24639->24645 24643 deef30 44 API calls 24640->24643 24641 deb039 24650 deb1f7 error_info_injector 24641->24650 24773 debdf0 24641->24773 24644 deb5d5 24642->24644 24646 deb398 24643->24646 24862 de9510 44 API calls ___std_exception_copy 24644->24862 24645->24634 24645->24638 24649 dec370 57 API calls 24646->24649 24647 deb2c7 24861 deba80 44 API calls 2 library calls 24647->24861 24665 deb3b3 error_info_injector 24649->24665 24650->24647 24659 dd15f0 std::_Throw_Cpp_error 44 API calls 24650->24659 24652 deb5e6 24863 e134a6 RaiseException 24652->24863 24654 deb089 24830 deef30 24654->24830 24656 deb5fc 24864 de9510 44 API calls ___std_exception_copy 24656->24864 24658 deb5f7 24663 df4b29 std::_Throw_Cpp_error 44 API calls 24658->24663 24659->24647 24661 e11018 ___std_exception_destroy 14 API calls 24667 deb434 24661->24667 24663->24656 24664 deb608 24865 e134a6 RaiseException 24664->24865 24665->24656 24665->24661 24666 deb619 24665->24666 24670 df4b29 std::_Throw_Cpp_error 44 API calls 24666->24670 24671 e11018 ___std_exception_destroy 14 API calls 24667->24671 24673 deb61e 24670->24673 24671->24675 24675->24639 24675->24645 24675->24666 24676 deb0e5 error_info_injector 24676->24658 24857 e11018 24676->24857 24678 e11018 ___std_exception_destroy 14 API calls 24679 deb16d error_info_injector 24678->24679 24679->24650 24679->24658 24683 e0f899 24680->24683 24681 dfcea4 _Yarn 15 API calls 24681->24683 24682 e0f8b3 24682->24610 24683->24681 24683->24682 24685 e0f8b5 24683->24685 25088 e0a85f EnterCriticalSection LeaveCriticalSection std::_Facet_Register 24683->25088 24686 dc6420 Concurrency::cancel_current_task 24685->24686 24688 e0f8bf Concurrency::cancel_current_task 24685->24688 25087 e134a6 RaiseException 24686->25087 25089 e134a6 RaiseException 24688->25089 24690 dc643c 24692 e10fb5 ___std_exception_copy 44 API calls 24690->24692 24691 e10ab1 24691->24610 24693 dc6463 24692->24693 24693->24610 24695->24610 24697 dd1627 24696->24697 24698 dd1854 24697->24698 24699 dd1659 24697->24699 24700 dd1694 24697->24700 24705 dd186b 24698->24705 24706 dd1894 24698->24706 24710 dd18a2 24698->24710 24717 dd187a error_info_injector 24698->24717 24701 dd1676 24699->24701 24702 dd1960 24699->24702 24728 dd20a0 44 API calls std::_Throw_Cpp_error 24699->24728 24700->24702 24715 dd16ac std::_Throw_Cpp_error 24700->24715 24730 dd20a0 44 API calls std::_Throw_Cpp_error 24700->24730 24729 dd35a0 44 API calls std::_Throw_Cpp_error 24701->24729 24738 dd2020 44 API calls 2 library calls 24702->24738 24704 e0f67d _ValidateLocalCookies 5 API calls 24712 dd1955 24704->24712 24736 dd3c70 44 API calls 2 library calls 24705->24736 24737 dd2030 44 API calls 2 library calls 24706->24737 24710->24717 24719 dd195b 24710->24719 24711 dd1849 24735 dd2030 44 API calls 2 library calls 24711->24735 24712->24617 24725 dd1689 std::_Throw_Cpp_error 24715->24725 24731 dd4520 44 API calls std::_Throw_Cpp_error 24715->24731 24717->24704 24718 dd1965 24722 df4b29 std::_Throw_Cpp_error 44 API calls 24719->24722 24721 dd0e40 44 API calls std::_Throw_Cpp_error 24721->24725 24722->24702 24725->24711 24725->24721 24732 dd35a0 44 API calls std::_Throw_Cpp_error 24725->24732 24733 dd4520 44 API calls std::_Throw_Cpp_error 24725->24733 24734 dd3c70 44 API calls 2 library calls 24725->24734 24727->24617 24728->24701 24729->24725 24730->24715 24731->24715 24732->24725 24733->24725 24734->24725 24735->24698 24736->24717 24737->24717 24738->24718 24740 def2ac 24739->24740 24741 debdf0 57 API calls 24740->24741 24742 defcd6 24741->24742 24743 deef30 44 API calls 24742->24743 24744 defcfb 24743->24744 24745 dec370 57 API calls 24744->24745 24746 defd13 24745->24746 24866 defde0 24746->24866 24750 defd30 24878 dc88a0 24750->24878 24753 dd12d0 std::_Throw_Cpp_error 44 API calls 24754 defd46 24753->24754 24755 dd12d0 std::_Throw_Cpp_error 44 API calls 24754->24755 24756 defd4e 24755->24756 24883 debc40 24756->24883 24758 defd56 24759 e0f67d _ValidateLocalCookies 5 API calls 24758->24759 24760 defd70 24759->24760 24760->24631 24762 dd93ea 24761->24762 24762->24622 24764 dd9402 24762->24764 24890 e134a6 RaiseException 24762->24890 24891 dd92e0 44 API calls 4 library calls 24764->24891 24766 dd9438 24892 e134a6 RaiseException 24766->24892 24768 dd9447 24893 e10fb5 24768->24893 24771->24632 24772->24641 24776 debe70 24773->24776 24774 debf9c 24781 debfde 24774->24781 24786 dec168 24774->24786 24775 debec3 24780 debed9 _Yarn 24775->24780 24929 dd3ae0 24775->24929 24776->24775 24799 debf83 error_info_injector 24776->24799 24914 dd3400 24776->24914 24777 dd3ae0 std::_Throw_Cpp_error 44 API calls 24777->24774 24946 dd1260 24780->24946 24783 dec370 57 API calls 24781->24783 24790 debfea 24783->24790 24784 debf12 24785 debf1c 24784->24785 24951 dd39a0 24784->24951 24788 dd1260 44 API calls 24785->24788 24786->24786 24791 dec1bc 24786->24791 24794 dd3400 44 API calls 24786->24794 24792 debf4e 24788->24792 24789 dec048 24982 dd11f0 24789->24982 24790->24789 24793 dd3400 44 API calls 24790->24793 24797 dd3ae0 std::_Throw_Cpp_error 44 API calls 24791->24797 24798 dec1d2 _Yarn 24791->24798 24792->24799 24802 dec34d 24792->24802 24793->24789 24794->24791 24796 dec058 24800 dd3ae0 std::_Throw_Cpp_error 44 API calls 24796->24800 24803 dec06e _Yarn 24796->24803 24797->24798 24801 dd11f0 44 API calls 24798->24801 24799->24774 24799->24777 24800->24803 24804 dec20a 24801->24804 24805 df4b29 std::_Throw_Cpp_error 44 API calls 24802->24805 24806 dd1260 44 API calls 24803->24806 24807 dd1260 44 API calls 24804->24807 24808 dec352 24805->24808 24809 dec0a7 24806->24809 24810 dec215 24807->24810 24811 df4b29 std::_Throw_Cpp_error 44 API calls 24808->24811 24812 dec0b1 24809->24812 24814 dd39a0 44 API calls 24809->24814 24813 dec357 24810->24813 24821 dec163 error_info_injector 24810->24821 24811->24813 24816 dd1260 44 API calls 24812->24816 24815 df4b29 std::_Throw_Cpp_error 44 API calls 24813->24815 24814->24812 24828 dec305 24815->24828 24819 dec0e3 error_info_injector 24816->24819 24817 df4b29 std::_Throw_Cpp_error 44 API calls 24818 dec361 24817->24818 24819->24808 24819->24821 24820 dec2ac 24823 dd3ae0 std::_Throw_Cpp_error 44 API calls 24820->24823 24824 dec2c2 _Yarn 24820->24824 24821->24820 24822 dd3400 44 API calls 24821->24822 24829 dec32b error_info_injector 24821->24829 24822->24820 24823->24824 24825 dd11f0 44 API calls 24824->24825 24826 dec2fa 24825->24826 24827 dd1260 44 API calls 24826->24827 24827->24828 24828->24817 24828->24829 24829->24654 24831 deefa7 24830->24831 24998 dde060 24831->24998 24833 deefbb 25024 dc8630 24833->25024 24835 deeff9 25050 dee2e0 24835->25050 24837 def1c8 24838 df4b29 std::_Throw_Cpp_error 44 API calls 24837->24838 24840 def1cd 24838->24840 24839 def114 error_info_injector 24841 e10fb5 ___std_exception_copy 44 API calls 24839->24841 24843 df4b29 std::_Throw_Cpp_error 44 API calls 24840->24843 24844 def165 24841->24844 24842 def012 error_info_injector 24842->24837 24842->24839 24845 def1d2 24843->24845 24844->24840 24846 def19e error_info_injector 24844->24846 24847 e0f67d _ValidateLocalCookies 5 API calls 24846->24847 24848 deb0b7 24847->24848 24849 dec370 24848->24849 24850 dec3fb 24849->24850 24851 dec471 24849->24851 24850->24851 24855 dd39a0 44 API calls 24850->24855 24856 dd11f0 44 API calls 24850->24856 25086 dd8c50 57 API calls 24850->25086 24852 e0f67d _ValidateLocalCookies 5 API calls 24851->24852 24853 deb0d3 24852->24853 24853->24644 24853->24676 24855->24850 24856->24850 24858 e11025 24857->24858 24859 deb154 24857->24859 24860 df7e4b _Yarn 14 API calls 24858->24860 24859->24678 24860->24859 24861->24634 24862->24652 24863->24658 24864->24664 24865->24666 24867 defdf8 24866->24867 24868 defd22 24866->24868 24888 de9510 44 API calls ___std_exception_copy 24867->24888 24873 dd12d0 24868->24873 24870 defe03 24889 e134a6 RaiseException 24870->24889 24872 defe11 24874 dd12db 24873->24874 24875 dd12f6 error_info_injector 24873->24875 24874->24875 24876 df4b29 std::_Throw_Cpp_error 44 API calls 24874->24876 24875->24750 24877 dd131a 24876->24877 24879 e11018 ___std_exception_destroy 14 API calls 24878->24879 24880 dc88b3 24879->24880 24881 e11018 ___std_exception_destroy 14 API calls 24880->24881 24882 dc88c2 24881->24882 24882->24753 24884 debc49 24883->24884 24885 debc69 error_info_injector 24883->24885 24884->24885 24886 df4b29 std::_Throw_Cpp_error 44 API calls 24884->24886 24885->24758 24887 debc90 24886->24887 24888->24870 24889->24872 24890->24764 24891->24766 24892->24768 24894 e10fc2 24893->24894 24900 dd9474 24893->24900 24894->24900 24901 dfcea4 24894->24901 24897 e10fef 24909 df7e4b 24897->24909 24900->24622 24906 e0148b _strftime 24901->24906 24902 e014c9 24913 dfcbf3 14 API calls __dosmaperr 24902->24913 24904 e014b4 RtlAllocateHeap 24905 e014c7 24904->24905 24904->24906 24905->24897 24908 e048e2 44 API calls 2 library calls 24905->24908 24906->24902 24906->24904 24912 e0a85f EnterCriticalSection LeaveCriticalSection std::_Facet_Register 24906->24912 24908->24897 24910 e00703 __freea 14 API calls 24909->24910 24911 df7e63 24910->24911 24911->24900 24912->24906 24913->24905 24915 dd3425 24914->24915 24916 dd3512 24914->24916 24919 dd346c 24915->24919 24920 dd3493 24915->24920 24987 dc64c0 44 API calls std::_Throw_Cpp_error 24916->24987 24918 dd3517 24988 dc6420 44 API calls 3 library calls 24918->24988 24919->24918 24922 dd3477 24919->24922 24924 e0f894 std::_Facet_Register 44 API calls 24920->24924 24927 dd347d _Yarn 24920->24927 24923 e0f894 std::_Facet_Register 44 API calls 24922->24923 24923->24927 24924->24927 24925 df4b29 std::_Throw_Cpp_error 44 API calls 24926 dd3521 24925->24926 24927->24925 24928 dd34e2 _Yarn error_info_injector 24927->24928 24928->24775 24930 dd3c2e 24929->24930 24931 dd3b0b 24929->24931 24932 dd3c33 24930->24932 24989 dc64c0 44 API calls std::_Throw_Cpp_error 24930->24989 24935 dd3b7c 24931->24935 24936 dd3b52 24931->24936 24990 dc6420 44 API calls 3 library calls 24932->24990 24941 e0f894 std::_Facet_Register 44 API calls 24935->24941 24943 dd3b63 _Yarn 24935->24943 24936->24932 24938 dd3b5d 24936->24938 24937 df4b29 std::_Throw_Cpp_error 44 API calls 24939 dd3c3d 24937->24939 24940 e0f894 std::_Facet_Register 44 API calls 24938->24940 24942 dd3c5e 24939->24942 24991 dd0e40 24939->24991 24940->24943 24941->24943 24942->24780 24943->24937 24945 dd3bec _Yarn error_info_injector 24943->24945 24945->24780 24947 dd1274 24946->24947 24948 dd3ae0 std::_Throw_Cpp_error 44 API calls 24947->24948 24950 dd1284 _Yarn 24947->24950 24949 dd12c6 24948->24949 24949->24784 24950->24784 24952 dd3ad0 24951->24952 24954 dd39c5 24951->24954 24994 dc64c0 44 API calls std::_Throw_Cpp_error 24952->24994 24956 dd3a0c 24954->24956 24957 dd3a36 24954->24957 24955 dd3ad5 24995 dc6420 44 API calls 3 library calls 24955->24995 24956->24955 24959 dd3a17 24956->24959 24961 e0f894 std::_Facet_Register 44 API calls 24957->24961 24964 dd3a1d _Yarn 24957->24964 24960 e0f894 std::_Facet_Register 44 API calls 24959->24960 24960->24964 24961->24964 24962 df4b29 std::_Throw_Cpp_error 44 API calls 24963 dd3adf 24962->24963 24965 dd3c2e 24963->24965 24966 dd3b0b 24963->24966 24964->24962 24970 dd3a92 _Yarn error_info_injector 24964->24970 24967 dd3c33 24965->24967 24996 dc64c0 44 API calls std::_Throw_Cpp_error 24965->24996 24971 dd3b7c 24966->24971 24972 dd3b52 24966->24972 24997 dc6420 44 API calls 3 library calls 24967->24997 24970->24785 24977 e0f894 std::_Facet_Register 44 API calls 24971->24977 24979 dd3b63 _Yarn 24971->24979 24972->24967 24974 dd3b5d 24972->24974 24973 df4b29 std::_Throw_Cpp_error 44 API calls 24975 dd3c3d 24973->24975 24976 e0f894 std::_Facet_Register 44 API calls 24974->24976 24978 dd3c5e 24975->24978 24980 dd0e40 std::_Throw_Cpp_error 44 API calls 24975->24980 24976->24979 24977->24979 24978->24785 24979->24973 24981 dd3bec _Yarn error_info_injector 24979->24981 24980->24975 24981->24785 24983 dd1200 24982->24983 24983->24983 24984 dd3ae0 std::_Throw_Cpp_error 44 API calls 24983->24984 24986 dd1217 _Yarn 24983->24986 24985 dd124e 24984->24985 24985->24796 24986->24796 24988->24927 24990->24943 24992 dd15f0 std::_Throw_Cpp_error 44 API calls 24991->24992 24993 dd0e6e 24992->24993 24993->24939 24995->24964 24997->24979 24999 dde0c0 24998->24999 24999->24999 25066 dd4190 24999->25066 25001 dde0fa 25002 dd4190 44 API calls 25001->25002 25003 dde147 25002->25003 25004 dde190 25003->25004 25005 dd3400 44 API calls 25003->25005 25006 dd3ae0 std::_Throw_Cpp_error 44 API calls 25004->25006 25007 dde19f _Yarn 25004->25007 25005->25004 25006->25007 25008 dd1260 44 API calls 25007->25008 25009 dde1e3 25008->25009 25010 dd3ae0 std::_Throw_Cpp_error 44 API calls 25009->25010 25011 dde1f2 _Yarn 25009->25011 25010->25011 25012 dd1260 44 API calls 25011->25012 25016 dde23b error_info_injector 25012->25016 25013 dde294 error_info_injector 25014 e0f67d _ValidateLocalCookies 5 API calls 25013->25014 25017 dde2b7 25014->25017 25015 dde2be 25018 df4b29 std::_Throw_Cpp_error 44 API calls 25015->25018 25016->25013 25016->25015 25017->24833 25019 dde2c3 25018->25019 25020 e11018 ___std_exception_destroy 14 API calls 25019->25020 25021 dde2e6 25020->25021 25022 e11018 ___std_exception_destroy 14 API calls 25021->25022 25023 dde2f5 error_info_injector 25022->25023 25023->24833 25025 dc868a 25024->25025 25026 dd4190 44 API calls 25025->25026 25027 dc86fe 25026->25027 25028 dc874d 25027->25028 25029 dd3400 44 API calls 25027->25029 25030 dd3ae0 std::_Throw_Cpp_error 44 API calls 25028->25030 25031 dc8761 _Yarn 25028->25031 25029->25028 25030->25031 25032 dd1260 44 API calls 25031->25032 25033 dc878f 25032->25033 25034 dc8799 25033->25034 25035 dd39a0 44 API calls 25033->25035 25036 dd1260 44 API calls 25034->25036 25035->25034 25037 dc87c9 25036->25037 25038 dd3ae0 std::_Throw_Cpp_error 44 API calls 25037->25038 25039 dc87d8 25037->25039 25038->25039 25040 dc8830 error_info_injector 25039->25040 25042 dc885a 25039->25042 25041 e0f67d _ValidateLocalCookies 5 API calls 25040->25041 25043 dc8853 25041->25043 25044 df4b29 std::_Throw_Cpp_error 44 API calls 25042->25044 25043->24835 25045 dc885f 25044->25045 25046 e11018 ___std_exception_destroy 14 API calls 25045->25046 25047 dc8876 25046->25047 25048 e11018 ___std_exception_destroy 14 API calls 25047->25048 25049 dc8885 error_info_injector 25048->25049 25049->24835 25051 dee372 25050->25051 25052 dee367 25050->25052 25054 dd1260 44 API calls 25051->25054 25053 dd3400 44 API calls 25052->25053 25053->25051 25055 dee381 25054->25055 25056 dd11f0 44 API calls 25055->25056 25057 dee38d 25056->25057 25058 dd1260 44 API calls 25057->25058 25059 dee397 25058->25059 25060 dd11f0 44 API calls 25059->25060 25061 dee3a3 25060->25061 25062 dd1260 44 API calls 25061->25062 25063 dee3ad 25062->25063 25064 dd1260 44 API calls 25063->25064 25065 dee3b7 25064->25065 25065->24842 25067 dd41bc 25066->25067 25068 dd41d1 25066->25068 25067->25001 25069 dd4298 25068->25069 25071 dd41df 25068->25071 25084 dc64c0 44 API calls std::_Throw_Cpp_error 25069->25084 25073 dd41eb _Yarn 25071->25073 25075 dd425d 25071->25075 25076 dd423c 25071->25076 25072 dd429d 25085 dc6420 44 API calls 3 library calls 25072->25085 25073->25001 25080 e0f894 std::_Facet_Register 44 API calls 25075->25080 25083 dd4252 _Yarn 25075->25083 25076->25072 25078 dd4243 25076->25078 25077 dd4249 25079 df4b29 std::_Throw_Cpp_error 44 API calls 25077->25079 25077->25083 25081 e0f894 std::_Facet_Register 44 API calls 25078->25081 25082 dd42a7 25079->25082 25080->25083 25081->25077 25083->25001 25085->25077 25086->24850 25087->24690 25088->24683 25089->24691 25373 dedfb0 25380 e14dac 25373->25380 25375 dedfba 25376 df5785 44 API calls 25375->25376 25378 dee123 25376->25378 25377 dee19b 25378->25377 25379 dd93d0 44 API calls 25378->25379 25379->25377 25385 e14d1b 44 API calls std::invalid_argument::invalid_argument 25380->25385 25382 e14dbd 25386 e134a6 RaiseException 25382->25386 25384 e14dcb 25385->25382 25386->25384 26241 e11260 6 API calls 4 library calls 24248 e01065 24249 e01072 24248->24249 24252 e0108a 24248->24252 24305 dfcbf3 14 API calls __dosmaperr 24249->24305 24251 e01077 24306 df4b19 44 API calls __fread_nolock 24251->24306 24254 e010e9 24252->24254 24262 e01082 24252->24262 24307 e02bd3 14 API calls 2 library calls 24252->24307 24268 dff56b 24254->24268 24257 e01102 24275 e030f5 24257->24275 24260 dff56b __fread_nolock 44 API calls 24261 e0113b 24260->24261 24261->24262 24263 dff56b __fread_nolock 44 API calls 24261->24263 24264 e01149 24263->24264 24264->24262 24265 dff56b __fread_nolock 44 API calls 24264->24265 24266 e01157 24265->24266 24267 dff56b __fread_nolock 44 API calls 24266->24267 24267->24262 24269 dff58c 24268->24269 24270 dff577 24268->24270 24269->24257 24308 dfcbf3 14 API calls __dosmaperr 24270->24308 24272 dff57c 24309 df4b19 44 API calls __fread_nolock 24272->24309 24274 dff587 24274->24257 24276 e03101 __FrameHandler3::FrameUnwindToState 24275->24276 24277 e03121 24276->24277 24278 e03109 24276->24278 24280 e031de 24277->24280 24285 e03157 24277->24285 24376 dfcbe0 14 API calls __dosmaperr 24278->24376 24383 dfcbe0 14 API calls __dosmaperr 24280->24383 24282 e0310e 24377 dfcbf3 14 API calls __dosmaperr 24282->24377 24283 e031e3 24384 dfcbf3 14 API calls __dosmaperr 24283->24384 24287 e03160 24285->24287 24288 e03175 24285->24288 24378 dfcbe0 14 API calls __dosmaperr 24287->24378 24310 e09dc6 EnterCriticalSection 24288->24310 24290 e0316d 24385 df4b19 44 API calls __fread_nolock 24290->24385 24292 e03165 24379 dfcbf3 14 API calls __dosmaperr 24292->24379 24293 e0317b 24295 e03197 24293->24295 24296 e031ac 24293->24296 24380 dfcbf3 14 API calls __dosmaperr 24295->24380 24311 e03209 24296->24311 24300 e0319c 24381 dfcbe0 14 API calls __dosmaperr 24300->24381 24301 e031a7 24382 e031d6 LeaveCriticalSection __wsopen_s 24301->24382 24304 e0110a 24304->24260 24304->24262 24305->24251 24306->24262 24307->24254 24308->24272 24309->24274 24310->24293 24312 e03233 24311->24312 24313 e0321b 24311->24313 24314 e03589 24312->24314 24319 e03279 24312->24319 24395 dfcbe0 14 API calls __dosmaperr 24313->24395 24417 dfcbe0 14 API calls __dosmaperr 24314->24417 24317 e03220 24396 dfcbf3 14 API calls __dosmaperr 24317->24396 24318 e0358e 24418 dfcbf3 14 API calls __dosmaperr 24318->24418 24321 e03228 24319->24321 24323 e03284 24319->24323 24329 e032b4 24319->24329 24321->24301 24397 dfcbe0 14 API calls __dosmaperr 24323->24397 24324 e03291 24419 df4b19 44 API calls __fread_nolock 24324->24419 24326 e03289 24398 dfcbf3 14 API calls __dosmaperr 24326->24398 24330 e032cd 24329->24330 24331 e032e7 24329->24331 24332 e03318 24329->24332 24330->24331 24333 e032d2 24330->24333 24399 dfcbe0 14 API calls __dosmaperr 24331->24399 24402 e0148b 15 API calls 3 library calls 24332->24402 24386 e0a636 24333->24386 24335 e032ec 24400 dfcbf3 14 API calls __dosmaperr 24335->24400 24339 e03329 24403 e00703 24339->24403 24340 e032f3 24401 df4b19 44 API calls __fread_nolock 24340->24401 24344 e034d9 24347 e034dd ReadFile 24344->24347 24345 e03465 24345->24344 24348 e0347e GetConsoleMode 24345->24348 24346 e00703 __freea 14 API calls 24349 e03339 24346->24349 24350 e03551 GetLastError 24347->24350 24351 e034f5 24347->24351 24348->24344 24352 e0348f 24348->24352 24353 e03343 24349->24353 24354 e0335e 24349->24354 24355 e034b5 24350->24355 24356 e0355e 24350->24356 24351->24350 24357 e034ce 24351->24357 24352->24347 24358 e03495 ReadConsoleW 24352->24358 24409 dfcbf3 14 API calls __dosmaperr 24353->24409 24411 e037af 46 API calls 2 library calls 24354->24411 24374 e032fe __fread_nolock 24355->24374 24412 dfcb99 14 API calls __dosmaperr 24355->24412 24415 dfcbf3 14 API calls __dosmaperr 24356->24415 24369 e03531 24357->24369 24370 e0351a 24357->24370 24357->24374 24358->24357 24363 e034af GetLastError 24358->24363 24359 e00703 __freea 14 API calls 24359->24321 24363->24355 24364 e03348 24410 dfcbe0 14 API calls __dosmaperr 24364->24410 24365 e03563 24416 dfcbe0 14 API calls __dosmaperr 24365->24416 24371 e0354a 24369->24371 24369->24374 24413 e02f23 49 API calls 4 library calls 24370->24413 24414 e02d7b 47 API calls __wsopen_s 24371->24414 24374->24359 24375 e0354f 24375->24374 24376->24282 24377->24304 24378->24292 24379->24290 24380->24300 24381->24301 24382->24304 24383->24283 24384->24290 24385->24304 24387 e0a650 24386->24387 24388 e0a643 24386->24388 24392 e0a65c 24387->24392 24421 dfcbf3 14 API calls __dosmaperr 24387->24421 24420 dfcbf3 14 API calls __dosmaperr 24388->24420 24391 e0a648 24391->24345 24392->24345 24393 e0a67d 24422 df4b19 44 API calls __fread_nolock 24393->24422 24395->24317 24396->24321 24397->24326 24398->24324 24399->24335 24400->24340 24401->24374 24402->24339 24404 e0070e RtlFreeHeap 24403->24404 24408 e00738 24403->24408 24405 e00723 GetLastError 24404->24405 24404->24408 24406 e00730 __dosmaperr 24405->24406 24423 dfcbf3 14 API calls __dosmaperr 24406->24423 24408->24346 24409->24364 24410->24374 24411->24333 24412->24374 24413->24374 24414->24375 24415->24365 24416->24374 24417->24318 24418->24324 24419->24321 24420->24391 24421->24393 24422->24391 24423->24408 26242 e09666 56 API calls 4 library calls 24424 e17568 24429 e172fd 24424->24429 24427 e175a7 24434 e1732b ___vcrt_FlsFree 24429->24434 24431 e17556 24448 df4b19 44 API calls __fread_nolock 24431->24448 24433 e17486 24433->24427 24441 e1915e 24433->24441 24439 e1747b 24434->24439 24444 e0cc6d 54 API calls 2 library calls 24434->24444 24436 e174e3 24436->24439 24445 e0cc6d 54 API calls 2 library calls 24436->24445 24438 e17501 24438->24439 24446 e0cc6d 54 API calls 2 library calls 24438->24446 24439->24433 24447 dfcbf3 14 API calls __dosmaperr 24439->24447 24449 e1886c 24441->24449 24444->24436 24445->24438 24446->24439 24447->24431 24448->24433 24450 e18878 __FrameHandler3::FrameUnwindToState 24449->24450 24451 e1887f 24450->24451 24454 e188aa 24450->24454 24507 dfcbf3 14 API calls __dosmaperr 24451->24507 24453 e18884 24508 df4b19 44 API calls __fread_nolock 24453->24508 24460 e18e34 24454->24460 24459 e1888e 24459->24427 24510 e18c10 24460->24510 24463 e18e66 24541 dfcbe0 14 API calls __dosmaperr 24463->24541 24464 e18e7f 24527 e09e9e 24464->24527 24467 e18e6b 24542 dfcbf3 14 API calls __dosmaperr 24467->24542 24469 e18ea4 24540 e18b7b CreateFileW 24469->24540 24470 e18e8d 24543 dfcbe0 14 API calls __dosmaperr 24470->24543 24474 e18e92 24544 dfcbf3 14 API calls __dosmaperr 24474->24544 24475 e18f5a GetFileType 24478 e18f65 GetLastError 24475->24478 24479 e18fac 24475->24479 24477 e18f2f GetLastError 24546 dfcb99 14 API calls __dosmaperr 24477->24546 24547 dfcb99 14 API calls __dosmaperr 24478->24547 24549 e09de9 15 API calls 2 library calls 24479->24549 24480 e18edd 24480->24475 24480->24477 24545 e18b7b CreateFileW 24480->24545 24484 e18f73 CloseHandle 24484->24467 24485 e18f9c 24484->24485 24548 dfcbf3 14 API calls __dosmaperr 24485->24548 24487 e18f22 24487->24475 24487->24477 24489 e18fcd 24494 e19019 24489->24494 24550 e18d8a 85 API calls 3 library calls 24489->24550 24490 e18fa1 24490->24467 24493 e1904e 24495 e19020 24493->24495 24496 e1905c 24493->24496 24494->24495 24552 e1892d 85 API calls 3 library calls 24494->24552 24551 e00871 47 API calls 2 library calls 24495->24551 24497 e188ce 24496->24497 24499 e190d8 CloseHandle 24496->24499 24509 e18901 LeaveCriticalSection __wsopen_s 24497->24509 24553 e18b7b CreateFileW 24499->24553 24501 e19103 24502 e1910d GetLastError 24501->24502 24503 e19139 24501->24503 24554 dfcb99 14 API calls __dosmaperr 24502->24554 24503->24497 24505 e19119 24555 e09fb1 15 API calls 2 library calls 24505->24555 24507->24453 24508->24459 24509->24459 24511 e18c31 24510->24511 24516 e18c4b 24510->24516 24511->24516 24563 dfcbf3 14 API calls __dosmaperr 24511->24563 24514 e18c40 24564 df4b19 44 API calls __fread_nolock 24514->24564 24556 e18ba0 24516->24556 24517 e18cb2 24525 e18d05 24517->24525 24567 e161da 44 API calls 2 library calls 24517->24567 24518 e18c83 24518->24517 24565 dfcbf3 14 API calls __dosmaperr 24518->24565 24521 e18d00 24521->24525 24568 df4b46 IsProcessorFeaturePresent 24521->24568 24522 e18ca7 24566 df4b19 44 API calls __fread_nolock 24522->24566 24525->24463 24525->24464 24526 e18d89 24528 e09eaa __FrameHandler3::FrameUnwindToState 24527->24528 24588 dffa81 EnterCriticalSection 24528->24588 24531 e09ed6 24592 e09c78 15 API calls 2 library calls 24531->24592 24534 e09eb1 24534->24531 24536 e09f45 EnterCriticalSection 24534->24536 24538 e09ef8 24534->24538 24535 e09edb 24535->24538 24593 e09dc6 EnterCriticalSection 24535->24593 24537 e09f52 LeaveCriticalSection 24536->24537 24536->24538 24537->24534 24589 e09fa8 24538->24589 24540->24480 24541->24467 24542->24497 24543->24474 24544->24467 24545->24487 24546->24467 24547->24484 24548->24490 24549->24489 24550->24494 24551->24497 24552->24493 24553->24501 24554->24505 24555->24503 24559 e18bb8 24556->24559 24557 e18bd3 24557->24518 24559->24557 24572 dfcbf3 14 API calls __dosmaperr 24559->24572 24560 e18bf7 24573 df4b19 44 API calls __fread_nolock 24560->24573 24562 e18c02 24562->24518 24563->24514 24564->24516 24565->24522 24566->24517 24567->24521 24569 df4b52 24568->24569 24574 df491d 24569->24574 24572->24560 24573->24562 24575 df4939 __fread_nolock CallUnexpected 24574->24575 24576 df4965 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 24575->24576 24579 df4a36 CallUnexpected 24576->24579 24578 df4a54 GetCurrentProcess TerminateProcess 24578->24526 24580 e0f67d 24579->24580 24581 e0f685 24580->24581 24582 e0f686 IsProcessorFeaturePresent 24580->24582 24581->24578 24584 e1054c 24582->24584 24587 e1050f SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 24584->24587 24586 e1062f 24586->24578 24587->24586 24588->24534 24594 dffac9 LeaveCriticalSection 24589->24594 24591 e09f18 24591->24469 24591->24470 24592->24535 24593->24538 24594->24591 26243 e1486c WideCharToMultiByte WideCharToMultiByte GetLastError WideCharToMultiByte GetLastError 26244 ddd850 5 API calls _ValidateLocalCookies 26245 ddaa50 46 API calls 25468 df9345 25469 df9368 25468->25469 25470 df9355 25468->25470 25471 df937a 25469->25471 25481 df938d 25469->25481 25507 dfcbf3 14 API calls __dosmaperr 25470->25507 25509 dfcbf3 14 API calls __dosmaperr 25471->25509 25474 df935a 25508 df4b19 44 API calls __fread_nolock 25474->25508 25476 df937f 25510 df4b19 44 API calls __fread_nolock 25476->25510 25477 df93ad 25511 dfcbf3 14 API calls __dosmaperr 25477->25511 25478 df93be 25499 e04824 25478->25499 25481->25477 25481->25478 25485 df93d5 25486 df95c9 25485->25486 25519 e03c44 25485->25519 25487 df4b46 __wsopen_s 11 API calls 25486->25487 25489 df95d3 25487->25489 25490 df93e7 25490->25486 25526 e03c70 25490->25526 25492 df93f9 25492->25486 25493 df9402 25492->25493 25494 df9487 25493->25494 25495 df9423 25493->25495 25498 df9364 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 25494->25498 25534 e04881 44 API calls 2 library calls 25494->25534 25495->25498 25533 e04881 44 API calls 2 library calls 25495->25533 25500 e04830 __FrameHandler3::FrameUnwindToState 25499->25500 25501 df93c3 25500->25501 25535 dffa81 EnterCriticalSection 25500->25535 25512 e03c18 25501->25512 25503 e04841 25504 e04855 25503->25504 25536 e0476c 25503->25536 25548 e04878 LeaveCriticalSection std::_Lockit::~_Lockit 25504->25548 25507->25474 25508->25498 25509->25476 25510->25498 25511->25498 25513 e03c24 25512->25513 25514 e03c39 25512->25514 25664 dfcbf3 14 API calls __dosmaperr 25513->25664 25514->25485 25516 e03c29 25665 df4b19 44 API calls __fread_nolock 25516->25665 25518 e03c34 25518->25485 25520 e03c50 25519->25520 25521 e03c65 25519->25521 25666 dfcbf3 14 API calls __dosmaperr 25520->25666 25521->25490 25523 e03c55 25667 df4b19 44 API calls __fread_nolock 25523->25667 25525 e03c60 25525->25490 25527 e03c91 25526->25527 25528 e03c7c 25526->25528 25527->25492 25668 dfcbf3 14 API calls __dosmaperr 25528->25668 25530 e03c81 25669 df4b19 44 API calls __fread_nolock 25530->25669 25532 e03c8c 25532->25492 25533->25498 25534->25498 25535->25503 25549 e042c2 25536->25549 25539 e047c8 25540 e047c5 25539->25540 25618 e04612 25539->25618 25544 e00703 __freea 14 API calls 25540->25544 25542 e047bf 25558 e04380 25542->25558 25545 e047d3 25544->25545 25546 e0f67d _ValidateLocalCookies 5 API calls 25545->25546 25547 e047e0 25546->25547 25547->25504 25548->25501 25550 e042e1 _strftime 25549->25550 25555 e042e8 25550->25555 25650 e0148b 15 API calls 3 library calls 25550->25650 25552 e04309 25553 e00703 __freea 14 API calls 25552->25553 25553->25555 25554 e04302 _strftime 25554->25552 25556 e0432b 25554->25556 25555->25539 25555->25542 25557 e00703 __freea 14 API calls 25556->25557 25557->25555 25559 e04390 _strftime 25558->25559 25560 e03c70 _strftime 44 API calls 25559->25560 25561 e043b1 25560->25561 25563 e03c18 _strftime 44 API calls 25561->25563 25587 e04605 25561->25587 25562 df4b46 __wsopen_s 11 API calls 25564 e04611 _strftime 25562->25564 25565 e043c3 25563->25565 25569 e03c70 _strftime 44 API calls 25564->25569 25567 e04439 25565->25567 25565->25587 25651 e0148b 15 API calls 3 library calls 25565->25651 25567->25540 25568 e0442a 25570 e04431 25568->25570 25571 e0443f 25568->25571 25572 e0463f 25569->25572 25573 e00703 __freea 14 API calls 25570->25573 25574 e00703 __freea 14 API calls 25571->25574 25575 e04761 25572->25575 25578 e03c18 _strftime 44 API calls 25572->25578 25573->25567 25577 e0444a 25574->25577 25576 df4b46 __wsopen_s 11 API calls 25575->25576 25580 e0476b 25576->25580 25652 e084e5 44 API calls 2 library calls 25577->25652 25579 e04651 25578->25579 25579->25575 25581 e03c44 _strftime 44 API calls 25579->25581 25582 e042c2 _strftime 15 API calls 25580->25582 25585 e04663 25581->25585 25586 e047a5 25582->25586 25584 e04471 25584->25587 25600 e0447c __fread_nolock 25584->25600 25585->25575 25588 e0466c 25585->25588 25589 e047c8 25586->25589 25593 e047bf 25586->25593 25587->25562 25590 e00703 __freea 14 API calls 25588->25590 25591 e047c5 25589->25591 25592 e04612 _strftime 57 API calls 25589->25592 25594 e04677 GetTimeZoneInformation 25590->25594 25596 e00703 __freea 14 API calls 25591->25596 25592->25591 25595 e04380 _strftime 57 API calls 25593->25595 25601 e0473b _strftime 25594->25601 25604 e04693 __fread_nolock 25594->25604 25595->25591 25597 e047d3 25596->25597 25598 e0f67d _ValidateLocalCookies 5 API calls 25597->25598 25599 e047e0 25598->25599 25599->25540 25653 e04339 58 API calls 5 library calls 25600->25653 25601->25540 25603 e044c1 25654 df92ff 55 API calls 2 library calls 25603->25654 25658 e07466 44 API calls 2 library calls 25604->25658 25607 e04716 25659 e047e2 58 API calls 4 library calls 25607->25659 25609 e04727 25660 e047e2 58 API calls 4 library calls 25609->25660 25610 e044f5 25612 e04587 25610->25612 25655 df92ff 55 API calls 2 library calls 25610->25655 25615 e045e9 _strftime 25612->25615 25657 e04339 58 API calls 5 library calls 25612->25657 25615->25587 25617 e04532 25617->25612 25656 df92ff 55 API calls 2 library calls 25617->25656 25619 e04622 _strftime 25618->25619 25620 e03c70 _strftime 44 API calls 25619->25620 25621 e0463f 25620->25621 25622 e04761 25621->25622 25624 e03c18 _strftime 44 API calls 25621->25624 25623 df4b46 __wsopen_s 11 API calls 25622->25623 25625 e0476b 25623->25625 25626 e04651 25624->25626 25628 e042c2 _strftime 15 API calls 25625->25628 25626->25622 25627 e03c44 _strftime 44 API calls 25626->25627 25629 e04663 25627->25629 25630 e047a5 25628->25630 25629->25622 25631 e0466c 25629->25631 25632 e047c8 25630->25632 25636 e047bf 25630->25636 25633 e00703 __freea 14 API calls 25631->25633 25634 e047c5 25632->25634 25635 e04612 _strftime 57 API calls 25632->25635 25637 e04677 GetTimeZoneInformation 25633->25637 25639 e00703 __freea 14 API calls 25634->25639 25635->25634 25638 e04380 _strftime 57 API calls 25636->25638 25643 e0473b _strftime 25637->25643 25644 e04693 __fread_nolock 25637->25644 25638->25634 25640 e047d3 25639->25640 25641 e0f67d _ValidateLocalCookies 5 API calls 25640->25641 25642 e047e0 25641->25642 25642->25540 25643->25540 25661 e07466 44 API calls 2 library calls 25644->25661 25646 e04716 25662 e047e2 58 API calls 4 library calls 25646->25662 25648 e04727 25663 e047e2 58 API calls 4 library calls 25648->25663 25650->25554 25651->25568 25652->25584 25653->25603 25654->25610 25655->25617 25656->25612 25657->25615 25658->25607 25659->25609 25660->25601 25661->25646 25662->25648 25663->25643 25664->25516 25665->25518 25666->25523 25667->25525 25668->25530 25669->25532 25670 ddc840 25671 ddc88d 25670->25671 25678 ddca72 25670->25678 25673 ddcb33 25671->25673 25681 ddca6e 25671->25681 25690 ddc740 25671->25690 25695 dd8c50 57 API calls 25671->25695 25699 dd8c70 44 API calls _ValidateLocalCookies 25673->25699 25675 ddcb55 25700 ddd580 44 API calls 25675->25700 25677 ddcb67 25701 dd2e00 44 API calls 4 library calls 25677->25701 25680 ddcb7c 25702 e134a6 RaiseException 25680->25702 25681->25678 25696 ddd650 44 API calls 25681->25696 25683 ddcb8d 25685 ddcb10 25697 dd2e00 44 API calls 4 library calls 25685->25697 25687 ddcb22 25698 e134a6 RaiseException 25687->25698 25691 ddc780 25690->25691 25692 ddc759 _Yarn 25690->25692 25693 dd3ae0 std::_Throw_Cpp_error 44 API calls 25691->25693 25692->25671 25694 ddc78d 25693->25694 25694->25671 25695->25671 25696->25685 25697->25687 25698->25673 25699->25675 25700->25677 25701->25680 25702->25683 26248 dd8e40 77 API calls 3 library calls 26316 dde540 66 API calls error_info_injector 25703 de0840 12 API calls 25704 de098f __fread_nolock 25703->25704 25741 dde4b0 25704->25741 25707 de09f2 25752 dde610 25707->25752 25710 de0acd 25711 de0afd IStream_Read 25710->25711 25714 de0ac5 __fread_nolock 25710->25714 25791 dee1d0 25710->25791 25712 de0b17 __fread_nolock 25711->25712 25805 de9440 25712->25805 25714->25711 25724 de0c4e 25725 de0c58 25724->25725 25726 de0c55 DeleteObject 25724->25726 25727 dde4b0 60 API calls 25725->25727 25726->25725 25728 de0c5d EnterCriticalSection 25727->25728 25729 de0c92 25728->25729 25730 de0c71 EnterCriticalSection 25728->25730 25733 de0c98 LeaveCriticalSection 25729->25733 25731 de0c7a GdiplusShutdown 25730->25731 25732 de0c81 LeaveCriticalSection 25730->25732 25731->25732 25732->25733 25734 de0ca2 25733->25734 25736 de0cc1 error_info_injector 25733->25736 25734->25736 25738 de0ced 25734->25738 25735 e0f67d _ValidateLocalCookies 5 API calls 25737 de0ce9 25735->25737 25736->25735 25739 df4b29 std::_Throw_Cpp_error 44 API calls 25738->25739 25740 de0cf2 25739->25740 25742 dde537 EnterCriticalSection LeaveCriticalSection GetObjectW 25741->25742 25743 dde4c5 25741->25743 25742->25707 25830 e0f7be 6 API calls 25743->25830 25745 dde4cf 25745->25742 25746 dde4db InitializeCriticalSectionEx 25745->25746 25747 dde50c GetLastError 25746->25747 25748 dde516 25746->25748 25747->25748 25831 e0fc15 47 API calls 25748->25831 25750 dde52d 25832 e0f774 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 25750->25832 25753 dde4b0 60 API calls 25752->25753 25754 dde65c 25753->25754 25755 dde6a9 25754->25755 25756 dde664 EnterCriticalSection 25754->25756 25760 e0f67d _ValidateLocalCookies 5 API calls 25755->25760 25757 dde6d1 LeaveCriticalSection GdipGetImageEncodersSize 25756->25757 25758 dde673 GdiplusStartup 25756->25758 25757->25755 25761 dde6ea 25757->25761 25758->25757 25759 dde6a2 LeaveCriticalSection 25758->25759 25759->25755 25762 dde6c8 IStream_Size IStream_Reset 25760->25762 25763 dde6fc 25761->25763 25833 dde3a0 5 API calls 2 library calls 25761->25833 25762->25710 25762->25714 25764 dde71e 25763->25764 25765 dde906 25763->25765 25769 dde700 _strftime 25763->25769 25767 dfcea4 _Yarn 15 API calls 25764->25767 25834 dde460 InitializeCriticalSectionEx GetLastError RaiseException CallUnexpected 25765->25834 25767->25769 25769->25755 25771 dde760 GdipGetImageEncoders 25769->25771 25772 dde743 25769->25772 25770 dde910 25773 dde76f 25771->25773 25777 dde78b 25771->25777 25772->25755 25774 df7e4b _Yarn 14 API calls 25772->25774 25773->25755 25775 df7e4b _Yarn 14 API calls 25773->25775 25774->25772 25775->25773 25776 dde834 25779 dde899 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 25776->25779 25780 dde848 GdipCreateBitmapFromScan0 GdipSaveImageToStream 25776->25780 25777->25776 25778 dde811 25777->25778 25778->25755 25787 df7e4b _Yarn 14 API calls 25778->25787 25781 dde8e4 GdipDisposeImage 25779->25781 25783 dde8bc GdipDisposeImage 25779->25783 25780->25781 25782 dde877 GdipDisposeImage 25780->25782 25781->25755 25784 dde8ee 25781->25784 25782->25755 25785 dde885 25782->25785 25783->25755 25786 dde8ca 25783->25786 25784->25755 25790 df7e4b _Yarn 14 API calls 25784->25790 25785->25755 25788 df7e4b _Yarn 14 API calls 25785->25788 25786->25755 25789 df7e4b _Yarn 14 API calls 25786->25789 25787->25778 25788->25785 25789->25786 25790->25784 25792 dee1ed 25791->25792 25793 dee2d4 25791->25793 25794 dee209 25792->25794 25796 dee24e 25792->25796 25835 dd2020 44 API calls 2 library calls 25793->25835 25797 dee2d9 25794->25797 25798 e0f894 std::_Facet_Register 44 API calls 25794->25798 25801 e0f894 std::_Facet_Register 44 API calls 25796->25801 25803 dee219 __fread_nolock _Yarn 25796->25803 25836 dc6420 44 API calls 3 library calls 25797->25836 25798->25803 25800 dee2de 25801->25803 25802 df4b29 std::_Throw_Cpp_error 44 API calls 25802->25793 25803->25802 25804 dee2aa error_info_injector 25803->25804 25804->25714 25837 ddcca0 25805->25837 25808 ddcdd0 25809 e0f894 std::_Facet_Register 44 API calls 25808->25809 25810 ddce0a 25809->25810 25811 e151de 48 API calls 25810->25811 25812 ddce21 25811->25812 25813 ddb100 25812->25813 25814 ddb145 25813->25814 25815 ddb15e 25814->25815 25906 ddafc0 44 API calls 25814->25906 25818 ddb193 25815->25818 25902 ddb340 25815->25902 25817 dd93d0 44 API calls 25820 ddb21a 25817->25820 25818->25817 25819 ddb22a SelectObject DeleteDC ReleaseDC DeleteObject 25823 de7a50 25819->25823 25820->25819 25907 ddcc10 44 API calls 25820->25907 25825 de7ad0 25823->25825 25824 de0c43 25827 de0d00 25824->25827 25825->25824 25927 dd8320 25825->25927 26101 de8490 25827->26101 25829 de0d4a std::ios_base::_Ios_base_dtor 25829->25724 25830->25745 25831->25750 25832->25742 25833->25763 25834->25770 25835->25797 25836->25800 25838 dd93d0 44 API calls 25837->25838 25839 ddcd19 25838->25839 25840 e0f894 std::_Facet_Register 44 API calls 25839->25840 25841 ddcd20 25840->25841 25848 e151de 25841->25848 25843 ddcd3a 25860 ddcf40 25843->25860 25845 ddcdb3 25845->25808 25847 dd93d0 44 API calls 25847->25845 25849 e151ea __EH_prolog3 25848->25849 25879 e14f5c 25849->25879 25854 e15208 25893 e15363 46 API calls std::locale::_Setgloballocale 25854->25893 25855 e15263 CallUnexpected 25855->25843 25857 e15210 25894 e15136 15 API calls _Yarn 25857->25894 25859 e15226 25885 e14fb4 25859->25885 25861 e14f5c std::_Lockit::_Lockit 7 API calls 25860->25861 25862 ddcf7b 25861->25862 25863 e14f5c std::_Lockit::_Lockit 7 API calls 25862->25863 25870 ddcfbe 25862->25870 25865 ddcf9e 25863->25865 25864 ddd008 25866 e14fb4 std::_Lockit::~_Lockit 2 API calls 25864->25866 25868 e14fb4 std::_Lockit::~_Lockit 2 API calls 25865->25868 25867 ddd048 25866->25867 25869 e0f67d _ValidateLocalCookies 5 API calls 25867->25869 25868->25870 25871 ddcd6b 25869->25871 25870->25864 25899 dd8f90 86 API calls 6 library calls 25870->25899 25871->25845 25871->25847 25873 ddd018 25874 ddd066 25873->25874 25875 ddd020 25873->25875 25901 dd8db0 44 API calls 3 library calls 25874->25901 25900 e151ac 44 API calls std::_Facet_Register 25875->25900 25878 ddd06b 25880 e14f72 25879->25880 25881 e14f6b 25879->25881 25884 e14f70 25880->25884 25896 e1596b EnterCriticalSection 25880->25896 25895 dffae0 6 API calls std::_Lockit::_Lockit 25881->25895 25884->25859 25892 e15340 44 API calls 2 library calls 25884->25892 25886 dffaee 25885->25886 25887 e14fbe 25885->25887 25897 dffac9 LeaveCriticalSection 25886->25897 25889 e14fd1 25887->25889 25898 e15979 LeaveCriticalSection 25887->25898 25889->25855 25890 dffaf5 25890->25855 25892->25854 25893->25857 25894->25859 25895->25884 25896->25884 25897->25890 25898->25889 25899->25873 25900->25864 25901->25878 25903 ddb404 25902->25903 25904 ddb36a _Yarn 25902->25904 25903->25818 25904->25903 25908 de82d0 25904->25908 25906->25815 25907->25819 25909 de82e5 25908->25909 25910 de8473 25908->25910 25911 de82eb 25909->25911 25912 de8353 25909->25912 25913 de8343 25909->25913 25910->25904 25911->25904 25915 de8368 25912->25915 25916 de8375 25912->25916 25918 de8373 25912->25918 25914 e0f894 std::_Facet_Register 44 API calls 25913->25914 25923 de834e _Yarn 25914->25923 25917 de847f 25915->25917 25915->25918 25921 e0f894 std::_Facet_Register 44 API calls 25916->25921 25916->25923 25926 dc6420 44 API calls 3 library calls 25917->25926 25918->25910 25919 e0f894 std::_Facet_Register 44 API calls 25918->25919 25919->25923 25921->25923 25922 df4b29 std::_Throw_Cpp_error 44 API calls 25924 de8489 25922->25924 25923->25922 25925 de8446 error_info_injector 25923->25925 25925->25904 25926->25923 25929 dd833e _Yarn 25927->25929 25933 dd82a0 25927->25933 25929->25824 25933->25927 25936 dd85c1 error_info_injector 25933->25936 25938 dd82f7 error_info_injector 25933->25938 25939 df4b29 44 API calls std::_Throw_Cpp_error 25933->25939 25940 dc64c0 44 API calls std::_Throw_Cpp_error 25933->25940 25941 dc6420 44 API calls 3 library calls 25933->25941 25942 dc7430 25933->25942 25951 dc7ed0 25933->25951 25965 e149af 25933->25965 25935 e0f67d _ValidateLocalCookies 5 API calls 25937 dd85e5 25935->25937 25936->25935 25937->25824 25938->25824 25939->25933 25941->25933 25943 dc7463 25942->25943 25944 dc74de 25943->25944 25948 dc7470 25943->25948 25990 dc64c0 44 API calls std::_Throw_Cpp_error 25944->25990 25946 dc747c 25946->25933 25948->25946 25975 dd3f50 25948->25975 25950 dc74b7 _Yarn 25950->25933 25952 dc7f0e 25951->25952 25962 dc7fd9 25952->25962 25992 dd42b0 25952->25992 25956 dc7f65 25957 dc7f95 error_info_injector 25956->25957 25959 dc802b 25956->25959 26017 e149cf 25957->26017 25960 df4b29 std::_Throw_Cpp_error 44 API calls 25959->25960 25961 dc8030 25960->25961 25962->25933 25964 dc7fb2 25964->25962 26022 e1498e FindNextFileW 25964->26022 25966 e149c5 25965->25966 25967 e149b8 FindClose 25965->25967 25966->25933 25967->25966 25968 e149c9 25967->25968 26038 df55b7 25968->26038 25971 e149af ___std_fs_directory_iterator_open@12 45 API calls 25972 e149dd FindFirstFileExW 25971->25972 25973 e149f8 25972->25973 25974 e149fc GetLastError 25972->25974 25973->25933 25974->25973 25976 dd3f5d 25975->25976 25977 dd3fa0 25975->25977 25979 dd3f89 25976->25979 25980 dd3f66 25976->25980 25991 dc6420 44 API calls 3 library calls 25977->25991 25983 dd3f9a 25979->25983 25986 e0f894 std::_Facet_Register 44 API calls 25979->25986 25980->25977 25982 dd3f6d 25980->25982 25981 dd3f73 25984 df4b29 std::_Throw_Cpp_error 44 API calls 25981->25984 25989 dd3f7c 25981->25989 25985 e0f894 std::_Facet_Register 44 API calls 25982->25985 25983->25950 25987 dd3faa 25984->25987 25985->25981 25988 dd3f93 25986->25988 25988->25950 25989->25950 25991->25981 26025 dd3370 25992->26025 25994 dd42f2 25995 e0f67d _ValidateLocalCookies 5 API calls 25994->25995 25996 dc7f50 25995->25996 25997 dc6fa0 25996->25997 25998 dc6fb9 25997->25998 25999 dc7006 25998->25999 26006 dc6ff4 25998->26006 26033 dc72b0 44 API calls 3 library calls 25999->26033 26001 dc700e 26001->25956 26002 dc70bc 26034 dc72b0 44 API calls 3 library calls 26002->26034 26004 dc70b7 26005 dc70f5 26004->26005 26010 dc7117 26004->26010 26007 dc7102 26005->26007 26009 dc71a2 26005->26009 26006->26002 26006->26004 26016 dc7151 _Yarn 26007->26016 26036 dd3240 44 API calls 3 library calls 26007->26036 26008 dc70c6 26008->25956 26037 dd1fb0 44 API calls 26009->26037 26010->26007 26035 dd1030 44 API calls 3 library calls 26010->26035 26015 dc7197 26015->25956 26016->25956 26018 e149af ___std_fs_directory_iterator_open@12 48 API calls 26017->26018 26019 e149dd FindFirstFileExW 26018->26019 26020 e149fc GetLastError 26019->26020 26021 e149f8 26019->26021 26020->26021 26021->25964 26023 e149a5 GetLastError 26022->26023 26024 e149a1 26022->26024 26023->26024 26024->25964 26026 dd33f8 26025->26026 26028 dd338f 26025->26028 26032 dc64c0 44 API calls std::_Throw_Cpp_error 26026->26032 26030 dd3f50 44 API calls 26028->26030 26031 dd339b _Yarn 26028->26031 26030->26031 26031->25994 26033->26001 26034->26008 26035->26007 26036->26015 26039 df55c3 __FrameHandler3::FrameUnwindToState 26038->26039 26054 dfd231 GetLastError 26039->26054 26042 df55f2 26082 e00c2d 26042->26082 26046 e00703 __freea 14 API calls 26047 df5626 26046->26047 26048 e00c2d _unexpected 14 API calls 26047->26048 26051 df564c 26047->26051 26049 df5640 26048->26049 26052 e00703 __freea 14 API calls 26049->26052 26053 df5658 26051->26053 26091 dff2eb 6 API calls _unexpected 26051->26091 26052->26051 26053->25971 26055 dfd247 26054->26055 26059 dfd24d 26054->26059 26092 dff153 6 API calls _unexpected 26055->26092 26058 dfd269 26061 e00c2d _unexpected 14 API calls 26058->26061 26079 dfd251 SetLastError 26058->26079 26059->26079 26093 dff192 6 API calls _unexpected 26059->26093 26062 dfd27e 26061->26062 26065 dfd297 26062->26065 26066 dfd286 26062->26066 26063 dfd2e6 26098 dfceaf 44 API calls CallUnexpected 26063->26098 26064 df55c8 26081 dfceaf 44 API calls CallUnexpected 26064->26081 26095 dff192 6 API calls _unexpected 26065->26095 26094 dff192 6 API calls _unexpected 26066->26094 26070 dfd2eb 26071 dfd294 26077 e00703 __freea 14 API calls 26071->26077 26072 dfd2a3 26073 dfd2be 26072->26073 26074 dfd2a7 26072->26074 26097 dfd05f 14 API calls __dosmaperr 26073->26097 26096 dff192 6 API calls _unexpected 26074->26096 26077->26079 26078 dfd2c9 26080 e00703 __freea 14 API calls 26078->26080 26079->26063 26079->26064 26080->26079 26081->26042 26083 e00c3a 26082->26083 26084 e00c7a 26083->26084 26085 e00c65 HeapAlloc 26083->26085 26088 e00c4e _strftime 26083->26088 26100 dfcbf3 14 API calls __dosmaperr 26084->26100 26086 e00c78 26085->26086 26085->26088 26089 df561a 26086->26089 26088->26084 26088->26085 26099 e0a85f EnterCriticalSection LeaveCriticalSection std::_Facet_Register 26088->26099 26089->26046 26091->26051 26092->26059 26093->26058 26094->26071 26095->26072 26096->26071 26097->26078 26098->26070 26099->26088 26100->26089 26102 de84da error_info_injector 26101->26102 26103 de849f 26101->26103 26102->25829 26103->26102 26104 df4b29 std::_Throw_Cpp_error 44 API calls 26103->26104 26105 de855e 26104->26105 26250 dffa40 7 API calls _unexpected 26251 df867d 14 API calls 2 library calls 26319 e15948 DeleteCriticalSection 26254 e1004f 56 API calls _unexpected 26255 e13e4f 58 API calls 3 library calls 26256 e0fa4f 11 API calls ___scrt_uninitialize_crt 26322 e0f750 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 26324 e15956 InitializeCriticalSectionEx 26258 df9267 54 API calls 2 library calls 26260 de8a60 87 API calls _ValidateLocalCookies 26327 e15d22 45 API calls 3 library calls 26328 dff114 6 API calls _unexpected 26330 dd5310 64 API calls 3 library calls 26265 e07a32 56 API calls 3 library calls 26332 e0c532 55 API calls 4 library calls 26338 dff535 FreeLibrary 26340 dc5730 47 API calls _ValidateLocalCookies 26269 de9230 78 API calls 3 library calls 26271 e09413 58 API calls 4 library calls 26343 e1491f WideCharToMultiByte GetLastError WideCharToMultiByte GetLastError

                                                        Control-flow Graph

                                                        APIs
                                                        • KiUserCallbackDispatcher.NTDLL(0000004C), ref: 00DE0894
                                                        • GetSystemMetrics.USER32(0000004D), ref: 00DE089E
                                                        • GetSystemMetrics.USER32(0000004E), ref: 00DE08A8
                                                        • GetSystemMetrics.USER32(0000004F), ref: 00DE08B2
                                                        • GetDC.USER32(00000000), ref: 00DE08B8
                                                        • GetDeviceCaps.GDI32(00000000,00000008), ref: 00DE08CD
                                                        • GetDeviceCaps.GDI32(?,0000000A), ref: 00DE08D9
                                                        • CreateCompatibleDC.GDI32(?), ref: 00DE08E3
                                                        • CreateCompatibleBitmap.GDI32(?,00000000,00000000), ref: 00DE08F8
                                                        • SelectObject.GDI32(?,00000000), ref: 00DE090C
                                                        • BitBlt.GDI32(?,00000000,00000000,?,00000000,?,?,?,40CC0020), ref: 00DE0936
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00DE097C
                                                          • Part of subcall function 00DDE4B0: InitializeCriticalSectionEx.KERNEL32(00E38A08,00000000,00000000), ref: 00DDE502
                                                          • Part of subcall function 00DDE4B0: GetLastError.KERNEL32 ref: 00DDE50C
                                                        • EnterCriticalSection.KERNEL32(00000004), ref: 00DE09C0
                                                        • LeaveCriticalSection.KERNEL32(00000004), ref: 00DE09CA
                                                        • GetObjectW.GDI32(?,00000054,?), ref: 00DE09E7
                                                        • IStream_Size.SHLWAPI(00000000,?,00000000), ref: 00DE0AA2
                                                        • IStream_Reset.SHLWAPI(00000000), ref: 00DE0AB1
                                                        • IStream_Read.SHLWAPI(00000000,00000000,?), ref: 00DE0B05
                                                        • SelectObject.GDI32(?,?), ref: 00DE0C09
                                                        • DeleteDC.GDI32(?), ref: 00DE0C10
                                                        • ReleaseDC.USER32(00000000,?), ref: 00DE0C1E
                                                        • DeleteObject.GDI32(?), ref: 00DE0C30
                                                        • DeleteObject.GDI32(?), ref: 00DE0C56
                                                        • EnterCriticalSection.KERNEL32(00000004,?), ref: 00DE0C69
                                                        • EnterCriticalSection.KERNEL32(00000004), ref: 00DE0C72
                                                        • GdiplusShutdown.GDIPLUS(00000000), ref: 00DE0C7B
                                                        • LeaveCriticalSection.KERNEL32(00000004), ref: 00DE0C8E
                                                        • LeaveCriticalSection.KERNEL32(00000004), ref: 00DE0C99
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$Object$CreateDeleteEnterLeaveMetricsStream_System$CapsCompatibleDeviceSelect$BitmapCallbackDispatcherErrorGdiplusGlobalInitializeLastReadReleaseResetShutdownSizeStreamUser
                                                        • String ID:
                                                        • API String ID: 3293131912-0
                                                        • Opcode ID: e4c4401eaee67c6478339fbb5d12163eccebd0ff093834eedbe4155dda4b7073
                                                        • Instruction ID: 0d7c47008cdc4ff24b92e6e6b70d5e78bc1f00bd7e2925ac3a4b5baec438fef4
                                                        • Opcode Fuzzy Hash: e4c4401eaee67c6478339fbb5d12163eccebd0ff093834eedbe4155dda4b7073
                                                        • Instruction Fuzzy Hash: 98D15971D00219DFDB20DFA5CC49BEEBBB4EB49300F1045A9E509B7291DBB45A85CFA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 254 ddf190-ddf28d call de05b0 call dc9e80 call dd0d00 call dd5170 call dc9e80 call dd0d00 call dd15f0 WSAStartup 269 ddf28f-ddf2a2 socket 254->269 270 ddf30e 254->270 272 ddf308 WSACleanup 269->272 273 ddf2a4-ddf2fa htons inet_pton connect 269->273 271 ddf312-ddf318 270->271 274 ddf31e-ddf32a 271->274 275 ddf402-ddf41f call e0f67d 271->275 272->270 276 ddf2fc-ddf302 closesocket 273->276 277 ddf349-ddf36a call dde920 call dd1160 273->277 278 ddf3f8-ddf3ff call e0fc2f 274->278 279 ddf330-ddf33e 274->279 276->272 293 ddf36c-ddf37e 277->293 294 ddf39e-ddf3a6 call dde920 277->294 278->275 283 ddf344 279->283 284 ddf420 call df4b29 279->284 283->278 290 ddf425 call df4b29 284->290 296 ddf42a-ddf4a3 call df4b29 290->296 297 ddf394-ddf39b call e0fc2f 293->297 298 ddf380-ddf38e 293->298 299 ddf3ab-ddf3bf call dd1160 294->299 309 ddf4a9-ddf4bd call e0f7be 296->309 310 ddf5e4-ddf5ef 296->310 297->294 298->290 298->297 307 ddf3ef-ddf3f3 299->307 308 ddf3c1-ddf3d3 299->308 307->271 311 ddf3e5-ddf3ec call e0fc2f 308->311 312 ddf3d5-ddf3e3 308->312 309->310 323 ddf4c3-ddf59e 309->323 313 ddf5f5-ddf609 call e0f7be 310->313 314 ddf730-ddf770 call dd4310 call dc7240 310->314 311->307 312->296 312->311 313->314 325 ddf60f-ddf6ea 313->325 330 ddf7a4-ddf7ef call dc8500 314->330 331 ddf772-ddf784 314->331 326 ddf5a8-ddf5ad 323->326 328 ddf6f4-ddf6f9 325->328 326->326 329 ddf5af-ddf5e1 call dc9e80 call e0fc15 call e0f774 326->329 328->328 332 ddf6fb-ddf72d call dc9e80 call e0fc15 call e0f774 328->332 329->310 349 ddfb9b-ddfbf0 call dc7e50 call dd1ba0 call dd2d30 call dd2e00 call e134a6 330->349 350 ddf7f5-ddf806 330->350 335 ddf79a-ddf7a1 call e0fc2f 331->335 336 ddf786-ddf794 331->336 332->314 335->330 336->335 340 ddfb96 call df4b29 336->340 340->349 366 ddfbf5-ddfbfa call df4b29 349->366 358 ddf808-ddf81a 350->358 359 ddf83a-ddf859 call e0f67d 350->359 361 ddf81c-ddf82a 358->361 362 ddf830-ddf837 call e0fc2f 358->362 361->362 361->366 362->359
                                                        APIs
                                                          • Part of subcall function 00DE05B0: GetUserGeoID.KERNEL32(00000010), ref: 00DE05E5
                                                          • Part of subcall function 00DE05B0: GetGeoInfoA.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00DE05F7
                                                          • Part of subcall function 00DE05B0: GetGeoInfoA.KERNEL32(?,00000004,?,00000000,00000000), ref: 00DE064F
                                                        • WSAStartup.WS2_32(00000202,00E36B1C), ref: 00DDF285
                                                        • socket.WS2_32(00000002,00000001,00000000), ref: 00DDF294
                                                        • htons.WS2_32(00000002), ref: 00DDF2B7
                                                        • inet_pton.WS2_32(00000002,00E389A0,00E36CB0), ref: 00DDF2DE
                                                        • connect.WS2_32(00E36CAC,00000010), ref: 00DDF2F1
                                                        • closesocket.WS2_32 ref: 00DDF302
                                                          • Part of subcall function 00E0F774: EnterCriticalSection.KERNEL32(00E37D34,?,?,00DDF72D,00E38A78,?,?,?), ref: 00E0F77E
                                                          • Part of subcall function 00E0F774: LeaveCriticalSection.KERNEL32(00E37D34,?,?,00DDF72D,00E38A78,?,?,?), ref: 00E0F7B1
                                                          • Part of subcall function 00E0F774: RtlWakeAllConditionVariable.NTDLL ref: 00E0F828
                                                        • WSACleanup.WS2_32 ref: 00DDF308
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CriticalInfoSection$CleanupConditionEnterLeaveStartupUserVariableWakeclosesocketconnecthtonsinet_ptonsocket
                                                        • String ID: `p$geo$pp$system$type must be string, but is $j
                                                        • API String ID: 3108621024-1391336215
                                                        • Opcode ID: 072e3978b8529082074ba695553394648c1814a43678ba42bdcc8a7b08d97ac8
                                                        • Instruction ID: f4b7bfeb44c5e9f57ecbc230d96ed5c32521a55a4cb7393f7381706b3270c817
                                                        • Opcode Fuzzy Hash: 072e3978b8529082074ba695553394648c1814a43678ba42bdcc8a7b08d97ac8
                                                        • Instruction Fuzzy Hash: 55128C709003189BDB15DF68DC99BEDBBB1EF49300F1482AAE44AB7391DB315A85CB61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 453 ddfc60-ddfca7 call ddad50 456 ddfca9 453->456 457 ddfcab-ddfd07 call dd2800 call dd1260 453->457 456->457 462 ddfd09-ddfd15 457->462 463 ddfd35-ddfd4d 457->463 464 ddfd2b-ddfd32 call e0fc2f 462->464 465 ddfd17-ddfd25 462->465 466 ddfd4f-ddfd5b 463->466 467 ddfd7b-ddfdb1 call ddfc00 recv 463->467 464->463 465->464 471 ddfe09 call df4b29 465->471 468 ddfd5d-ddfd6b 466->468 469 ddfd71-ddfd73 call e0fc2f 466->469 479 ddfdba-ddfdc6 WSACleanup 467->479 480 ddfdb3-ddfdb4 closesocket 467->480 468->469 468->471 477 ddfd78 469->477 478 ddfe0e-ddfe8a call df4b29 471->478 477->467 489 de0155-de0174 InternetOpenA 478->489 490 ddfe90-ddfea4 call e0f7be 478->490 482 ddfdc8-ddfdd4 479->482 483 ddfdf0-ddfe08 call e0f67d 479->483 480->479 485 ddfde6-ddfde8 call e0fc2f 482->485 486 ddfdd6-ddfde4 482->486 495 ddfded 485->495 486->478 486->485 493 de0176-de018e 489->493 494 de0193-de01aa 489->494 490->489 501 ddfeaa-de00c0 490->501 497 de0575-de0594 call e0f67d 493->497 498 de01ae-de01d1 InternetOpenUrlA 494->498 499 de01ac 494->499 495->483 502 de01f4-de021e HttpQueryInfoW 498->502 503 de01d3-de01ef 498->503 499->498 501->489 505 de024c-de02a6 call e113c0 HttpQueryInfoW 502->505 506 de0220-de0247 502->506 504 de0569 503->504 504->497 511 de02dd-de02f1 InternetQueryDataAvailable 505->511 512 de02a8-de02bb call df92ff 505->512 506->504 514 de052c-de0562 InternetCloseHandle 511->514 515 de02f7 511->515 512->511 520 de02bd-de02d7 call dd3400 512->520 514->504 517 de0300-de0308 515->517 518 de030e-de0347 517->518 519 de0520 517->519 521 de059f-de05a4 call dd2020 518->521 522 de034d-de0353 518->522 523 de0526 519->523 520->511 525 de037e-de0384 call e0f894 522->525 526 de0355-de035a 522->526 523->514 537 de0387-de03ce call e113c0 InternetReadFile 525->537 530 de0595 call dc6420 526->530 531 de0360-de036d call e0f894 526->531 538 de059a call df4b29 530->538 531->538 539 de0373-de037c 531->539 543 de03d4-de03dc 537->543 544 de04c2-de04ce 537->544 538->521 539->537 543->544 546 de03e2-de03fb 543->546 544->523 545 de04d0-de04e0 544->545 547 de04f6-de051e call e0fc2f 545->547 548 de04e2-de04f0 545->548 549 de042d-de043a call dd3ae0 546->549 550 de03fd-de042b call e11690 546->550 547->523 548->538 548->547 556 de043f-de044b 549->556 550->556 557 de044d-de045d 556->557 558 de049b-de04af InternetQueryDataAvailable 556->558 559 de045f-de046d 557->559 560 de0473-de0491 call e0fc2f 557->560 558->523 561 de04b1-de04bd 558->561 559->538 559->560 560->558 561->517
                                                        APIs
                                                        • recv.WS2_32(?,00000001,00000000,00E389BC), ref: 00DDFDA4
                                                        • closesocket.WS2_32(00000214), ref: 00DDFDB4
                                                        • WSACleanup.WS2_32 ref: 00DDFDBA
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Cleanupclosesocketrecv
                                                        • String ID:
                                                        • API String ID: 3447645871-0
                                                        • Opcode ID: a65aa17f3652ac5c2f88d8ab22a9580350dccecce7e0e89cb4434d6e405e2137
                                                        • Instruction ID: 40385135899cdffc322c1361025e5a0ac2fc54d69d08ff880df69d12f7e26618
                                                        • Opcode Fuzzy Hash: a65aa17f3652ac5c2f88d8ab22a9580350dccecce7e0e89cb4434d6e405e2137
                                                        • Instruction Fuzzy Hash: 4C322571D012599FEB64DF68CD44B9DBBB4BB48300F1482AAE509B7291DB70AAC4CF61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1212 dd8840-dd888b 1213 dd888d-dd88a2 1212->1213 1214 dd88a7-dd88be 1212->1214 1215 dd89be-dd89dd call e0f67d 1213->1215 1216 dd88c0-dd88c9 1214->1216 1216->1216 1218 dd88cb-dd88e8 call dd3370 1216->1218 1222 dd88ea-dd8902 1218->1222 1223 dd8907-dd8983 WideCharToMultiByte call dd8b00 WideCharToMultiByte 1218->1223 1224 dd8988-dd898e 1222->1224 1223->1224 1224->1215 1226 dd8990-dd89a2 1224->1226 1228 dd89b4-dd89bb call e0fc2f 1226->1228 1229 dd89a4-dd89b2 1226->1229 1228->1215 1229->1228 1230 dd89de-dd8a58 call df4b29 CryptUnprotectData 1229->1230 1235 dd8a5a-dd8ad3 call dd3fb0 call e11690 LocalFree 1230->1235 1236 dd8ad5 1230->1236 1237 dd8ad9-dd8af7 call e0f67d 1235->1237 1236->1237
                                                        APIs
                                                        • CryptUnprotectData.CRYPT32(AA85FA48,00000000,00000000,00000000,00000000,00000001,?), ref: 00DD8A50
                                                        • LocalFree.KERNEL32(?,?,?,00000000), ref: 00DD8AA4
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CryptDataFreeLocalUnprotect
                                                        • String ID:
                                                        • API String ID: 1561624719-0
                                                        • Opcode ID: f34b9e55b27a650df485aff85fb9374cb570fe30e587f04946e5545c50c84302
                                                        • Instruction ID: dd6cd46ed3bd88711e8ab2bc4f6810c575b35c02208c8a176e22d0b1b5f6e187
                                                        • Opcode Fuzzy Hash: f34b9e55b27a650df485aff85fb9374cb570fe30e587f04946e5545c50c84302
                                                        • Instruction Fuzzy Hash: 0391A071D103499BDB20CF68DC51BAEFBF4EF58700F24861EE851B6680EB706684CBA1
                                                        APIs
                                                        • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00E047C5,00000000,00000000,00000000), ref: 00E04684
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: InformationTimeZone
                                                        • String ID: Eastern Standard Time$Eastern Summer Time
                                                        • API String ID: 565725191-239921721
                                                        • Opcode ID: dc18a5b30da2726ca493510c6475e1d78073abb3e1331ce834aa1d1631ed4041
                                                        • Instruction ID: 41f1c11113680f919bc7fe198f6cd84cf8f3bbcb7ed86f388eafb20ba50c8832
                                                        • Opcode Fuzzy Hash: dc18a5b30da2726ca493510c6475e1d78073abb3e1331ce834aa1d1631ed4041
                                                        • Instruction Fuzzy Hash: 99C124F1900115ABDB20ABA5DE42ABEBBA9EF05714F155066FA40FB2D1E7309F80C790
                                                        APIs
                                                        • FindClose.KERNEL32(000000FF,?,00E149DD,?,?,?,00DC7FB2,?,?), ref: 00E149BB
                                                        • FindFirstFileExW.KERNEL32(000000FF,00000001,?,00000000,00000000,00000000,?,?,?,?,00E149DD,?,?,?,00DC7FB2,?), ref: 00E149EA
                                                        • GetLastError.KERNEL32(?,00E149DD,?,?,?,00DC7FB2,?,?), ref: 00E149FC
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseErrorFileFirstLast
                                                        • String ID:
                                                        • API String ID: 4020440971-0
                                                        • Opcode ID: eb6a5f83d0c9df498378fa0b27bc10419eaa86ba53e21fbbec65a3e17091041d
                                                        • Instruction ID: d91fa80472e5c7627e62fc9b43f64231e04723d94186d49b7c34335accc9cfb0
                                                        • Opcode Fuzzy Hash: eb6a5f83d0c9df498378fa0b27bc10419eaa86ba53e21fbbec65a3e17091041d
                                                        • Instruction Fuzzy Hash: 00F05472000609BFDB111F65EC08DFE7B9DEB44370B108625B928A15F1D73189A19660
                                                        APIs
                                                        • GetUserNameW.ADVAPI32(?,?), ref: 00DE0E9E
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID:
                                                        • API String ID: 2645101109-0
                                                        • Opcode ID: 499e0d964e1b39315932c0d8e3ba24d1fd1bb0a85b2c72372b2fc12fac2c6d04
                                                        • Instruction ID: 749556a935df6c4fd24006de7ab659a3d037c5c925a362cede8cef0e64a7699d
                                                        • Opcode Fuzzy Hash: 499e0d964e1b39315932c0d8e3ba24d1fd1bb0a85b2c72372b2fc12fac2c6d04
                                                        • Instruction Fuzzy Hash: 060152719003188BD721DF25D805BDAB7F4EF48740F00469EE48AA7641DBB566C88BA1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 96fc92659c3faf74ad2f82c155e4d5ff1bc7a079bc79dca28c9c503b3cc2dbe1
                                                        • Instruction ID: 841eed921881a394b4fdfdbaa19aba085ecf497931aaf6251b4a421753470c7e
                                                        • Opcode Fuzzy Hash: 96fc92659c3faf74ad2f82c155e4d5ff1bc7a079bc79dca28c9c503b3cc2dbe1
                                                        • Instruction Fuzzy Hash: 2EF0E531A10264DFCB22CB4CC805A99B3FDEB44B61F111096F580FB190C270DE80C7D1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 dd9b00-dd9b59 call e0f894 call df53de 5 dd9fcc-dd9fd5 call e15038 0->5 6 dd9b5f-dd9b6a 0->6 8 dd9fda-dd9fdc call e15038 5->8 6->8 9 dd9b70-dd9b7a GetCurrentThreadId 6->9 10 dd9fe1-dd9fe3 call e15038 8->10 9->10 11 dd9b80-dd9b90 call e15886 9->11 16 dd9fe8-dd9fea call e15038 10->16 11->16 17 dd9b96-dd9bce call e0f894 call df53de 11->17 20 dd9fef-dd9ff1 call e15038 16->20 17->5 27 dd9bd4-dd9bdf 17->27 24 dd9ff6-dd9ff8 call e15038 20->24 28 dd9ffd-dd9fff call e15038 24->28 27->20 29 dd9be5-dd9bef GetCurrentThreadId 27->29 32 dda004-dda006 call e15038 28->32 29->24 31 dd9bf5-dd9c05 call e15886 29->31 31->28 38 dd9c0b-dd9c43 call e0f894 call df53de 31->38 35 dda00b-dda00d call e15038 32->35 39 dda012-dda014 call e15038 35->39 38->5 47 dd9c49-dd9c54 38->47 44 dda019-dda01b call e15038 39->44 48 dda020-dda022 call e15038 44->48 47->32 49 dd9c5a-dd9c64 GetCurrentThreadId 47->49 52 dda027-dda029 call e15038 48->52 49->35 51 dd9c6a-dd9c7a call e15886 49->51 51->39 57 dd9c80-dd9cb8 call e0f894 call df53de 51->57 56 dda02e-dda030 call e15038 52->56 60 dda035-dda037 call e15038 56->60 57->5 68 dd9cbe-dd9cc9 57->68 64 dda03c-dda03e call e15038 60->64 67 dda043-dda045 call e15038 64->67 71 dda04a-dda04c call e15038 67->71 68->44 70 dd9ccf-dd9cd9 GetCurrentThreadId 68->70 70->48 72 dd9cdf-dd9cef call e15886 70->72 76 dda051-dda053 call e15038 71->76 72->52 77 dd9cf5-dd9d2d call e0f894 call df53de 72->77 80 dda058-dda05a call e15038 76->80 77->5 87 dd9d33-dd9d3e 77->87 84 dda05f-dda061 call e15038 80->84 88 dda066-dda068 call e15038 84->88 87->56 89 dd9d44-dd9d4e GetCurrentThreadId 87->89 92 dda06d-dda06f call e15038 88->92 89->60 91 dd9d54-dd9d64 call e15886 89->91 91->64 97 dd9d6a-dd9da2 call e0f894 call df53de 91->97 96 dda074-dda076 call e15038 92->96 99 dda07b-dda07d call e15038 96->99 97->5 107 dd9da8-dd9db3 97->107 103 dda082-dda084 call e15038 99->103 108 dda089-dda08b call e15038 103->108 107->67 109 dd9db9-dd9dc3 GetCurrentThreadId 107->109 112 dda090-dda092 call e15038 108->112 109->71 111 dd9dc9-dd9dd9 call e15886 109->111 111->76 117 dd9ddf-dd9e17 call e0f894 call df53de 111->117 116 dda097-dda099 call e15038 112->116 120 dda09e-dda0a0 call e15038 116->120 117->5 127 dd9e1d-dd9e28 117->127 124 dda0a5-dda0a7 call e15038 120->124 128 dda0ac-dda10d call e15038 call df4b7a call df4d91 call df4d70 call e0f894 call df53de 124->128 127->80 129 dd9e2e-dd9e38 GetCurrentThreadId 127->129 152 dda112-dda11b 128->152 129->84 132 dd9e3e-dd9e4e call e15886 129->132 132->88 138 dd9e54-dd9e8c call e0f894 call df53de 132->138 138->5 147 dd9e92-dd9e9d 138->147 147->92 149 dd9ea3-dd9ead GetCurrentThreadId 147->149 149->96 151 dd9eb3-dd9ec3 call e15886 149->151 151->99 161 dd9ec9-dd9f01 call e0f894 call df53de 151->161 154 dda11d-dda122 152->154 155 dda155-dda15f call e15038 152->155 158 dda164-dda166 call e15038 154->158 159 dda124-dda12f GetCurrentThreadId 154->159 155->158 162 dda16b-dda16d call e15038 158->162 159->162 163 dda131-dda142 call e15886 159->163 161->5 178 dd9f07-dd9f12 161->178 167 dda172-dda19b call e15038 call ddd070 call ddc290 162->167 163->167 170 dda144-dda152 call e0f67d 163->170 178->103 180 dd9f18-dd9f22 GetCurrentThreadId 178->180 180->108 181 dd9f28-dd9f38 call e15886 180->181 181->112 186 dd9f3e-dd9f69 call e0f894 call df53de 181->186 190 dd9f6e-dd9f76 186->190 190->128 191 dd9f7c-dd9f87 190->191 191->116 192 dd9f8d-dd9f97 GetCurrentThreadId 191->192 192->120 193 dd9f9d-dd9fad call e15886 192->193 193->124 196 dd9fb3-dd9fcb call e0f67d 193->196
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00DD9B70
                                                        • GetCurrentThreadId.KERNEL32 ref: 00DD9BE5
                                                        • GetCurrentThreadId.KERNEL32 ref: 00DD9C5A
                                                        • GetCurrentThreadId.KERNEL32 ref: 00DD9CCF
                                                        • GetCurrentThreadId.KERNEL32 ref: 00DD9D44
                                                        • GetCurrentThreadId.KERNEL32 ref: 00DD9DB9
                                                        • GetCurrentThreadId.KERNEL32 ref: 00DD9E2E
                                                        • GetCurrentThreadId.KERNEL32 ref: 00DD9EA3
                                                        • GetCurrentThreadId.KERNEL32 ref: 00DD9F18
                                                        • GetCurrentThreadId.KERNEL32 ref: 00DD9F8D
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DD9FD5
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DD9FDC
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DD9FE3
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DD9FEA
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DD9FF1
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DD9FF8
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DD9FFF
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA006
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA00D
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA014
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA01B
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA022
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA029
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA030
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA037
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA03E
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA045
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA04C
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA053
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA05A
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA061
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA068
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA06F
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA076
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA07D
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA084
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA08B
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA092
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA099
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA0A0
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA0A7
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA0B5
                                                        • GetCurrentThreadId.KERNEL32 ref: 00DDA124
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA15F
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA166
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA16D
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 00DDA174
                                                          • Part of subcall function 00E15886: WaitForSingleObjectEx.KERNEL32(00000000,000000FF,00000000,?,00000000,?,00DDA13D,?,00000000,00000000), ref: 00E15892
                                                          • Part of subcall function 00E15886: GetExitCodeThread.KERNEL32(00000000,?,?,00000000,?,00DDA13D,?,00000000,00000000), ref: 00E158AB
                                                          • Part of subcall function 00E15886: CloseHandle.KERNEL32(00000000,?,00000000,?,00DDA13D,?,00000000,00000000), ref: 00E158BD
                                                          • Part of subcall function 00DF53DE: CreateThread.KERNEL32(00000000,00000000,Function_00065282,00000000,00000000,00000000), ref: 00DF5427
                                                          • Part of subcall function 00DF53DE: GetLastError.KERNEL32(?,?,?,?,00DD9B51,00000000,00000000), ref: 00DF5433
                                                          • Part of subcall function 00DF53DE: __dosmaperr.LIBCMT ref: 00DF543A
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Cpp_errorThrow_std::_$Thread$Current$CloseCodeCreateErrorExitHandleLastObjectSingleWait__dosmaperr
                                                        • String ID:
                                                        • API String ID: 956486989-0
                                                        • Opcode ID: be7453a44e0cdfd054bf691f7d198d8bd5a78d689caf93bcdc2d0988fc8f9b29
                                                        • Instruction ID: d32702cbae2c7914d3ee0f6e84f55fdc7ca97042e91b4adce6d5c0cacd8d4d5c
                                                        • Opcode Fuzzy Hash: be7453a44e0cdfd054bf691f7d198d8bd5a78d689caf93bcdc2d0988fc8f9b29
                                                        • Instruction Fuzzy Hash: 14F1A9B1E81705EEEB28ABA4CC07BFE76B49F50740F144129F605792C1EAF15A84C6B3

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 377 dde610-dde662 call dde4b0 380 dde6a9 377->380 381 dde664-dde671 EnterCriticalSection 377->381 384 dde6ae-dde6ce call e0f67d 380->384 382 dde6d1-dde6e8 LeaveCriticalSection GdipGetImageEncodersSize 381->382 383 dde673-dde6a0 GdiplusStartup 381->383 382->380 387 dde6ea-dde6f5 382->387 383->382 385 dde6a2-dde6a3 LeaveCriticalSection 383->385 385->380 389 dde6f7-dde6fe call dde3a0 387->389 390 dde711-dde718 387->390 397 dde70e 389->397 398 dde700-dde70c call e108e0 389->398 391 dde71e-dde72e call dfcea4 390->391 392 dde906-dde910 call dde460 390->392 402 dde756-dde75b 391->402 403 dde730-dde736 391->403 397->390 405 dde73c-dde741 398->405 402->384 403->405 406 dde760-dde76d GdipGetImageEncoders 405->406 407 dde743-dde745 405->407 408 dde76f-dde771 406->408 409 dde78b-dde793 406->409 407->402 410 dde747-dde754 call df7e4b 407->410 408->380 411 dde777-dde784 call df7e4b 408->411 412 dde795-dde79e 409->412 413 dde7e2 409->413 410->402 422 dde786 411->422 416 dde7a0-dde7aa 412->416 417 dde7e9-dde7fa 413->417 420 dde7b0-dde7b4 416->420 421 dde800-dde804 417->421 423 dde7cd-dde7e0 420->423 424 dde7b6-dde7bf 420->424 425 dde834-dde846 421->425 426 dde806-dde80f 421->426 422->380 423->413 423->416 424->420 430 dde7c1-dde7cb 424->430 428 dde899-dde8ba GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 425->428 429 dde848-dde875 GdipCreateBitmapFromScan0 GdipSaveImageToStream 425->429 426->421 427 dde811-dde813 426->427 427->380 431 dde819 427->431 432 dde8e4-dde8ec GdipDisposeImage 428->432 434 dde8bc-dde8c4 GdipDisposeImage 428->434 429->432 433 dde877-dde87f GdipDisposeImage 429->433 430->417 435 dde820-dde82d call df7e4b 431->435 436 dde8ff-dde901 432->436 437 dde8ee 432->437 433->380 438 dde885-dde892 call df7e4b 433->438 434->380 439 dde8ca 434->439 449 dde82f 435->449 436->384 442 dde8f0-dde8fd call df7e4b 437->442 451 dde894 438->451 440 dde8d0-dde8dd call df7e4b 439->440 452 dde8df 440->452 442->436 449->380 451->380 452->380
                                                        APIs
                                                          • Part of subcall function 00DDE4B0: InitializeCriticalSectionEx.KERNEL32(00E38A08,00000000,00000000), ref: 00DDE502
                                                          • Part of subcall function 00DDE4B0: GetLastError.KERNEL32 ref: 00DDE50C
                                                        • EnterCriticalSection.KERNEL32(00000004,AA85FA48,00000004,00000000), ref: 00DDE668
                                                        • GdiplusStartup.GDIPLUS(00000000,00000001,?), ref: 00DDE698
                                                        • LeaveCriticalSection.KERNEL32(00000004), ref: 00DDE6A3
                                                        • LeaveCriticalSection.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00DDE6D2
                                                        • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 00DDE6E0
                                                        • GdipGetImageEncoders.GDIPLUS(?,?,00000008), ref: 00DDE765
                                                        • GdipCreateBitmapFromScan0.GDIPLUS(?,?,00000000,0026200A,?,?), ref: 00DDE859
                                                        • GdipSaveImageToStream.GDIPLUS(00000000,00000000,?,00000000), ref: 00DDE86C
                                                        • GdipDisposeImage.GDIPLUS(00000000), ref: 00DDE877
                                                        • GdipCreateBitmapFromHBITMAP.GDIPLUS(00000001,00000000,?), ref: 00DDE89E
                                                        • GdipSaveImageToStream.GDIPLUS(00000000,00000000,?,00000000), ref: 00DDE8B1
                                                        • GdipDisposeImage.GDIPLUS(00000000), ref: 00DDE8BC
                                                        • GdipDisposeImage.GDIPLUS(00000000), ref: 00DDE8E4
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Gdip$Image$CriticalSection$Dispose$BitmapCreateEncodersFromLeaveSaveStream$EnterErrorGdiplusInitializeLastScan0SizeStartup
                                                        • String ID:
                                                        • API String ID: 2917759359-0
                                                        • Opcode ID: 3ad860faa81d0175225c260a23cba0b1caf996991b81b526ba535b87439dc999
                                                        • Instruction ID: ffd87545a921020ca6426dde7dab589fe9fff700ee2d6a9629c9200e69d72c09
                                                        • Opcode Fuzzy Hash: 3ad860faa81d0175225c260a23cba0b1caf996991b81b526ba535b87439dc999
                                                        • Instruction Fuzzy Hash: 9791AB76D00219DFDB20AFA1D844BAEB7B4EF54710F29452AE905BB361E730EC45CBA0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 564 e18e34-e18e64 call e18c10 567 e18e66-e18e71 call dfcbe0 564->567 568 e18e7f-e18e8b call e09e9e 564->568 573 e18e73-e18e7a call dfcbf3 567->573 574 e18ea4-e18eed call e18b7b 568->574 575 e18e8d-e18ea2 call dfcbe0 call dfcbf3 568->575 584 e19159-e1915d 573->584 582 e18f5a-e18f63 GetFileType 574->582 583 e18eef-e18ef8 574->583 575->573 589 e18f65-e18f96 GetLastError call dfcb99 CloseHandle 582->589 590 e18fac-e18faf 582->590 587 e18efa-e18efe 583->587 588 e18f2f-e18f55 GetLastError call dfcb99 583->588 587->588 593 e18f00-e18f2d call e18b7b 587->593 588->573 589->573 601 e18f9c-e18fa7 call dfcbf3 589->601 591 e18fb1-e18fb6 590->591 592 e18fb8-e18fbe 590->592 596 e18fc2-e19010 call e09de9 591->596 592->596 597 e18fc0 592->597 593->582 593->588 607 e19012-e1901e call e18d8a 596->607 608 e1902f-e19057 call e1892d 596->608 597->596 601->573 607->608 615 e19020 607->615 613 e19059-e1905a 608->613 614 e1905c-e1909d 608->614 616 e19022-e1902a call e00871 613->616 617 e1909f-e190a3 614->617 618 e190be-e190cc 614->618 615->616 616->584 617->618 619 e190a5-e190b9 617->619 620 e190d2-e190d6 618->620 621 e19157 618->621 619->618 620->621 624 e190d8-e1910b CloseHandle call e18b7b 620->624 621->584 627 e1910d-e19139 GetLastError call dfcb99 call e09fb1 624->627 628 e1913f-e19153 624->628 627->628 628->621
                                                        APIs
                                                          • Part of subcall function 00E18B7B: CreateFileW.KERNEL32(00000000,00000000,?,00E18EDD,?,?,00000000,?,00E18EDD,00000000,0000000C), ref: 00E18B98
                                                        • GetLastError.KERNEL32 ref: 00E18F48
                                                        • __dosmaperr.LIBCMT ref: 00E18F4F
                                                        • GetFileType.KERNEL32(00000000), ref: 00E18F5B
                                                        • GetLastError.KERNEL32 ref: 00E18F65
                                                        • __dosmaperr.LIBCMT ref: 00E18F6E
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E18F8E
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E190DB
                                                        • GetLastError.KERNEL32 ref: 00E1910D
                                                        • __dosmaperr.LIBCMT ref: 00E19114
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                        • String ID: H
                                                        • API String ID: 4237864984-2852464175
                                                        • Opcode ID: b0d44a7eacad708459daeceaf40a8ce0a2cd34cd1fc968e2af7da681dc44221b
                                                        • Instruction ID: d336cdf428e991fab1a05e82e728785b3a0408bd4af9070ddd079f6c250455a3
                                                        • Opcode Fuzzy Hash: b0d44a7eacad708459daeceaf40a8ce0a2cd34cd1fc968e2af7da681dc44221b
                                                        • Instruction Fuzzy Hash: E4A16632A141589FDF299F68DC96BED3BA1EB0A314F14114DF811BB3D2CB318896CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 633 e03209-e03219 634 e03233-e03235 633->634 635 e0321b-e0322e call dfcbe0 call dfcbf3 633->635 636 e03589-e03596 call dfcbe0 call dfcbf3 634->636 637 e0323b-e03241 634->637 649 e035a1 635->649 655 e0359c call df4b19 636->655 637->636 640 e03247-e03273 637->640 640->636 643 e03279-e03282 640->643 647 e03284-e03297 call dfcbe0 call dfcbf3 643->647 648 e0329c-e0329e 643->648 647->655 652 e032a4-e032a8 648->652 653 e03585-e03587 648->653 654 e035a4-e035a7 649->654 652->653 657 e032ae-e032b2 652->657 653->654 655->649 657->647 660 e032b4-e032cb 657->660 662 e03310-e03316 660->662 663 e032cd-e032d0 660->663 664 e032e7-e032fe call dfcbe0 call dfcbf3 call df4b19 662->664 665 e03318-e0331f 662->665 666 e032d2-e032da 663->666 667 e032df-e032e5 663->667 698 e034bc 664->698 671 e03321 665->671 672 e03323-e03341 call e0148b call e00703 * 2 665->672 668 e03390-e033a3 666->668 667->664 669 e03303-e0330e 667->669 675 e033a9-e033b5 668->675 676 e0345f-e03468 call e0a636 668->676 674 e0338d 669->674 671->672 704 e03343-e03359 call dfcbf3 call dfcbe0 672->704 705 e0335e-e03386 call e037af 672->705 674->668 675->676 680 e033bb-e033bd 675->680 689 e034d9 676->689 690 e0346a-e0347c 676->690 680->676 684 e033c3-e033e4 680->684 684->676 686 e033e6-e033fc 684->686 686->676 691 e033fe-e03400 686->691 694 e034dd-e034f3 ReadFile 689->694 690->689 695 e0347e-e0348d GetConsoleMode 690->695 691->676 696 e03402-e03425 691->696 699 e03551-e0355c GetLastError 694->699 700 e034f5-e034fb 694->700 695->689 701 e0348f-e03493 695->701 696->676 703 e03427-e0343d 696->703 702 e034bf-e034c9 call e00703 698->702 706 e03575-e03578 699->706 707 e0355e-e03570 call dfcbf3 call dfcbe0 699->707 700->699 708 e034fd 700->708 701->694 709 e03495-e034ad ReadConsoleW 701->709 702->654 703->676 711 e0343f-e03441 703->711 704->698 705->674 718 e034b5-e034bb call dfcb99 706->718 719 e0357e-e03580 706->719 707->698 715 e03500-e03512 708->715 716 e034ce-e034d7 709->716 717 e034af GetLastError 709->717 711->676 721 e03443-e0345a 711->721 715->702 725 e03514-e03518 715->725 716->715 717->718 718->698 719->702 721->676 730 e03531-e0353e 725->730 731 e0351a-e0352a call e02f23 725->731 732 e03540 call e0307a 730->732 733 e0354a-e0354f call e02d7b 730->733 742 e0352d-e0352f 731->742 740 e03545-e03548 732->740 733->740 740->742 742->702
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3907804496
                                                        • Opcode ID: f768000212527d69b40971149dc2f8fc733a335f3ea182ce6aae2c3cbed57d85
                                                        • Instruction ID: d9842a716ba765059b28f3e2871b73d4af60828732666ea66b493bc7eda48611
                                                        • Opcode Fuzzy Hash: f768000212527d69b40971149dc2f8fc733a335f3ea182ce6aae2c3cbed57d85
                                                        • Instruction Fuzzy Hash: FAB121B0A0424DAFDB11DFA9C881BAEBBB9AF45304F149148E511BB3D2C770DE85CB61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 808 de1250-de1317 call e113c0 GetModuleHandleW 811 de1319-de1327 GetProcAddress 808->811 812 de1332-de13ac call dc9e80 GetNativeSystemInfo 808->812 811->812 813 de1329-de132f 811->813 816 de13b2-de13df 812->816 813->812 816->816 817 de13e1-de14fd call dd4190 call dea490 call dd1260 816->817 824 de152e-de1556 817->824 825 de14ff-de150e 817->825 826 de1558-de1567 824->826 827 de1587-de15b0 824->827 828 de1524-de152b call e0fc2f 825->828 829 de1510-de151e 825->829 832 de157d-de1584 call e0fc2f 826->832 833 de1569-de1577 826->833 834 de16e9-de16f1 827->834 835 de15b6-de15b9 827->835 828->824 829->828 830 de4f83 call df4b29 829->830 846 de4f88 call df4b29 830->846 832->827 833->830 833->832 836 de16f7-de173c call dd8840 call dea490 call dd1260 834->836 837 de17e1-de1815 GetProductInfo 834->837 841 de15c0-de15ed 835->841 864 de173e-de174d 836->864 865 de176d-de1795 836->865 843 de467c-de47ed 837->843 844 de181b 837->844 841->841 847 de15ef-de1644 call dd4190 call dea490 call dd1260 841->847 843->830 844->843 852 de4f8d-de4f98 call df4b29 * 2 846->852 869 de1646-de1655 847->869 870 de1675-de169d 847->870 867 de4f9a-de4fca 852->867 868 de4fe0-de501c 852->868 871 de174f-de175d 864->871 872 de1763-de176a call e0fc2f 864->872 873 de17c6-de17da 865->873 874 de1797-de17a6 865->874 867->868 875 de501e-de5063 868->875 876 de5064-de50df 868->876 877 de166b-de1672 call e0fc2f 869->877 878 de1657-de1665 869->878 879 de16ce-de16e2 870->879 880 de169f-de16ae 870->880 871->852 871->872 872->865 873->837 882 de17bc-de17c3 call e0fc2f 874->882 883 de17a8-de17b6 874->883 875->876 877->870 878->846 878->877 879->834 887 de16c4-de16cb call e0fc2f 880->887 888 de16b0-de16be 880->888 882->873 883->852 883->882 887->879 888->846 888->887
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,AA85FA48), ref: 00DE130F
                                                        • GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 00DE131F
                                                        • GetNativeSystemInfo.KERNEL32(?,00E2BB63,00000000), ref: 00DE139D
                                                        • GetProductInfo.KERNEL32(?,?,?,?,?,00000000,?), ref: 00DE1804
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Info$AddressHandleModuleNativeProcProductSystem
                                                        • String ID: RtlGetVersion$ntdll.dll
                                                        • API String ID: 3292286288-1489217083
                                                        • Opcode ID: 9f645340595e9fa24eb439a739a581d315ac07b13edd41ccc5c4a58a4f9bbaff
                                                        • Instruction ID: b06689641772ba1312b638398d4418af476e5f86a8d145a1365af838d0e7a110
                                                        • Opcode Fuzzy Hash: 9f645340595e9fa24eb439a739a581d315ac07b13edd41ccc5c4a58a4f9bbaff
                                                        • Instruction Fuzzy Hash: 7232ADB4E012688FEB29CF28CC95BE9BBB1FF45314F0042E9D848AB291D7355A95CF51

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 894 dfee37-dfee43 895 dfeed5-dfeed8 894->895 896 dfeede 895->896 897 dfee48-dfee59 895->897 898 dfeee0-dfeee4 896->898 899 dfee5b-dfee5e 897->899 900 dfee66-dfee7f LoadLibraryExW 897->900 901 dfeefe-dfef00 899->901 902 dfee64 899->902 903 dfeee5-dfeef5 900->903 904 dfee81-dfee8a GetLastError 900->904 901->898 906 dfeed2 902->906 903->901 905 dfeef7-dfeef8 FreeLibrary 903->905 907 dfee8c-dfee9e call e08773 904->907 908 dfeec3-dfeed0 904->908 905->901 906->895 907->908 911 dfeea0-dfeeb2 call e08773 907->911 908->906 911->908 914 dfeeb4-dfeec1 LoadLibraryExW 911->914 914->903 914->908
                                                        APIs
                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,AA85FA48,?,00DFEF44,?,?,?,00000000), ref: 00DFEEF8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID: api-ms-$ext-ms-
                                                        • API String ID: 3664257935-537541572
                                                        • Opcode ID: 4f9d2ad0224c837c60192d703b62e2f84874f190c887b42880695075a97a0455
                                                        • Instruction ID: 329c8c936fea5c7be1fc70d5774d5cd2a73638b489d9963e0d3f6114af018c00
                                                        • Opcode Fuzzy Hash: 4f9d2ad0224c837c60192d703b62e2f84874f190c887b42880695075a97a0455
                                                        • Instruction Fuzzy Hash: 1821E771A01229AFD7319B25FC44E6A7758DB52760F2A4161FE81B72E0DB30EE05C6F0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 915 deae60-deae8c 916 deae8e-deae98 915->916 917 deaeba-deaed1 915->917 918 deae9a-deaea8 916->918 919 deaeb0-deaeb2 call e0fc2f 916->919 920 deaed3-deaede 917->920 921 deaf11-deaf1c 917->921 924 deaeae 918->924 925 deaf50-deafb6 call df4b29 918->925 931 deaeb7 919->931 927 deaef2-deaef4 call e0fc2f 920->927 928 deaee0-deaeee 920->928 922 deaf1e-deaf3b call dd93d0 921->922 923 deaf40-deaf4f 921->923 922->923 924->919 936 deafbc-deaff6 call e113c0 925->936 937 deb2d7-deb30e call def220 call dec4a0 925->937 935 deaef9-deaf0a 927->935 928->925 932 deaef0 928->932 931->917 932->927 935->921 943 deaff8-deb00a 936->943 944 deb010-deb047 call debca0 call dee3d0 call dec4a0 936->944 945 deb313-deb319 937->945 943->944 972 deb04d-deb0df call dc9e80 call debdf0 call deef30 call dec370 944->972 973 deb201-deb205 944->973 947 deb31f-deb3bf call dc9e80 call debdf0 call deef30 call dec370 945->947 948 deb4e7-deb4eb 945->948 1001 deb5fc-deb614 call de9510 call e134a6 947->1001 1002 deb3c5-deb3d2 947->1002 951 deb5a7-deb5ac 948->951 952 deb4f1-deb559 call dd1990 call dd15f0 948->952 956 deb5ae-deb5be 951->956 957 deb587-deb5a4 call e0f67d 951->957 952->957 982 deb55b-deb56b 952->982 961 deb57d-deb584 call e0fc2f 956->961 962 deb5c0-deb5ce 956->962 961->957 962->961 968 deb5d0 call df4b29 962->968 981 deb5d5-deb5f2 call de9510 call e134a6 968->981 972->981 1027 deb0e5-deb0f2 972->1027 978 deb25b-deb25e 973->978 979 deb207-deb259 call dd1990 973->979 986 deb2c7-deb2d2 call deba80 978->986 987 deb260-deb2b2 call dd1990 978->987 997 deb2b6-deb2c2 call dd15f0 979->997 1005 deb5f7 call df4b29 981->1005 982->961 989 deb56d-deb57b 982->989 986->957 987->997 989->961 989->968 997->986 1016 deb619-deb61f call df4b29 1001->1016 1008 deb3d4-deb3e3 1002->1008 1009 deb403-deb45d call e11018 * 2 1002->1009 1005->1001 1014 deb3f9-deb400 call e0fc2f 1008->1014 1015 deb3e5-deb3f3 1008->1015 1028 deb48e-deb4b6 1009->1028 1029 deb45f-deb46e 1009->1029 1014->1009 1015->1014 1015->1016 1030 deb0f4-deb103 1027->1030 1031 deb123-deb17d call e11018 * 2 1027->1031 1028->948 1035 deb4b8-deb4c7 1028->1035 1033 deb484-deb48b call e0fc2f 1029->1033 1034 deb470-deb47e 1029->1034 1036 deb119-deb120 call e0fc2f 1030->1036 1037 deb105-deb113 1030->1037 1049 deb1ae-deb1d3 1031->1049 1050 deb17f-deb18e 1031->1050 1033->1028 1034->1016 1034->1033 1041 deb4dd-deb4e4 call e0fc2f 1035->1041 1042 deb4c9-deb4d7 1035->1042 1036->1031 1037->1005 1037->1036 1041->948 1042->1016 1042->1041 1049->973 1053 deb1d5-deb1e1 1049->1053 1051 deb1a4-deb1ab call e0fc2f 1050->1051 1052 deb190-deb19e 1050->1052 1051->1049 1052->1005 1052->1051 1055 deb1f7-deb1fe call e0fc2f 1053->1055 1056 deb1e3-deb1f1 1053->1056 1055->973 1056->1005 1056->1055
                                                        APIs
                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00DEB14F
                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00DEB168
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ___std_exception_destroy
                                                        • String ID: value
                                                        • API String ID: 4194217158-494360628
                                                        • Opcode ID: 1305496e4dfc9ac95ce41c0062480a9f34487a5e73f1d191f81a3453f76964e3
                                                        • Instruction ID: f5bd73f2e87eec70fa0c02ee97c40efd39af3abc8e741029fdcdac19788c216e
                                                        • Opcode Fuzzy Hash: 1305496e4dfc9ac95ce41c0062480a9f34487a5e73f1d191f81a3453f76964e3
                                                        • Instruction Fuzzy Hash: C222F2709002988FDB24DB29CC95BAEFBB5EF45310F1482DEE449A7782D7746A84CF61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1060 df9345-df9353 1061 df9368-df9378 1060->1061 1062 df9355-df9366 call dfcbf3 call df4b19 1060->1062 1063 df938d-df9393 1061->1063 1064 df937a-df938b call dfcbf3 call df4b19 1061->1064 1082 df93bb-df93bd 1062->1082 1067 df939b-df93a1 1063->1067 1068 df9395 1063->1068 1087 df93ba 1064->1087 1074 df93be call e04824 1067->1074 1075 df93a3 1067->1075 1072 df93ad-df93b7 call dfcbf3 1068->1072 1073 df9397-df9399 1068->1073 1085 df93b9 1072->1085 1073->1067 1073->1072 1083 df93c3-df93d8 call e03c18 1074->1083 1075->1072 1079 df93a5-df93ab 1075->1079 1079->1072 1079->1074 1089 df93de-df93ea call e03c44 1083->1089 1090 df95c9-df95d3 call df4b46 1083->1090 1085->1087 1087->1082 1089->1090 1095 df93f0-df93fc call e03c70 1089->1095 1095->1090 1098 df9402-df9417 1095->1098 1099 df9419 1098->1099 1100 df9487-df9492 call e03f1b 1098->1100 1101 df941b-df9421 1099->1101 1102 df9423-df943f call e03f1b 1099->1102 1100->1085 1106 df9498-df94a3 1100->1106 1101->1100 1101->1102 1102->1085 1110 df9445-df9448 1102->1110 1108 df94bf 1106->1108 1109 df94a5-df94ae call e04881 1106->1109 1112 df94c2-df94d6 call e10240 1108->1112 1109->1108 1118 df94b0-df94bd 1109->1118 1113 df944e-df9457 call e04881 1110->1113 1114 df95c2-df95c4 1110->1114 1121 df94d8-df94e0 1112->1121 1122 df94e3-df950a call e100b0 call e10240 1112->1122 1113->1114 1123 df945d-df9475 call e03f1b 1113->1123 1114->1085 1118->1112 1121->1122 1131 df950c-df9515 1122->1131 1132 df9518-df953f call e100b0 call e10240 1122->1132 1123->1085 1128 df947b-df9482 1123->1128 1128->1114 1131->1132 1137 df954d-df955c call e100b0 1132->1137 1138 df9541-df954a 1132->1138 1141 df955e 1137->1141 1142 df9584-df95a2 1137->1142 1138->1137 1145 df9564-df9578 1141->1145 1146 df9560-df9562 1141->1146 1143 df95bf 1142->1143 1144 df95a4-df95bd 1142->1144 1143->1114 1144->1114 1145->1114 1146->1145 1147 df957a-df957c 1146->1147 1147->1114 1148 df957e 1147->1148 1148->1142 1149 df9580-df9582 1148->1149 1149->1114 1149->1142
                                                        APIs
                                                        • __allrem.LIBCMT ref: 00DF94CD
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DF94E9
                                                        • __allrem.LIBCMT ref: 00DF9500
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DF951E
                                                        • __allrem.LIBCMT ref: 00DF9535
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DF9553
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                        • String ID:
                                                        • API String ID: 1992179935-0
                                                        • Opcode ID: 3f5abee0268a5959bc4f93c338f3e46f71e127576a76c8be2f82913b75157386
                                                        • Instruction ID: cb13299e50ff890e9387de7cc4405a06725e52467e7c0a5da030b9c09f5b1884
                                                        • Opcode Fuzzy Hash: 3f5abee0268a5959bc4f93c338f3e46f71e127576a76c8be2f82913b75157386
                                                        • Instruction Fuzzy Hash: 5A81E2B1A0070A9BE725AE78CC92B7AF3E8AF40320F25C529F615D63C1E770DA418760

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1150 dc7ed0-dc7f0c 1151 dc7f0e 1150->1151 1152 dc7f10 1150->1152 1151->1152 1153 dc7f13-dc7f1c 1152->1153 1153->1153 1154 dc7f1e-dc7f22 1153->1154 1155 dc7f28-dc7f2b 1154->1155 1156 dc8014 1154->1156 1155->1156 1158 dc7f31-dc7f6b call dd42b0 call dc6fa0 1155->1158 1157 dc8019-dc802a 1156->1157 1163 dc7f6d-dc7f7f 1158->1163 1164 dc7f9f-dc7fa3 1158->1164 1165 dc7f95-dc7f9c call e0fc2f 1163->1165 1166 dc7f81-dc7f8f 1163->1166 1167 dc7fa5 1164->1167 1168 dc7fa7-dc7fb4 call e149cf 1164->1168 1165->1164 1166->1165 1170 dc802b-dc8030 call df4b29 1166->1170 1167->1168 1175 dc7fed-dc7ff0 1168->1175 1176 dc7fb6-dc7fc1 call dc6f60 1168->1176 1175->1157 1179 dc7ff2-dc8013 1175->1179 1181 dc7fd9-dc7fec 1176->1181 1182 dc7fc3-dc7fc5 call e1498e 1176->1182 1184 dc7fca-dc7fcc 1182->1184 1184->1157 1185 dc7fce-dc7fd7 call dc6f60 1184->1185 1185->1181 1185->1182
                                                        APIs
                                                        • ___std_fs_directory_iterator_open@12.LIBCPMT ref: 00DC7FAD
                                                        • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 00DC7FC5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ___std_fs_directory_iterator_advance@8___std_fs_directory_iterator_open@12
                                                        • String ID: .$directory_iterator::directory_iterator
                                                        • API String ID: 3016148460-1999878393
                                                        • Opcode ID: f43693e7260e197ea0e92bce0b5a3877c4fa2359db99ddf052fb2479d8d7c964
                                                        • Instruction ID: 0c20e8470b61c3bbc99e1e28483912967b3cc5b38904871e7fc6b4bd3a25c585
                                                        • Opcode Fuzzy Hash: f43693e7260e197ea0e92bce0b5a3877c4fa2359db99ddf052fb2479d8d7c964
                                                        • Instruction Fuzzy Hash: B941D332A0420A9BCF18DF58E881FAEB7B5EF84325F14456DED05A7781E735A904CBB0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1188 dc81e0-dc8289 call dd25f0 call dc7dc0 call e1498e 1196 dc828e-dc8291 1188->1196 1197 dc82de-dc82f0 1196->1197 1198 dc8293-dc8295 1196->1198 1201 dc82f2-dc82fc 1197->1201 1202 dc8313-dc8329 call e0f67d 1197->1202 1199 dc832a-dc8336 call dc7c80 1198->1199 1200 dc829b-dc82c2 call dc8040 1198->1200 1200->1197 1201->1202 1204 dc82fe-dc830a 1201->1204 1204->1202 1211 dc830c-dc830e 1204->1211 1211->1202
                                                        APIs
                                                        • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 00DC8289
                                                        Strings
                                                        • ., xrefs: 00DC829B
                                                        • directory_iterator::operator++, xrefs: 00DC832C
                                                        • directory_iterator::directory_iterator, xrefs: 00DC8249
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ___std_fs_directory_iterator_advance@8
                                                        • String ID: .$directory_iterator::directory_iterator$directory_iterator::operator++
                                                        • API String ID: 2610647541-1968560579
                                                        • Opcode ID: 051a3ee1ab0742e6a749b8b4c5050fd2f73756f3d8b2e7dec49670bc16fdfccc
                                                        • Instruction ID: 81fa1d329b9a6c3a81a7c0cacdb4257762d2e6b3aa3d4b8edf7f0e027a3bb783
                                                        • Opcode Fuzzy Hash: 051a3ee1ab0742e6a749b8b4c5050fd2f73756f3d8b2e7dec49670bc16fdfccc
                                                        • Instruction Fuzzy Hash: C0318171A046069BC720DF69C845F6BF7E4EF84710F14462DE865D7790EB75AC048BE1
                                                        APIs
                                                        • RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,00000000,AA85FA48,00000000,?), ref: 00DE555B
                                                        • RegQueryValueExA.KERNEL32(00000000,?,00000000,000F003F,?,00000400,?,?,00000000,00020019,00000000,AA85FA48,00000000,?), ref: 00DE558F
                                                        • RegCloseKey.ADVAPI32(00000000,?,?,00000000,00020019,00000000,AA85FA48,00000000,?), ref: 00DE5681
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID:
                                                        • API String ID: 3677997916-0
                                                        • Opcode ID: e348b407159665c0f8fbb4d8ae1b556ab5aa64807e7462d9f8f7a3caa83c6de8
                                                        • Instruction ID: a802ae5077c7000b9d4c0be7c0625326516fd6674560b729698d35c2806b899c
                                                        • Opcode Fuzzy Hash: e348b407159665c0f8fbb4d8ae1b556ab5aa64807e7462d9f8f7a3caa83c6de8
                                                        • Instruction Fuzzy Hash: 0171C4B1A006189BDB34DF24DC44BAAB7F9FF44304F40469DE649A7681E770AAC4CFA4
                                                        APIs
                                                        • GetCurrentHwProfileW.ADVAPI32(?), ref: 00DE63CB
                                                        • EnumDisplayDevicesW.USER32(00000000,00000000,00000348,00000001), ref: 00DE67C6
                                                          • Part of subcall function 00DD8840: CryptUnprotectData.CRYPT32(AA85FA48,00000000,00000000,00000000,00000000,00000001,?), ref: 00DD8A50
                                                          • Part of subcall function 00DE1250: GetModuleHandleW.KERNEL32(ntdll.dll,AA85FA48), ref: 00DE130F
                                                          • Part of subcall function 00DE1250: GetProcAddress.KERNEL32(00000000,RtlGetVersion), ref: 00DE131F
                                                          • Part of subcall function 00DE1250: GetNativeSystemInfo.KERNEL32(?,00E2BB63,00000000), ref: 00DE139D
                                                          • Part of subcall function 00DE0E60: GetUserNameW.ADVAPI32(?,?), ref: 00DE0E9E
                                                          • Part of subcall function 00DE0F00: GetComputerNameW.KERNEL32(?,?), ref: 00DE0F3E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Name$AddressComputerCryptCurrentDataDevicesDisplayEnumHandleInfoModuleNativeProcProfileSystemUnprotectUser
                                                        • String ID: Unknown
                                                        • API String ID: 509233729-1654365787
                                                        • Opcode ID: 8cf9afc6c533a24e31339f4e9ec1b313272d015febe30e54de7cc713ecba66a0
                                                        • Instruction ID: 5554a0ce50ae3b741bef07ec8ed42f168255ede47f2494beb5665ecbc18d05bc
                                                        • Opcode Fuzzy Hash: 8cf9afc6c533a24e31339f4e9ec1b313272d015febe30e54de7cc713ecba66a0
                                                        • Instruction Fuzzy Hash: 74125870E006688FDB25DF69CD847EEBBB5EB58300F1481A9D819B7241D730AE85CFA0
                                                        APIs
                                                          • Part of subcall function 00E00703: RtlFreeHeap.NTDLL(00000000,00000000,?,00E0807B,?,00000000,?,?,00E0831C,?,00000007,?,?,00E06AFA,?,?), ref: 00E00719
                                                          • Part of subcall function 00E00703: GetLastError.KERNEL32(?,?,00E0807B,?,00000000,?,?,00E0831C,?,00000007,?,?,00E06AFA,?,?), ref: 00E00724
                                                        • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00E047C5,00000000,00000000,00000000), ref: 00E04684
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorFreeHeapInformationLastTimeZone
                                                        • String ID: Eastern Standard Time$Eastern Summer Time
                                                        • API String ID: 3335090040-239921721
                                                        • Opcode ID: f5f30128f86bc59bdd1b4273f5af7a8bf4a390c98061f300bb0511c56a24c0fa
                                                        • Instruction ID: 8e50333e18d81130fe239d023ab07e8ee6c4b479487cea1db16f6efbc6b43df8
                                                        • Opcode Fuzzy Hash: f5f30128f86bc59bdd1b4273f5af7a8bf4a390c98061f300bb0511c56a24c0fa
                                                        • Instruction Fuzzy Hash: 9741D8F1900215AFCB20BF75DD4698ABFF8EF06710B1561A6F554B71E1EB309A84CB90
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DD140B
                                                        • ___std_exception_copy.LIBVCRUNTIME ref: 00DD143F
                                                        • ___std_exception_copy.LIBVCRUNTIME ref: 00DD1466
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ___std_exception_copy$Concurrency::cancel_current_task
                                                        • String ID:
                                                        • API String ID: 3727464891-0
                                                        • Opcode ID: ae2c2245d5aab6527436f30dedd7da9b121d7bbc0d6444c6a015e38b72eb544e
                                                        • Instruction ID: 4682e37111697bf5fd752d625082df8edf0f74aacee8d09aff1bea452d348892
                                                        • Opcode Fuzzy Hash: ae2c2245d5aab6527436f30dedd7da9b121d7bbc0d6444c6a015e38b72eb544e
                                                        • Instruction Fuzzy Hash: FC41F2B6A04305ABC704DF69D84169AB3E8FF54310B14472BE81597741EB71E99087B1
                                                        APIs
                                                        • GetUserGeoID.KERNEL32(00000010), ref: 00DE05E5
                                                        • GetGeoInfoA.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00DE05F7
                                                        • GetGeoInfoA.KERNEL32(?,00000004,?,00000000,00000000), ref: 00DE064F
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Info$User
                                                        • String ID:
                                                        • API String ID: 2017065092-0
                                                        • Opcode ID: 6c9b0f1dde0d02dd6903c6d0677d0187fbb3120be611003dfb55362b2412aaa5
                                                        • Instruction ID: 62a5ca418cb994dbe0de6a53ec8825ec3947a005d003e8948e5c293ed877620d
                                                        • Opcode Fuzzy Hash: 6c9b0f1dde0d02dd6903c6d0677d0187fbb3120be611003dfb55362b2412aaa5
                                                        • Instruction Fuzzy Hash: EE216A70A40305ABE7208F65CC09B5BBBF8EB44B14F100A1EF201AB2C0D7B565488BA1
                                                        APIs
                                                        • CreateThread.KERNEL32(00000000,00000000,Function_00065282,00000000,00000000,00000000), ref: 00DF5427
                                                        • GetLastError.KERNEL32(?,?,?,?,00DD9B51,00000000,00000000), ref: 00DF5433
                                                        • __dosmaperr.LIBCMT ref: 00DF543A
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CreateErrorLastThread__dosmaperr
                                                        • String ID:
                                                        • API String ID: 2744730728-0
                                                        • Opcode ID: 504adfbbd69fda12d74672330323a04ae6211d02759a11fce65a14dbe0489deb
                                                        • Instruction ID: 90e78f1951472584442ddf538f77ce9959b1995717cd50ef3990b4a43d7215f5
                                                        • Opcode Fuzzy Hash: 504adfbbd69fda12d74672330323a04ae6211d02759a11fce65a14dbe0489deb
                                                        • Instruction Fuzzy Hash: 96018C7251060DAFDF159FA4EC06ABE3BA8EF00355F06C158FB02A6194DB71CA50DBB0
                                                        APIs
                                                          • Part of subcall function 00DFD382: GetLastError.KERNEL32(00000000,?,00DFCBF8,00E00C7F,?,?,00DFD27E,00000001,00000364,?,00000006,000000FF,?,00DF52A7,00E33790,0000000C), ref: 00DFD386
                                                          • Part of subcall function 00DFD382: SetLastError.KERNEL32(00000000), ref: 00DFD428
                                                        • CloseHandle.KERNEL32(?,?,?,00DF546E,?,?,00DF52E0,00000000), ref: 00DF5368
                                                        • FreeLibraryAndExitThread.KERNEL32(?,?,?,?,00DF546E,?,?,00DF52E0,00000000), ref: 00DF537E
                                                        • ExitThread.KERNEL32 ref: 00DF5387
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
                                                        • String ID:
                                                        • API String ID: 1991824761-0
                                                        • Opcode ID: f8cbaffade2f3d1190b7181ed5cd78790f96a1f2a70cfc16abfc98e2cb28d67e
                                                        • Instruction ID: d2193c85ed5d4fdcb6b560ce22666ccfcc88978f41a9b975cdd470b9ace38654
                                                        • Opcode Fuzzy Hash: f8cbaffade2f3d1190b7181ed5cd78790f96a1f2a70cfc16abfc98e2cb28d67e
                                                        • Instruction Fuzzy Hash: F6F03031100E086FDB255BA9A808F7A3AD9AF003A5F1FCA54FB25964E5D760DD458770
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000002,?,00E00E53,00DFCEF2,00DFCEF2,?,00000002,AA85FA48,00DFCEF2,00000002), ref: 00E00E6A
                                                        • TerminateProcess.KERNEL32(00000000,?,00E00E53,00DFCEF2,00DFCEF2,?,00000002,AA85FA48,00DFCEF2,00000002), ref: 00E00E71
                                                        • ExitProcess.KERNEL32 ref: 00E00E83
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: f70387641a4284849991325ec0d6758f517c69dd1533482f9c65148da769a79d
                                                        • Instruction ID: 311403c14450bdcfe68f936ccf6050431d8700a1e75e8477f605c9631a086ec4
                                                        • Opcode Fuzzy Hash: f70387641a4284849991325ec0d6758f517c69dd1533482f9c65148da769a79d
                                                        • Instruction Fuzzy Hash: 47D09E31004108AFDF512F61DC0DF5D3F66BF40345F445824B949760B2CB329997DA90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: j
                                                        • API String ID: 0-1273469241
                                                        • Opcode ID: 58af4332bdc68cba074db89a8f46ddab6d016cb9d74836d6966209ced73a0d03
                                                        • Instruction ID: 94630879fdac284ce9130a5db7c37440a67186a3e2cea50ab53c4f9fe51ef143
                                                        • Opcode Fuzzy Hash: 58af4332bdc68cba074db89a8f46ddab6d016cb9d74836d6966209ced73a0d03
                                                        • Instruction Fuzzy Hash: 63B1B371D002089BDB15DFA8C885BADFBF5EF48310F24416EE915A7791EB34AA45CBB0
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DF0CE7
                                                        Strings
                                                        • number overflow parsing ', xrefs: 00DF0D87
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task
                                                        • String ID: number overflow parsing '
                                                        • API String ID: 118556049-3802681121
                                                        • Opcode ID: f1e33bed2217ea62b1fd024e3f80c62d371fa1ea5e1aeeea4c3f59e84e07e110
                                                        • Instruction ID: 11ab8d677e19c1b06d77504686a2258bbae94c74f600891b722fe085128ecd0b
                                                        • Opcode Fuzzy Hash: f1e33bed2217ea62b1fd024e3f80c62d371fa1ea5e1aeeea4c3f59e84e07e110
                                                        • Instruction Fuzzy Hash: E4A1D171A002099FCB18CF28C84077ABBF5FF05314F298769E9659B382D731E945CBA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3916222277
                                                        • Opcode ID: e363e004baaf9aa4f74822eb2301230b722e37287931cdc1b104b6144e399064
                                                        • Instruction ID: 64dbc8774dfbd8cea743d50ea0005f94148bb44160b138442e0a6e58d6aae2d1
                                                        • Opcode Fuzzy Hash: e363e004baaf9aa4f74822eb2301230b722e37287931cdc1b104b6144e399064
                                                        • Instruction Fuzzy Hash: AC51A27560064ADFC718DF69C4C0A99F7E1FF09320B18426AE859CBB91DB31ED60DBA0
                                                        APIs
                                                          • Part of subcall function 00DF4B7A: GetSystemTimeAsFileTime.KERNEL32(00DDA0DB,?,?,?,?,?,00DDA0DB,00000000,00000002,00000005,00000001,00000006), ref: 00DF4B8F
                                                          • Part of subcall function 00DF4B7A: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DF4BAE
                                                        • _strftime.LIBCMT ref: 00DE0E11
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Time$FileSystemUnothrow_t@std@@@__ehfuncinfo$??2@_strftime
                                                        • String ID: %d-%m-%Y, %H:%M:%S
                                                        • API String ID: 1658271636-3495478971
                                                        • Opcode ID: 6d08624d21e9567ad3098a59f1914ccb08f899ac9712c02fc32d56139d6287f3
                                                        • Instruction ID: e5ef911c6cbb709206747baeff941a3e7a1f9e75507f556f60e33a3fa6c11fc5
                                                        • Opcode Fuzzy Hash: 6d08624d21e9567ad3098a59f1914ccb08f899ac9712c02fc32d56139d6287f3
                                                        • Instruction Fuzzy Hash: ED01A171D0024C9ACB11EFE4C841AFEBBBCEF04700F10865EE541A7241EB756A498BE0
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DD3AD5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task
                                                        • String ID:
                                                        • API String ID: 118556049-0
                                                        • Opcode ID: 5c8b1b6e67e8f67c6ab61ab76cc089c4cef61ea0100a6b36e4fbfc78b56c0c48
                                                        • Instruction ID: a29f4241cc35a640db0e5a5a39687e677521bdb9409d52936527a73be5b4a057
                                                        • Opcode Fuzzy Hash: 5c8b1b6e67e8f67c6ab61ab76cc089c4cef61ea0100a6b36e4fbfc78b56c0c48
                                                        • Instruction Fuzzy Hash: B0815A32E001199BCB19DF6CDC815AEB7E5EF84350B1942BAE859EB342D630DE5187F2
                                                        APIs
                                                        • SHGetKnownFolderPath.SHELL32(00E27070,00000000,00000000,?), ref: 00DDE992
                                                        • CoTaskMemFree.OLE32(?), ref: 00DDE9AA
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeKnownPathTask
                                                        • String ID:
                                                        • API String ID: 969438705-0
                                                        • Opcode ID: 9044c2678f4147f69a0b1d5e8b7d2914559c28605ee61c177b07e5a044b73614
                                                        • Instruction ID: 1ae2c0e1d40470b842ff83d5be9ff710fd18457f4dab56f2adf3737bca95d472
                                                        • Opcode Fuzzy Hash: 9044c2678f4147f69a0b1d5e8b7d2914559c28605ee61c177b07e5a044b73614
                                                        • Instruction Fuzzy Hash: 2A116D71A003099FDB20DF65C905BABBBF8FF08704F104A1EE415A3690D7B56A448B91
                                                        APIs
                                                        • SetFilePointerEx.KERNEL32(00000000,00000000,00E33870,00E15542,00000002,00E15542,00000000,?,?,?,00E037D8,00000000,?,00E15542,00000002,00E33870), ref: 00E0370A
                                                        • GetLastError.KERNEL32(00E15542,?,?,?,00E037D8,00000000,?,00E15542,00000002,00E33870,00000000,00E15542,00000000,00E33870,0000000C,00DF866B), ref: 00E03717
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastPointer
                                                        • String ID:
                                                        • API String ID: 2976181284-0
                                                        • Opcode ID: ebe5b734e0964391c91d441fe834c5fc46a504a272b0523c29d88a62f902f400
                                                        • Instruction ID: b9f22bf906c6bcddc29f57b59da15fe52c3a46726f2b7c92cb4bb1a85c712929
                                                        • Opcode Fuzzy Hash: ebe5b734e0964391c91d441fe834c5fc46a504a272b0523c29d88a62f902f400
                                                        • Instruction Fuzzy Hash: D1012672614158AFCB15CF69DC0AC9E3B29EB84320F240109F811BB2E1E672EE91CB90
                                                        APIs
                                                        • GetLastError.KERNEL32(00E33790,0000000C), ref: 00DF5295
                                                        • ExitThread.KERNEL32 ref: 00DF529C
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorExitLastThread
                                                        • String ID:
                                                        • API String ID: 1611280651-0
                                                        • Opcode ID: d5f1123ea6a48b2c34c28809952390d9f7aed6bc33016192f3455281faca7a2e
                                                        • Instruction ID: f3b5ca665871d4a5a65f8b067e460a01906638324d7d742605571ee54e7cbf7e
                                                        • Opcode Fuzzy Hash: d5f1123ea6a48b2c34c28809952390d9f7aed6bc33016192f3455281faca7a2e
                                                        • Instruction Fuzzy Hash: F1F0C271A00608EFEB11ABB0D80AF7E7B75EF04710F154149F601BB2A2CB345986DBB0
                                                        APIs
                                                        • RtlFreeHeap.NTDLL(00000000,00000000,?,00E0807B,?,00000000,?,?,00E0831C,?,00000007,?,?,00E06AFA,?,?), ref: 00E00719
                                                        • GetLastError.KERNEL32(?,?,00E0807B,?,00000000,?,?,00E0831C,?,00000007,?,?,00E06AFA,?,?), ref: 00E00724
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 485612231-0
                                                        • Opcode ID: 300532a7198dd178378279c6f0ed38ac20e3690ab4e595943a1c5533ecda9e5a
                                                        • Instruction ID: e764dadb301685d0986e7be2d162857b2a251f6b55ab5d612e55018a1ed1e5dc
                                                        • Opcode Fuzzy Hash: 300532a7198dd178378279c6f0ed38ac20e3690ab4e595943a1c5533ecda9e5a
                                                        • Instruction Fuzzy Hash: B2E0863110420CAFEB212BA5AC09F553B58EB44395F159411F708AA1A1CB3598A0CBE4
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 66d599a79915f02b067fd2cb8a701f11ddb53414fb0596e34e8cad26a5bcac7c
                                                        • Instruction ID: f61e28dc4c7d25daa77123456ee72b384c4928af165a0d124cf057a1c17f1524
                                                        • Opcode Fuzzy Hash: 66d599a79915f02b067fd2cb8a701f11ddb53414fb0596e34e8cad26a5bcac7c
                                                        • Instruction Fuzzy Hash: DE519374A00108AFDF14CF58C889AA97FF1EF59324F29915DF9496B292D272DEC1CB90
                                                        APIs
                                                          • Part of subcall function 00DDEF90: ___std_fs_get_current_path@8.LIBCPMT ref: 00DDF033
                                                        • GetVolumeInformationW.KERNEL32(00000000,?,00000100,?,?,?,?,00000100,AA85FA48,?), ref: 00DE1039
                                                          • Part of subcall function 00DE0D00: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00DE0DA5
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: InformationIos_base_dtorVolume___std_fs_get_current_path@8std::ios_base::_
                                                        • String ID:
                                                        • API String ID: 3920510466-0
                                                        • Opcode ID: 46e0c46e799731974e2b726232f185dc975985dd01fdf88c0c8e545f77b8feb4
                                                        • Instruction ID: 6187cdfadbedb88b066a9ee842049199311a7fd95d30d0698d547c60fef64061
                                                        • Opcode Fuzzy Hash: 46e0c46e799731974e2b726232f185dc975985dd01fdf88c0c8e545f77b8feb4
                                                        • Instruction Fuzzy Hash: 41717C718012599BDB24DF24CC99BEAB7B4FF04304F1046E9E45967291DBB46BC8CFA0
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DD47B4
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task
                                                        • String ID:
                                                        • API String ID: 118556049-0
                                                        • Opcode ID: 5c67969e0850813bcbd20a94ffb59b4834a1594f9cdca26fa019d3763ce1f86b
                                                        • Instruction ID: 0d3b723b48711c09e90fb06ab1dd2316f1d6a9dd39ece952454796c1e9e4c761
                                                        • Opcode Fuzzy Hash: 5c67969e0850813bcbd20a94ffb59b4834a1594f9cdca26fa019d3763ce1f86b
                                                        • Instruction Fuzzy Hash: 3341E672A00119ABCB15EF6CCC816AEB7F5EF85300B1906AAE915E7341D730DD5187E1
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DD3517
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task
                                                        • String ID:
                                                        • API String ID: 118556049-0
                                                        • Opcode ID: 7a71a6aa1936c4af0662bae26868a9ee1ee95d6e5a6c1aa0aa59f8c388eb1193
                                                        • Instruction ID: d1ebdaf83b897d2a8348d16615e8ba8126292bbd27f5996cbed0b9f5d6dbdb77
                                                        • Opcode Fuzzy Hash: 7a71a6aa1936c4af0662bae26868a9ee1ee95d6e5a6c1aa0aa59f8c388eb1193
                                                        • Instruction Fuzzy Hash: F5310673E051145BCB19EE6C988156EB3E9EF84361719027BE816EB341EA30DE5187B2
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DF116A
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task
                                                        • String ID:
                                                        • API String ID: 118556049-0
                                                        • Opcode ID: f107be0cf85cd098fc2fb678e57460bf8139b04dbfdfcebca54bffe8f7f06728
                                                        • Instruction ID: 59673c8be37e170bd46c40c4adef1f4bb117bd052e0832f950538cd0d17e8f4e
                                                        • Opcode Fuzzy Hash: f107be0cf85cd098fc2fb678e57460bf8139b04dbfdfcebca54bffe8f7f06728
                                                        • Instruction Fuzzy Hash: E641F476A00108DFC718DE7CC88597EB7E9EF85350B29C269E915DB385EA30DD418771
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DD3C33
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task
                                                        • String ID:
                                                        • API String ID: 118556049-0
                                                        • Opcode ID: 4ae21a175c1fa3040efe62623f72fe7860e08d29538b5fe9f8562e4c911e5fac
                                                        • Instruction ID: dafad0a065c4f46bfa1880fc750b934a2da99962210dc485dd5a1f21d09a0493
                                                        • Opcode Fuzzy Hash: 4ae21a175c1fa3040efe62623f72fe7860e08d29538b5fe9f8562e4c911e5fac
                                                        • Instruction Fuzzy Hash: 3E31C772E001199BCB19DF6CD8419AEB7E5EF84310B1945AAE819FB301D630DE5187B2
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DEE2D9
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task
                                                        • String ID:
                                                        • API String ID: 118556049-0
                                                        • Opcode ID: a9303b97d8e8882557a8132d26d6d27e0bb817dca8fc6d788620c7b02ace02fb
                                                        • Instruction ID: d7fe8b0419e3fdc7baba9a8aff6390e577d5a7ea1e19323ef9f4800e19d24279
                                                        • Opcode Fuzzy Hash: a9303b97d8e8882557a8132d26d6d27e0bb817dca8fc6d788620c7b02ace02fb
                                                        • Instruction Fuzzy Hash: C831F732A001009FD718EF78CD85A6EB7E9DB84310B188369E915DB389DA30ED4187B5
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DD2381
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task
                                                        • String ID:
                                                        • API String ID: 118556049-0
                                                        • Opcode ID: 925b202c4164dfc354f164a1d9335b19374ff3363309776341cf9a0ff2a02a63
                                                        • Instruction ID: 694f48b2a2f40b2c872e74b7ce8cffe08cf18fa43d5b2652033fc6533b50e15d
                                                        • Opcode Fuzzy Hash: 925b202c4164dfc354f164a1d9335b19374ff3363309776341cf9a0ff2a02a63
                                                        • Instruction Fuzzy Hash: 8E01DB3151010907EB1CEA68C856A7DB395DB50351B14873EF9298B782D624ED908675
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 41dda9ea535bd1c87bbba1092cf56f7949badbf556995430fcd324725e0e94bb
                                                        • Instruction ID: 7d0826a43e6172458fe60466df4011b2609db8f368bea26726c187954efd85f8
                                                        • Opcode Fuzzy Hash: 41dda9ea535bd1c87bbba1092cf56f7949badbf556995430fcd324725e0e94bb
                                                        • Instruction Fuzzy Hash: B801F53371411D6FAB11CE6AEC4196A37A6AFC136072AC521FA01EB1A5DA31C80287A0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: __wsopen_s
                                                        • String ID:
                                                        • API String ID: 3347428461-0
                                                        • Opcode ID: 301939369e056625e336a53666678b2c6cef92a5e48dfce3a5545996e96895dc
                                                        • Instruction ID: 4fa9b6cb88f1eef364a637f542a90df77ae59c2a7c81509d9a116fb44c5a2fcd
                                                        • Opcode Fuzzy Hash: 301939369e056625e336a53666678b2c6cef92a5e48dfce3a5545996e96895dc
                                                        • Instruction Fuzzy Hash: 951145B1A0420AAFCB05DF58E9419DE7BF9EF48304F014069F809EB211D630EA11CB64
                                                        APIs
                                                        • ___std_exception_copy.LIBVCRUNTIME ref: 00DC645E
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ___std_exception_copy
                                                        • String ID:
                                                        • API String ID: 2659868963-0
                                                        • Opcode ID: 91a640da19c7a63dafcf1d9849d9d01e11733087fc886bab0069c99f402b4053
                                                        • Instruction ID: 7472edb7a516a10a9338359939515aecec106729bad53babc95a09abdf8725c4
                                                        • Opcode Fuzzy Hash: 91a640da19c7a63dafcf1d9849d9d01e11733087fc886bab0069c99f402b4053
                                                        • Instruction Fuzzy Hash: 2E01F77140430D67C728AEE4EC069C977AC9E01364B149535F914BA490FB70E9D082A0
                                                        APIs
                                                        • send.WS2_32(?,?,00000000), ref: 00DDFC38
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: send
                                                        • String ID:
                                                        • API String ID: 2809346765-0
                                                        • Opcode ID: 75966dfb669c6004fd3a355feefe01bcbe8dd0997f68e4a1ed3d3a0278e30821
                                                        • Instruction ID: 46ee3647dabe943953dc70b630e018f322872977f761184d6793e01ca19150b0
                                                        • Opcode Fuzzy Hash: 75966dfb669c6004fd3a355feefe01bcbe8dd0997f68e4a1ed3d3a0278e30821
                                                        • Instruction Fuzzy Hash: 59F09032311118AB83248A6EAC80A66F7DEDBC56707240377EC29D33E0E9619C1142A4
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DD3FA0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_task
                                                        • String ID:
                                                        • API String ID: 118556049-0
                                                        • Opcode ID: 67afa24f52013d5c2665d29d8327c3d43e7e9dcaf67f6319bd7695040772be0c
                                                        • Instruction ID: acf7450a9db30f8c01a9ca88f0c9abe9097ad5f88ff49bdc54f190af650fd035
                                                        • Opcode Fuzzy Hash: 67afa24f52013d5c2665d29d8327c3d43e7e9dcaf67f6319bd7695040772be0c
                                                        • Instruction Fuzzy Hash: 35F027B2D0420D0AE71CE770AC06A6F73E88E60360718853AF519C6782F631EAA0C136
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000000,?,?,?,00E10FDF,?,?,?,?,?,00DC6357,?,?,?), ref: 00E014BD
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 92e525aa48bbcc6d122bda455433cdaadf9dee7e209094106c8a4c717ea5d90c
                                                        • Instruction ID: f62112da25f8d87afebb3467d8f42c088b869e02a15a183d66d07f18d2588571
                                                        • Opcode Fuzzy Hash: 92e525aa48bbcc6d122bda455433cdaadf9dee7e209094106c8a4c717ea5d90c
                                                        • Instruction Fuzzy Hash: 18E0E5311002296AE6202666CC04B9A768CAF413F8F1971A0AC69FE4F2CA60CCC082F1
                                                        APIs
                                                          • Part of subcall function 00DDF190: WSAStartup.WS2_32(00000202,00E36B1C), ref: 00DDF285
                                                          • Part of subcall function 00DDF190: socket.WS2_32(00000002,00000001,00000000), ref: 00DDF294
                                                          • Part of subcall function 00DDF190: htons.WS2_32(00000002), ref: 00DDF2B7
                                                          • Part of subcall function 00DDF190: inet_pton.WS2_32(00000002,00E389A0,00E36CB0), ref: 00DDF2DE
                                                          • Part of subcall function 00DDF190: connect.WS2_32(00E36CAC,00000010), ref: 00DDF2F1
                                                          • Part of subcall function 00DDF190: closesocket.WS2_32 ref: 00DDF302
                                                        • ExitProcess.KERNEL32 ref: 00DDDBC0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ExitProcessStartupclosesocketconnecthtonsinet_ptonsocket
                                                        • String ID:
                                                        • API String ID: 2261068128-0
                                                        • Opcode ID: 9c210288356e2bc5366e6dc5f468e73902c9c00ed0a68351dc23c53f5477ef30
                                                        • Instruction ID: ab8ee034ab3dc4a3ec63d4518d5bdcc89a94f844ab27a0bb30139200ab3d93a4
                                                        • Opcode Fuzzy Hash: 9c210288356e2bc5366e6dc5f468e73902c9c00ed0a68351dc23c53f5477ef30
                                                        • Instruction Fuzzy Hash: 5EF08272A44648ABDB10DF65DC46F5AB7A8E745B10F04493AB916E7781DA39940086A0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: H_prolog3
                                                        • String ID:
                                                        • API String ID: 431132790-0
                                                        • Opcode ID: 18c70d9647781ce4d02d3b93286af52ebce5e9a714d88aa9422bdd8821b29868
                                                        • Instruction ID: 40d17f42fa0984b41520cb866f0f09ca5144997dc3a30198a20a29b5d1cf000d
                                                        • Opcode Fuzzy Hash: 18c70d9647781ce4d02d3b93286af52ebce5e9a714d88aa9422bdd8821b29868
                                                        • Instruction Fuzzy Hash: E4E09AB2D4020E9ADB00DFD4C452BEFB7FCAB44300F505026A605F6181EA7457848BA2
                                                        APIs
                                                        • CreateFileW.KERNEL32(00000000,00000000,?,00E18EDD,?,?,00000000,?,00E18EDD,00000000,0000000C), ref: 00E18B98
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: d296771fb16f90a517b0a9a79848ecb3e0e5cebc328f1440f98f5a258653cd4b
                                                        • Instruction ID: 5dfd5163706718caad9805cded2ee25e64a6776f85dba457530006296876d181
                                                        • Opcode Fuzzy Hash: d296771fb16f90a517b0a9a79848ecb3e0e5cebc328f1440f98f5a258653cd4b
                                                        • Instruction Fuzzy Hash: FAD06C3200010DBFEF128F85DC06EDA3BAAFB4C714F018000BA1866061C732E832AB90
                                                        APIs
                                                        • GetFileAttributesExW.KERNEL32(000000FF,00000000,?,00000180,?), ref: 00E14ACC
                                                        • GetLastError.KERNEL32 ref: 00E14AD6
                                                        • FindFirstFileW.KERNEL32(000000FF,?), ref: 00E14AED
                                                        • GetLastError.KERNEL32 ref: 00E14AF8
                                                        • FindClose.KERNEL32(00000000), ref: 00E14B04
                                                        • ___std_fs_open_handle@16.LIBCPMT ref: 00E14BBD
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileFindLast$AttributesCloseFirst___std_fs_open_handle@16
                                                        • String ID:
                                                        • API String ID: 2340820627-0
                                                        • Opcode ID: 791b215288220ee073a42c66cc899ffdf1f96190c05f9c95e56f61b722c3236e
                                                        • Instruction ID: a3a296127d1631108a7643ecc5207db5b75b9cdb558a041d6781fd844a9fafd3
                                                        • Opcode Fuzzy Hash: 791b215288220ee073a42c66cc899ffdf1f96190c05f9c95e56f61b722c3236e
                                                        • Instruction Fuzzy Hash: A071AEB4A0161A9FDB24CF29DC88BEAB7B8AF05314F145255E855F33D0EB309E85CB90
                                                        APIs
                                                          • Part of subcall function 00DFD231: GetLastError.KERNEL32(?,?,00DF52A7,00E33790,0000000C), ref: 00DFD235
                                                          • Part of subcall function 00DFD231: SetLastError.KERNEL32(00000000), ref: 00DFD2D7
                                                        • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00E09A70
                                                        • IsValidCodePage.KERNEL32(00000000), ref: 00E09AB9
                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00E09AC8
                                                        • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00E09B10
                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00E09B2F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                        • String ID: /
                                                        • API String ID: 415426439-3878498614
                                                        • Opcode ID: 59924229cff756bcaac3aea0557b46e225220dbd5e7f79058a8cab0e4e692c18
                                                        • Instruction ID: ebf27db1bbec83749b1e1c36e97aa06f3035f6381fc4ea88fff77379f3c7d676
                                                        • Opcode Fuzzy Hash: 59924229cff756bcaac3aea0557b46e225220dbd5e7f79058a8cab0e4e692c18
                                                        • Instruction Fuzzy Hash: 49514B72A0020AAFDB21DFA5DC81AAE77B8AF48704F155529E911FB1D3E77099848B60
                                                        APIs
                                                        • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 00DD548A
                                                        • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 00DD54CE
                                                        • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 00DD55DD
                                                        • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 00DD562E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ___std_fs_directory_iterator_advance@8
                                                        • String ID: .
                                                        • API String ID: 2610647541-248832578
                                                        • Opcode ID: 2192600ac3fecb56095841723adf44202569ce37ed111dec044619aac2610093
                                                        • Instruction ID: 9ecfac0381b583086a19768add7fefb39598cab9e74aca7a71aaf4bbafa69fe3
                                                        • Opcode Fuzzy Hash: 2192600ac3fecb56095841723adf44202569ce37ed111dec044619aac2610093
                                                        • Instruction Fuzzy Hash: E8E12671901A16DFCB20CF18D884BAAB7F5FF44314F5842AAE8059B794DB71ED84CBA1
                                                        APIs
                                                          • Part of subcall function 00DFD231: GetLastError.KERNEL32(?,?,00DF52A7,00E33790,0000000C), ref: 00DFD235
                                                          • Part of subcall function 00DFD231: SetLastError.KERNEL32(00000000), ref: 00DFD2D7
                                                        • GetACP.KERNEL32(?,?,?,?,?,?,00DFDCD6,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00E090C1
                                                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00DFDCD6,?,?,?,00000055,?,-00000050,?,?), ref: 00E090EC
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00E0924F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$CodeInfoLocalePageValid
                                                        • String ID: utf8$/
                                                        • API String ID: 607553120-3349841379
                                                        • Opcode ID: ee3a1f909d26b89c3ec5200ff59d32854bff8950deb2a23846067a201775bc21
                                                        • Instruction ID: 8ddcb870765af5e8cd8af0d58f80aaf4f6d4ff7b9af311f8692391dbecac6dad
                                                        • Opcode Fuzzy Hash: ee3a1f909d26b89c3ec5200ff59d32854bff8950deb2a23846067a201775bc21
                                                        • Instruction Fuzzy Hash: D271D471601306AAEB24AF75CC46BBA73E8EF44704F15642AF645FB1C3EA71D9C0C6A0
                                                        APIs
                                                        • GetLocaleInfoW.KERNEL32(00000000,2000000B,00E09AAD,00000002,00000000,?,?,?,00E09AAD,?,00000000), ref: 00E09828
                                                        • GetLocaleInfoW.KERNEL32(00000000,20001004,00E09AAD,00000002,00000000,?,?,?,00E09AAD,?,00000000), ref: 00E09851
                                                        • GetACP.KERNEL32(?,?,00E09AAD,?,00000000), ref: 00E09866
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale
                                                        • String ID: ACP$OCP
                                                        • API String ID: 2299586839-711371036
                                                        • Opcode ID: f383ea9c01cbbe5a3830fef34c0a5444ae1578045cd0e3ee34adffe6f1696bec
                                                        • Instruction ID: 59f0034b86d3d3d2065152039c8abfd70c0432b4072e5f3d6474035fd84ea485
                                                        • Opcode Fuzzy Hash: f383ea9c01cbbe5a3830fef34c0a5444ae1578045cd0e3ee34adffe6f1696bec
                                                        • Instruction Fuzzy Hash: 0421FB32A011019ADB388F65D901A9773A6EF55F58B16D425E546F7387E731DDC0C360
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: _strrchr
                                                        • String ID:
                                                        • API String ID: 3213747228-0
                                                        • Opcode ID: f7eb5e89479653599841870f2cc3a257071628d270d4206b49d9c8c0caa12c71
                                                        • Instruction ID: 354a4a66f340d94a253c620012883bb839d6a964c6db46aa6d7223372538f6cd
                                                        • Opcode Fuzzy Hash: f7eb5e89479653599841870f2cc3a257071628d270d4206b49d9c8c0caa12c71
                                                        • Instruction Fuzzy Hash: 53B14632A052459FDB158F68C891BEEBBF5EF45314F1491EAE845BF282E3349D81CB60
                                                        APIs
                                                        • VirtualQuery.KERNEL32(?,?,0000001C), ref: 00DF86A6
                                                        • GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 00DF86BA
                                                        • VirtualAlloc.KERNEL32(?,-00000001,00001000,00000004,?,?,?,0000001C), ref: 00DF870A
                                                        • VirtualProtect.KERNEL32(?,-00000001,00000104,?,?,?,0000001C), ref: 00DF871F
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Virtual$AllocInfoProtectQuerySystem
                                                        • String ID:
                                                        • API String ID: 3562403962-0
                                                        • Opcode ID: 1b0f6803ab96c72d12c5e244e2305857ba3957559d523fa4878ec1abfbee05bd
                                                        • Instruction ID: 25535a7499f7cdf87b2f07a650ba122b70a91b05394f9c740f18f1ed009bffe4
                                                        • Opcode Fuzzy Hash: 1b0f6803ab96c72d12c5e244e2305857ba3957559d523fa4878ec1abfbee05bd
                                                        • Instruction Fuzzy Hash: 54219572E0011CABDB20EBA9CC85EEFB7B8EF44750F154425EA05F7141EA709904DBA1
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00E0FEBC
                                                        • IsDebuggerPresent.KERNEL32 ref: 00E0FF88
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00E0FFA8
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00E0FFB2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                        • String ID:
                                                        • API String ID: 254469556-0
                                                        • Opcode ID: 0629fe5c9eacc7027edf4d3ea819c6a5d30d252d7495facd3188e71800ad1053
                                                        • Instruction ID: b1a38432cec0662c0bb0079e4930156719ccc33560bc4c730f74e211074ecfc5
                                                        • Opcode Fuzzy Hash: 0629fe5c9eacc7027edf4d3ea819c6a5d30d252d7495facd3188e71800ad1053
                                                        • Instruction Fuzzy Hash: 7F311875D05218DBEB20DFA4D989BCDBBF8BF08304F1044EAE50DAB290EB715A858F45
                                                        APIs
                                                        • GetLocaleInfoEx.KERNEL32(!x-sys-default-locale,20000001,?,00000002,?,AA85FA48,?,00DC6B23,?,AA85FA48), ref: 00E147C0
                                                        • FormatMessageA.KERNEL32(00001300,00000000,00000000,?,AA85FA48,00000000,00000000,?,00DC6B23,?,AA85FA48), ref: 00E147E2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: FormatInfoLocaleMessage
                                                        • String ID: !x-sys-default-locale
                                                        • API String ID: 4235545615-2729719199
                                                        • Opcode ID: d0b0ce8e11e9946bf530a3d39593f2a6de6c07cee3e15661435163c7a06f236d
                                                        • Instruction ID: 17e1e2a01b648bd316c1a2c1553f45f83ef6277e40fc8976ca893e99ada90826
                                                        • Opcode Fuzzy Hash: d0b0ce8e11e9946bf530a3d39593f2a6de6c07cee3e15661435163c7a06f236d
                                                        • Instruction Fuzzy Hash: D8E06DB6151218FFFB189FA1CC0BDFF7BACEB05751F004115B942E2180E2B06E508760
                                                        APIs
                                                          • Part of subcall function 00DFD231: GetLastError.KERNEL32(?,?,00DF52A7,00E33790,0000000C), ref: 00DFD235
                                                          • Part of subcall function 00DFD231: SetLastError.KERNEL32(00000000), ref: 00DFD2D7
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E09467
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E094B1
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E09577
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale$ErrorLast
                                                        • String ID:
                                                        • API String ID: 661929714-0
                                                        • Opcode ID: 152116816f00d1a685a03025146674c4e0dfed926981b4a169a69311e6ea5367
                                                        • Instruction ID: 952f03ed29a2ee940ba2f90e341c1ba054c41985b53e579ce26fec29931db185
                                                        • Opcode Fuzzy Hash: 152116816f00d1a685a03025146674c4e0dfed926981b4a169a69311e6ea5367
                                                        • Instruction Fuzzy Hash: 0161BE719102079FDB299F29DC82BBA73A8EF05308F109179E905EA1C7EB35D9C1CB60
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00DF4A15
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00DF4A1F
                                                        • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 00DF4A2C
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: 1aa27e43c562700bc9df8bcc1f6affa89ecfd2ff6352faf97becb0f76637510a
                                                        • Instruction ID: c67609f2230876772e36ba2c6d535eb0e39b52a62c72970eb55e2db63bf17650
                                                        • Opcode Fuzzy Hash: 1aa27e43c562700bc9df8bcc1f6affa89ecfd2ff6352faf97becb0f76637510a
                                                        • Instruction Fuzzy Hash: D231D37490121CABCB21DF64D889BDDBBF8BF08310F5095EAE51CA72A1E7709B858F54
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00E10722
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: FeaturePresentProcessor
                                                        • String ID:
                                                        • API String ID: 2325560087-0
                                                        • Opcode ID: df24973aa68e9dea65ec07d93ef0bd038e329204753913267c715c170afb8fa5
                                                        • Instruction ID: dd26766f3b3eb9b80f6c0eb06e86c1aaa2e99bb4db5db99d3759e62383e88ae4
                                                        • Opcode Fuzzy Hash: df24973aa68e9dea65ec07d93ef0bd038e329204753913267c715c170afb8fa5
                                                        • Instruction Fuzzy Hash: E4517BB1D15209DFEB18CF66D9857AABBF0FB44314F24912AD445FB2A0D3B49984CF90
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e3095a1bf0494c18e6396a780510b756242c4990aa09904050baea6e646f3b1f
                                                        • Instruction ID: 29f63cb317ea3c9b5daa9c0954b3a3236acaeaa258d70fb9bcdc8b2240bd80bc
                                                        • Opcode Fuzzy Hash: e3095a1bf0494c18e6396a780510b756242c4990aa09904050baea6e646f3b1f
                                                        • Instruction Fuzzy Hash: 5131A472900219AFDB20EFA9CC85DEBB7BDEB84314F144559F915E7245EA30AE808B60
                                                        APIs
                                                          • Part of subcall function 00DFD231: GetLastError.KERNEL32(?,?,00DF52A7,00E33790,0000000C), ref: 00DFD235
                                                          • Part of subcall function 00DFD231: SetLastError.KERNEL32(00000000), ref: 00DFD2D7
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00E096BA
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$InfoLocale
                                                        • String ID:
                                                        • API String ID: 3736152602-0
                                                        • Opcode ID: d515e230b4035c7ff40e2f50050b9835bbb343de93545dcd3dbda9e3d67f285d
                                                        • Instruction ID: e0d6a42b2ddb3301a0b5bbc28e11701c441c2008a2664732d82f30ff6fbb8289
                                                        • Opcode Fuzzy Hash: d515e230b4035c7ff40e2f50050b9835bbb343de93545dcd3dbda9e3d67f285d
                                                        • Instruction Fuzzy Hash: 4E219573520206ABDB289F25DC41ABA73A8EF55314F14617AFD01E61C3EB75DD80C760
                                                        APIs
                                                          • Part of subcall function 00DFD231: GetLastError.KERNEL32(?,?,00DF52A7,00E33790,0000000C), ref: 00DFD235
                                                          • Part of subcall function 00DFD231: SetLastError.KERNEL32(00000000), ref: 00DFD2D7
                                                        • EnumSystemLocalesW.KERNEL32(00E09413,00000001,00000000,?,-00000050,?,00E09A44,00000000,?,?,?,00000055,?), ref: 00E0935F
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: 90b350f5098fa9570160d798845b74e2a5d57ca3b2bbe2b7fc09bf3b84da6db3
                                                        • Instruction ID: db7cc10fc94fad4417ddd6671f9f4357402a182ff8c4c88e2a50b00e1a6744ba
                                                        • Opcode Fuzzy Hash: 90b350f5098fa9570160d798845b74e2a5d57ca3b2bbe2b7fc09bf3b84da6db3
                                                        • Instruction Fuzzy Hash: 001125376003059FDB189F39C8916BAB792FF84318B18442DEA8797AC2D375B883CB40
                                                        APIs
                                                          • Part of subcall function 00DFD231: GetLastError.KERNEL32(?,?,00DF52A7,00E33790,0000000C), ref: 00DFD235
                                                          • Part of subcall function 00DFD231: SetLastError.KERNEL32(00000000), ref: 00DFD2D7
                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00E0962F,00000000,00000000,?), ref: 00E098C1
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$InfoLocale
                                                        • String ID:
                                                        • API String ID: 3736152602-0
                                                        • Opcode ID: ab1f152d1e94f9c0c302703d835d7db9969edb0b138fb42b9b8d916fe8f223ab
                                                        • Instruction ID: 289894434159fd4ce80b947e6baaab7e36ca998aab99055bc8729fe3b90e1a44
                                                        • Opcode Fuzzy Hash: ab1f152d1e94f9c0c302703d835d7db9969edb0b138fb42b9b8d916fe8f223ab
                                                        • Instruction Fuzzy Hash: 91F0F9326002156FDB2C5E24C855AFA7B54EB41758F159424ED52B32C3DA34FD81C6B0
                                                        APIs
                                                          • Part of subcall function 00DFD231: GetLastError.KERNEL32(?,?,00DF52A7,00E33790,0000000C), ref: 00DFD235
                                                          • Part of subcall function 00DFD231: SetLastError.KERNEL32(00000000), ref: 00DFD2D7
                                                        • EnumSystemLocalesW.KERNEL32(00E09666,00000001,?,?,-00000050,?,00E09A08,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00E093D2
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: fe02cd03e0991c4c83ec0ca8424288adb61a2ec52debbb0dae848dd961795961
                                                        • Instruction ID: 1cdd8fd146a52a3a3f842c5a48561ac29435cd7c90780b3591aa9154204a7076
                                                        • Opcode Fuzzy Hash: fe02cd03e0991c4c83ec0ca8424288adb61a2ec52debbb0dae848dd961795961
                                                        • Instruction Fuzzy Hash: 57F0F6362003045FDB245F35DC81A7A7B95FF80768F15842DFA465B6C2D6B59C82CB50
                                                        APIs
                                                          • Part of subcall function 00DFFA81: EnterCriticalSection.KERNEL32(?,?,00DFCF09,?,00E33890,00000008,00DFD0CD,?,?,?), ref: 00DFFA90
                                                        • EnumSystemLocalesW.KERNEL32(00DFEC42,00000001,00E33970,0000000C,00DFF0D0,00000000), ref: 00DFEC87
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                        • String ID:
                                                        • API String ID: 1272433827-0
                                                        • Opcode ID: dac8c1787342079cc8860d28e6772a5bfbaa5fdabfc70410ff3b2e75bf3d6365
                                                        • Instruction ID: 377c77979ce9e89492114dab166c5a11e0cb5670c1be4fb2c3bae3d642e3ff45
                                                        • Opcode Fuzzy Hash: dac8c1787342079cc8860d28e6772a5bfbaa5fdabfc70410ff3b2e75bf3d6365
                                                        • Instruction Fuzzy Hash: 49F0AF72A04218EFD704DFA9E846B9C7BF0EB48720F11852AF504A73E0C7B54945CF60
                                                        APIs
                                                          • Part of subcall function 00DFD231: GetLastError.KERNEL32(?,?,00DF52A7,00E33790,0000000C), ref: 00DFD235
                                                          • Part of subcall function 00DFD231: SetLastError.KERNEL32(00000000), ref: 00DFD2D7
                                                        • EnumSystemLocalesW.KERNEL32(00E091FB,00000001,?,?,?,00E09A66,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00E092D9
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: c77513f79fa27c83327ece16454620e817ea2bdff3be5d0f96bd0e9bce660002
                                                        • Instruction ID: 65f7ce158f1cbfb69e103ebaaca4d40fe3b27f9c48f1d954f54b054789deca2c
                                                        • Opcode Fuzzy Hash: c77513f79fa27c83327ece16454620e817ea2bdff3be5d0f96bd0e9bce660002
                                                        • Instruction Fuzzy Hash: 86F0EC3630020557CB149F75DC9566A7F95EFC1714B074059EE099B192C6719883C750
                                                        APIs
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00DFE83C,?,20001004,00000000,00000002,?,?,00DFDE3E), ref: 00DFF25F
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale
                                                        • String ID:
                                                        • API String ID: 2299586839-0
                                                        • Opcode ID: 2366fc7c7545d8aafdadcc524ef007a26dbfab0a02538a4d7ea456263b7e471d
                                                        • Instruction ID: 6d8fc3fa5bca066513a94e7c654755c30c38f6161bcdbc8be17aa3b01926b578
                                                        • Opcode Fuzzy Hash: 2366fc7c7545d8aafdadcc524ef007a26dbfab0a02538a4d7ea456263b7e471d
                                                        • Instruction Fuzzy Hash: 0FE04F3650112CBFCF122F61DC09EBE7F19FF44750F098021FE4565162CB318922AAB4
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7ca6b2a1cebfc3049b33a2f150552e7545a3f05e9a4079beeee08f5553ceba90
                                                        • Instruction ID: 412961f3e32ce0db0f956affe8dfeac05c1028e906c19da55e1193904cc76505
                                                        • Opcode Fuzzy Hash: 7ca6b2a1cebfc3049b33a2f150552e7545a3f05e9a4079beeee08f5553ceba90
                                                        • Instruction Fuzzy Hash: E7E08C32911268EBCB14DBC8C904A9AF3FCEB49B80B114097F501E3150C670DE80C7E0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d1bf62397490f689b374f0ae576e6ac59e65954b3d9c6fe8f943cbf1ed6f09ae
                                                        • Instruction ID: 55143eb0bfe5add232f2c6ade6a4c9c19a987d7b22404868c9dd1a9e6166e0b4
                                                        • Opcode Fuzzy Hash: d1bf62397490f689b374f0ae576e6ac59e65954b3d9c6fe8f943cbf1ed6f09ae
                                                        • Instruction Fuzzy Hash: 62C04C3414298446CE29DA14C2717A9339DA7917C6FA428CCC5466F6C6C51F9CC7D615
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DEB6A9
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00DEB6F5
                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00DEB7CD
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DEB862
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DEB887
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DEB88C
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DEB891
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DEBA70
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Concurrency::cancel_current_taskstd::_$Locinfo::_Lockit$Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                        • String ID: bad locale name$false$true
                                                        • API String ID: 4095849291-1062449267
                                                        • Opcode ID: 5f16c65e590a7532867f1ee6417b1da7f8d92fb88d253bf4cec43064ed151495
                                                        • Instruction ID: 72d6c925a1a4d630b5705959402147d0bbedd7fa16b4e1733d809d9cb3b44c80
                                                        • Opcode Fuzzy Hash: 5f16c65e590a7532867f1ee6417b1da7f8d92fb88d253bf4cec43064ed151495
                                                        • Instruction Fuzzy Hash: 84D1CFB0A00349DBDB14EFA9D8817AEB7F4EF44310F14466AE915A7341E771EA44CBB1
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DDD0A6
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DDD0C8
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DDD0E8
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DDD10F
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DDD188
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00DDD1D4
                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00DDD1EE
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DDD283
                                                        • std::_Facet_Register.LIBCPMT ref: 00DDD290
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                                        • String ID: bad locale name
                                                        • API String ID: 3375549084-1405518554
                                                        • Opcode ID: ab6297f62a933b94d9274d3a0fc79b7d4ca3b56f49363ba51723cc224ef672b6
                                                        • Instruction ID: c9533bac17eda49a9345958272c75d336e3ddcc2cbdedaaf5c100bd73dfa75e5
                                                        • Opcode Fuzzy Hash: ab6297f62a933b94d9274d3a0fc79b7d4ca3b56f49363ba51723cc224ef672b6
                                                        • Instruction Fuzzy Hash: 6EC17FB1E002599FCF10CFA9D945BEEBBF5AF48310F28816AE805A7351E7359D05CBA1
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DEA966
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DEA988
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DEA9A8
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DEA9CF
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DEAA48
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00DEAA94
                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00DEAAAE
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DEAB43
                                                        • std::_Facet_Register.LIBCPMT ref: 00DEAB50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                                        • String ID: bad locale name
                                                        • API String ID: 3375549084-1405518554
                                                        • Opcode ID: 525d76add16e0edf7bfd340d266b85f4cd55da89ccd0f17837c310c2fe9bd161
                                                        • Instruction ID: 148579d0caec7e78e80090199d00101bd101365000797845658c9b15368a4c2a
                                                        • Opcode Fuzzy Hash: 525d76add16e0edf7bfd340d266b85f4cd55da89ccd0f17837c310c2fe9bd161
                                                        • Instruction Fuzzy Hash: 2F616FB1E003999FDB10DFA9D945BEEBBF4AF44310F194069E805B7341EB34A949CBA1
                                                        APIs
                                                        • type_info::operator==.LIBVCRUNTIME ref: 00E13A05
                                                        • ___TypeMatch.LIBVCRUNTIME ref: 00E13B13
                                                        • CatchIt.LIBVCRUNTIME ref: 00E13B64
                                                        • _UnwindNestedFrames.LIBCMT ref: 00E13C65
                                                        • CallUnexpected.LIBVCRUNTIME ref: 00E13C80
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                        • String ID: csm$csm$csm
                                                        • API String ID: 4119006552-393685449
                                                        • Opcode ID: 603f2ca15691f4481b364b0665ac316e8a530deda131cc01fff4b2d1d28d1574
                                                        • Instruction ID: 9e6cebc305c8b068dc883001ccb6fb91adb1896c81458fd106d03aca969f361f
                                                        • Opcode Fuzzy Hash: 603f2ca15691f4481b364b0665ac316e8a530deda131cc01fff4b2d1d28d1574
                                                        • Instruction Fuzzy Hash: 29B157B1800209EFCF29DFA4C8819EEBBB5EF14314F14615AE8157B216D371DB91CBA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Z$TZ
                                                        • API String ID: 0-1778100189
                                                        • Opcode ID: 45874b85027c36f42189f98772096b60268d0851178a346851f1aaa1d20dbcac
                                                        • Instruction ID: 80e97d1eb23520395f5be5782fce6c565a0c3e1a2495666c4c80f9521f28c82e
                                                        • Opcode Fuzzy Hash: 45874b85027c36f42189f98772096b60268d0851178a346851f1aaa1d20dbcac
                                                        • Instruction Fuzzy Hash: 0041BB76A00745AFD7249F78CC46BAABBEDFB88710F10562AF111FB2C1D6719A818790
                                                        APIs
                                                        • _ValidateLocalCookies.LIBCMT ref: 00E11297
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00E1129F
                                                        • _ValidateLocalCookies.LIBCMT ref: 00E11328
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00E11353
                                                        • _ValidateLocalCookies.LIBCMT ref: 00E113A8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: csm
                                                        • API String ID: 1170836740-1018135373
                                                        • Opcode ID: 5258b94dcd9fd842bca3113b4cf75ec7ac38a431a3193bca2bad11fa5fcabc37
                                                        • Instruction ID: 8820eef37985dfbfe186822c9a8355437cb90336dad39e6d52b2770d288e1a26
                                                        • Opcode Fuzzy Hash: 5258b94dcd9fd842bca3113b4cf75ec7ac38a431a3193bca2bad11fa5fcabc37
                                                        • Instruction Fuzzy Hash: 2A41E434A00208AFCF10DF68C884ADEBBF5BF05318F149195EA25BB396C7319985CB91
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(00E37D34,?,?,00DDF72D,00E38A78,?,?,?), ref: 00E0F77E
                                                        • LeaveCriticalSection.KERNEL32(00E37D34,?,?,00DDF72D,00E38A78,?,?,?), ref: 00E0F7B1
                                                        • RtlWakeAllConditionVariable.NTDLL ref: 00E0F828
                                                        • SetEvent.KERNEL32(?,00DDF72D,00E38A78,?,?,?), ref: 00E0F832
                                                        • ResetEvent.KERNEL32(?,00DDF72D,00E38A78,?,?,?), ref: 00E0F83E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CriticalEventSection$ConditionEnterLeaveResetVariableWake
                                                        • String ID: 4}
                                                        • API String ID: 3916383385-2145745857
                                                        • Opcode ID: c8d392669ee02111da892231b809952a608fe62fe12a79e5d3ee36b8ab4712df
                                                        • Instruction ID: 004e3e7a45a0613a09c4cbcece65d2b9de6fbf0dbdfacdedb8e4980b4bb61345
                                                        • Opcode Fuzzy Hash: c8d392669ee02111da892231b809952a608fe62fe12a79e5d3ee36b8ab4712df
                                                        • Instruction Fuzzy Hash: 26014B71515218DFC7249F26FC0C9A43FA5FF0A7107018865E942B3662CB301815DB90
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001,?,00000000,00E2BB63,00000000,?,bad locale name), ref: 00E15A67
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000,?,00000000,00E2BB63,00000000,?,bad locale name), ref: 00E15AD2
                                                        • LCMapStringEx.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00E2BB63,00000000,?,bad locale name), ref: 00E15AEF
                                                        • LCMapStringEx.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000,00E2BB63,00000000,?,bad locale name), ref: 00E15B2E
                                                        • LCMapStringEx.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,00E2BB63,00000000,?,bad locale name), ref: 00E15B8D
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,?,00000000,00E2BB63,00000000,?,bad locale name), ref: 00E15BB0
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiStringWide
                                                        • String ID:
                                                        • API String ID: 2829165498-0
                                                        • Opcode ID: a0a4d4ac9afc91ac4d6f7d2c58b97b53085764df973f11cb8d1697decb4755e8
                                                        • Instruction ID: b4d7c33a8fdadbd94882a3f1226b18e7bacc8ec97f64ab78a1e3960e1aa363c7
                                                        • Opcode Fuzzy Hash: a0a4d4ac9afc91ac4d6f7d2c58b97b53085764df973f11cb8d1697decb4755e8
                                                        • Instruction Fuzzy Hash: C151BB73A0460AEFEF209FA0CC45FEA7BA9EF80754F105529F915B6190D7758C90CBA0
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DEABB6
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DEABD9
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DEABF9
                                                        • std::_Facet_Register.LIBCPMT ref: 00DEAC6B
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DEAC83
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DEACA6
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                        • String ID:
                                                        • API String ID: 2081738530-0
                                                        • Opcode ID: bc4db5cfe4d4e3fde1d381e77a8f9e1ead51bde56007260a4613ac098de15275
                                                        • Instruction ID: 2655125b628ef3e8e09012bf3dea2196008b20b2a3adba18f3a6e8c658c157ca
                                                        • Opcode Fuzzy Hash: bc4db5cfe4d4e3fde1d381e77a8f9e1ead51bde56007260a4613ac098de15275
                                                        • Instruction Fuzzy Hash: 0C41C27590025A9FCF11EF59D945AAEBBB0FB44320F29421AE81677391DB30BD44CBA1
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DDCF76
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DDCF99
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DDCFB9
                                                        • std::_Facet_Register.LIBCPMT ref: 00DDD02B
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DDD043
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00DDD066
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                        • String ID:
                                                        • API String ID: 2081738530-0
                                                        • Opcode ID: e6512fdaff7310f70a5f76bf5bfd5e9fada69681495ca9318745d2a84ecd0ddd
                                                        • Instruction ID: c987780814c0287291399e10a32a143898cb7faac35d85375bddadae50317e98
                                                        • Opcode Fuzzy Hash: e6512fdaff7310f70a5f76bf5bfd5e9fada69681495ca9318745d2a84ecd0ddd
                                                        • Instruction Fuzzy Hash: 6D41AD7190061ADFCF11DF94D945AAEBBB5FB44720F24425AE805B7391EB30AD45CBE0
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,00E1356F,00E111E3,00E10093), ref: 00E13586
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00E13594
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00E135AD
                                                        • SetLastError.KERNEL32(00000000,00E1356F,00E111E3,00E10093), ref: 00E135FF
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: a3f8b01da1f7e0c4fb110e4165b3fd08dca96b151992fe33dac10139eddafb20
                                                        • Instruction ID: 1c06bf2a4b4eb2f669a5aa0988c36c22c4d2ee390e72e6c630fdaa9e3d9ffa5d
                                                        • Opcode Fuzzy Hash: a3f8b01da1f7e0c4fb110e4165b3fd08dca96b151992fe33dac10139eddafb20
                                                        • Instruction Fuzzy Hash: CB014C362083167FA6252B767C4A9EB2F9BFB01B7D320622DF615701F1EF114D886114
                                                        APIs
                                                        • DeleteObject.GDI32 ref: 00DDE5BC
                                                        • EnterCriticalSection.KERNEL32(00000004,?,?,00DDE54B), ref: 00DDE5CF
                                                        • EnterCriticalSection.KERNEL32(00000004,?,?,?,?,?,00DDE54B), ref: 00DDE5DC
                                                        • GdiplusShutdown.GDIPLUS(00000000,?,?,?,?,?,00DDE54B), ref: 00DDE5E9
                                                        • LeaveCriticalSection.KERNEL32(00000004,?,?,?,?,?,00DDE54B), ref: 00DDE5F6
                                                        • LeaveCriticalSection.KERNEL32(00000004,?,?,?,?,?,00DDE54B), ref: 00DDE5FD
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$DeleteGdiplusObjectShutdown
                                                        • String ID:
                                                        • API String ID: 4268643673-0
                                                        • Opcode ID: 292becd8917c4dd57f6bf570a070102adfe925fc808f8f4a18343473facb4964
                                                        • Instruction ID: e82f16736b4bc7ab9eab35d248eee9004e7031bbf4b5da7606ed63165e9276d0
                                                        • Opcode Fuzzy Hash: 292becd8917c4dd57f6bf570a070102adfe925fc808f8f4a18343473facb4964
                                                        • Instruction Fuzzy Hash: 31010871000300DFE721AF25E90CB167BB4AF45769F248A4DE1659E2D2C77AC50BDFA0
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00DD9013
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00DD905F
                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00DD9094
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00DD9129
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: std::_$Locinfo::_Lockit$Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                        • String ID: bad locale name
                                                        • API String ID: 1143662833-1405518554
                                                        • Opcode ID: 4427d27e2bacdca5c5c6ac65564f83d85d7be41afba84900f292d4b93391770e
                                                        • Instruction ID: e913ab79e9e92c9a390a3c26d26711589021d352abd19ee63bb54a7462a25e5d
                                                        • Opcode Fuzzy Hash: 4427d27e2bacdca5c5c6ac65564f83d85d7be41afba84900f292d4b93391770e
                                                        • Instruction Fuzzy Hash: D55172B1D043499BDF10DFA4D845BEEFBB8AF14300F18416AE908B7381E775AA45CBA1
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,AA85FA48,?,?,00000000,00E19730,000000FF,?,00E00E7F,00000002,?,00E00E53,00DFCEF2), ref: 00E00F24
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00E00F36
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,00E19730,000000FF,?,00E00E7F,00000002,?,00E00E53,00DFCEF2), ref: 00E00F58
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 89c4d449fd3d45dc4a5f6734a37809f63c0d01d2e0ebd7320645f300dc109d7c
                                                        • Instruction ID: 58e90fed9e629582eca2f0f5494fda59ec212bca10bd045004a2973fa61c0ab9
                                                        • Opcode Fuzzy Hash: 89c4d449fd3d45dc4a5f6734a37809f63c0d01d2e0ebd7320645f300dc109d7c
                                                        • Instruction Fuzzy Hash: 1301DB31614619FFDB318F51DC05FAEBBB8FB04B14F004525F915B22D0DB759905CA50
                                                        APIs
                                                        • SleepConditionVariableCS.KERNELBASE(?,00E0F7E3,00000064), ref: 00E0F869
                                                        • LeaveCriticalSection.KERNEL32(00E37D34,00000000,?,00E0F7E3,00000064,?,?,00DDF4B3,00E38A7C,AA85FA48,00000000,?), ref: 00E0F873
                                                        • WaitForSingleObjectEx.KERNEL32(00000000,00000000,?,00E0F7E3,00000064,?,?,00DDF4B3,00E38A7C,AA85FA48,00000000,?), ref: 00E0F884
                                                        • EnterCriticalSection.KERNEL32(00E37D34,?,00E0F7E3,00000064,?,?,00DDF4B3,00E38A7C,AA85FA48,00000000,?), ref: 00E0F88B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                        • String ID: 4}
                                                        • API String ID: 3269011525-2145745857
                                                        • Opcode ID: 6840b9b6a599110716cecde5d08baeecd2e6a13aa4f94d48d9fbe2b3fe36cdb7
                                                        • Instruction ID: 35d657837dab34929cd332b8dc193dd39081f075f8f0d0000a8db5070d06b292
                                                        • Opcode Fuzzy Hash: 6840b9b6a599110716cecde5d08baeecd2e6a13aa4f94d48d9fbe2b3fe36cdb7
                                                        • Instruction Fuzzy Hash: 7AE0923250A228EFDB311B52EC0CEB93F29BF0AB50F405421F989761A18A714815DBD0
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 00E151E5
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00E151F0
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00E1525E
                                                          • Part of subcall function 00E15340: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00E15358
                                                        • std::locale::_Setgloballocale.LIBCPMT ref: 00E1520B
                                                        • _Yarn.LIBCPMT ref: 00E15221
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_SetgloballocaleYarn
                                                        • String ID:
                                                        • API String ID: 1088826258-0
                                                        • Opcode ID: 02e646e07b3b465678e9701217c427bab0d418e9d0211033875ce0fff5024178
                                                        • Instruction ID: f984b3c5aa12b29b64470d3b01e410c86efa67640723563f5ba152dbd9ccb299
                                                        • Opcode Fuzzy Hash: 02e646e07b3b465678e9701217c427bab0d418e9d0211033875ce0fff5024178
                                                        • Instruction Fuzzy Hash: E7019EB2600A14DFC706EB2098555BD7BB5BFC4340B142009E812773A2CF746A86CBD1
                                                        APIs
                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00DC7B4E
                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00DC7C67
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ___std_exception_destroy
                                                        • String ID: ", "$: "
                                                        • API String ID: 4194217158-747220369
                                                        • Opcode ID: 039f67355c3f0968f9b09bbd2afbe7ecf90a5b0dec570c677b2298b93f154d0f
                                                        • Instruction ID: 439bca687ba3604e5cdfedc592565b97902890071df46e8e98f6710a1da72fbd
                                                        • Opcode Fuzzy Hash: 039f67355c3f0968f9b09bbd2afbe7ecf90a5b0dec570c677b2298b93f154d0f
                                                        • Instruction Fuzzy Hash: C6F1FE70A002059FDB18CF68CC99B6EBBF6FF84300F18462DE45697B91D774A990CBA5
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: __freea
                                                        • String ID: a/p$am/pm
                                                        • API String ID: 240046367-3206640213
                                                        • Opcode ID: c3e4928f3b491c0b2297703ad20943013d9469f869cf5943ec4e048b00c70188
                                                        • Instruction ID: 2b8404332445d927297a30920576a6e90653724909c7d263c0bdafa7e7cc3d47
                                                        • Opcode Fuzzy Hash: c3e4928f3b491c0b2297703ad20943013d9469f869cf5943ec4e048b00c70188
                                                        • Instruction Fuzzy Hash: 80C1E636A00A16DADB248F68C885ABB77B0FF55708F28A15AE501BB2D0D3359CC1DF61
                                                        APIs
                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00DDE2E1
                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00DDE2F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ___std_exception_destroy
                                                        • String ID: at line $, column
                                                        • API String ID: 4194217158-191570568
                                                        • Opcode ID: 47de2109d10fd10af43d4762999217b6a428b2659d5bc07205e5134ef94875a9
                                                        • Instruction ID: ad65cd4aacfd6ad9a976120d85427badd617e5378e79682b48c0be346f0dfecb
                                                        • Opcode Fuzzy Hash: 47de2109d10fd10af43d4762999217b6a428b2659d5bc07205e5134ef94875a9
                                                        • Instruction Fuzzy Hash: 5281D671A002099FD718DF68CC45B9EFBF9FF85300F14451AE815AB782E770A985CBA5
                                                        APIs
                                                        • EncodePointer.KERNEL32(00000000,?), ref: 00E13CB0
                                                        • CatchIt.LIBVCRUNTIME ref: 00E13D96
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: CatchEncodePointer
                                                        • String ID: MOC$RCC
                                                        • API String ID: 1435073870-2084237596
                                                        • Opcode ID: 8c29dc78bcc99507835748eb0f9da020e6a1d617a2291ca4685886dd40ba702c
                                                        • Instruction ID: a6bb873326cb1b0f58019546fcf14d41e78e036d4ce32994f750d53b1137791a
                                                        • Opcode Fuzzy Hash: 8c29dc78bcc99507835748eb0f9da020e6a1d617a2291ca4685886dd40ba702c
                                                        • Instruction Fuzzy Hash: FB414871900209AFCF15DFA8DD81AEEBBB5FF48308F149059FA1577251D3359A90DB90
                                                        APIs
                                                        • ___std_exception_copy.LIBVCRUNTIME ref: 00DD946F
                                                          • Part of subcall function 00E134A6: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,00E14DCB,?,00E33F20,?,?,?), ref: 00E13506
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise___std_exception_copy
                                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                        • API String ID: 3109751735-1866435925
                                                        • Opcode ID: c7cf80b64c2c996719d676bafa3a3227ef86ebbdfd2f94fad47f8572ff50c90b
                                                        • Instruction ID: cf8a42a963ef2241a74c269abbda7c2055dc543779d030fb002c274e2d5efb23
                                                        • Opcode Fuzzy Hash: c7cf80b64c2c996719d676bafa3a3227ef86ebbdfd2f94fad47f8572ff50c90b
                                                        • Instruction Fuzzy Hash: 5A1105B2904714ABC710DF68D802F96F7D8EF44320F14852AF958A7281FB71E9558BB0
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00E1456F,00000000,?,00E380E8,?,?,?,00E14712,00000004,InitializeCriticalSectionEx,00E27058,00E27060), ref: 00E145CB
                                                        • GetLastError.KERNEL32(?,00E1456F,00000000,?,00E380E8,?,?,?,00E14712,00000004,InitializeCriticalSectionEx,00E27058,00E27060,00000000,?,00E144C9), ref: 00E145D5
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00E145FD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad$ErrorLast
                                                        • String ID: api-ms-
                                                        • API String ID: 3177248105-2084034818
                                                        • Opcode ID: ea619c4ae4cb3c7ceb94c01c27d22d814586f2f44b523e3a30470b0b9b2f0c88
                                                        • Instruction ID: 500c667b704a7402de6b7e9b3bd6b664190b54055fd188070d2306d24109583f
                                                        • Opcode Fuzzy Hash: ea619c4ae4cb3c7ceb94c01c27d22d814586f2f44b523e3a30470b0b9b2f0c88
                                                        • Instruction Fuzzy Hash: 3AE04870644204FBEB211B61EC0AF5C3B559B11B4DF145021FD4CF41E1E7B1D9559944
                                                        APIs
                                                        • GetConsoleOutputCP.KERNEL32(AA85FA48,00000000,00000000,?), ref: 00DFFC79
                                                          • Part of subcall function 00E049B8: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00E039BB,?,00000000,-00000008), ref: 00E04A64
                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00DFFED4
                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00DFFF1C
                                                        • GetLastError.KERNEL32 ref: 00DFFFBF
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                        • String ID:
                                                        • API String ID: 2112829910-0
                                                        • Opcode ID: e0322f89241595ee045f96ae656aa87953c6cb4ebcaa56de425780ac92ec8c2b
                                                        • Instruction ID: 1d306e7ed83080a24619d9d97210eaf98795985758a66bf385e6ffa8fd32383e
                                                        • Opcode Fuzzy Hash: e0322f89241595ee045f96ae656aa87953c6cb4ebcaa56de425780ac92ec8c2b
                                                        • Instruction Fuzzy Hash: 96D169B5D0025C9FCB15CFA8D8809EDBBB5FF09310F19852AE956EB351D730A946CB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: AdjustPointer
                                                        • String ID:
                                                        • API String ID: 1740715915-0
                                                        • Opcode ID: b1bab9b1a28f4a597f308aff443a9bab7eb70a768098536e1f047cdf3e97a8c0
                                                        • Instruction ID: ed8cbf9216781da20f5c8d779a013efe224cfa0a5bb9dda274f0f64afbacdb3c
                                                        • Opcode Fuzzy Hash: b1bab9b1a28f4a597f308aff443a9bab7eb70a768098536e1f047cdf3e97a8c0
                                                        • Instruction Fuzzy Hash: A051D3F5605206AFEB298F20D881BFBB7A4EF04714F24552AE955672D1E731EEC0C790
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cacba2adb41585f3a109ef8e3c76ae3553e6807131f4d72f8a8e12a78a061faa
                                                        • Instruction ID: 8eee51622d441f59c04af5707c3e97f4e2ff1b452e2f8862a57d0da16089d6fc
                                                        • Opcode Fuzzy Hash: cacba2adb41585f3a109ef8e3c76ae3553e6807131f4d72f8a8e12a78a061faa
                                                        • Instruction Fuzzy Hash: 3321CF71A2020DAFEB20AF61DE41D3A77A8EF443A4706D925FB1597551E771EC208BB0
                                                        APIs
                                                        • WideCharToMultiByte.KERNEL32(?,00000400,AA85FA48,00000000,00000000,00000000,00000000,00000000,?,?,?,00DD258F,?,?,00000000,00000000), ref: 00E1493C
                                                        • GetLastError.KERNEL32(?,?,?,00DD258F,?,?,00000000,00000000,00000000,AA85FA48,?,?), ref: 00E14948
                                                        • WideCharToMultiByte.KERNEL32(?,00000000,AA85FA48,00000000,00000000,00000000,00000000,00000000,?,?,?,00DD258F,?,?,00000000,00000000), ref: 00E1496E
                                                        • GetLastError.KERNEL32(?,?,?,00DD258F,?,?,00000000,00000000,00000000,AA85FA48,?,?), ref: 00E1497A
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ByteCharErrorLastMultiWide
                                                        • String ID:
                                                        • API String ID: 203985260-0
                                                        • Opcode ID: 6d9ee094b89be8abf0db25dcdddd50190effbb4287dace3a0a54460510d06bc5
                                                        • Instruction ID: 3b6d66d425a80c3564faf0e72524e47653fab09424591cc71ad9bb63ad2d55a5
                                                        • Opcode Fuzzy Hash: 6d9ee094b89be8abf0db25dcdddd50190effbb4287dace3a0a54460510d06bc5
                                                        • Instruction Fuzzy Hash: 4701FF7260005BBB9F224F969C08D9B7E3AEBD97A0B108525FE1565260C6318C62EBB0
                                                        APIs
                                                        • WriteConsoleW.KERNEL32(00000000,00E15542,00DF8594,00000000,00000000,?,00E0A821,00000000,00000001,00000000,?,?,00E00013,?,00000000,00000000), ref: 00E0CFCD
                                                        • GetLastError.KERNEL32(?,00E0A821,00000000,00000001,00000000,?,?,00E00013,?,00000000,00000000,?,?,?,00E005D1,?), ref: 00E0CFD9
                                                          • Part of subcall function 00E0CF9D: CloseHandle.KERNEL32(FFFFFFFE,00E0CFE9,?,00E0A821,00000000,00000001,00000000,?,?,00E00013,?,00000000,00000000,?,?), ref: 00E0CFAD
                                                        • ___initconout.LIBCMT ref: 00E0CFE9
                                                          • Part of subcall function 00E0CF5F: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00E0CF8E,00E0A80E,?,?,00E00013,?,00000000,00000000,?), ref: 00E0CF72
                                                        • WriteConsoleW.KERNEL32(00000000,00E15542,00DF8594,00000000,?,00E0A821,00000000,00000001,00000000,?,?,00E00013,?,00000000,00000000,?), ref: 00E0CFFE
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                        • String ID:
                                                        • API String ID: 2744216297-0
                                                        • Opcode ID: 40bf5df21951b5ac487ce510b375523c546c395534960d6b2ca47b23ea1cf6ab
                                                        • Instruction ID: beb0d510f607bf11d89646621b02dbf7c06620b3c830494422e4f8bc2442d713
                                                        • Opcode Fuzzy Hash: 40bf5df21951b5ac487ce510b375523c546c395534960d6b2ca47b23ea1cf6ab
                                                        • Instruction Fuzzy Hash: 41F0153610011DBFCF222FE2EC09A8A3F67FB083A0F108150FA1CB51B1D6328965DBA1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: Info
                                                        • String ID: h&$$
                                                        • API String ID: 1807457897-250582099
                                                        • Opcode ID: 7d6fa0e29dc6fff7d986b5ab1388411cfd72014d65eb748611addfe178ac66dd
                                                        • Instruction ID: 92bd7f0718c0d3bee26b17f417b77353c74ead7d3fe4405d65dc2508d5b0745a
                                                        • Opcode Fuzzy Hash: 7d6fa0e29dc6fff7d986b5ab1388411cfd72014d65eb748611addfe178ac66dd
                                                        • Instruction Fuzzy Hash: 26D1AC71D042059FDB11DFA8C881BEEBBF9FF09304F18512AE495B7282D775A985CB60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: __aulldiv
                                                        • String ID: +$-
                                                        • API String ID: 3732870572-2137968064
                                                        • Opcode ID: ceac1a7daeb4eb626a03da4197fdbc32bf6379300fc954f3ef5b435758e7e393
                                                        • Instruction ID: 82ca993bad7b4ecdcb4cc109ef5fa06686e907dc9443cc30f5158f1e4cfa448f
                                                        • Opcode Fuzzy Hash: ceac1a7daeb4eb626a03da4197fdbc32bf6379300fc954f3ef5b435758e7e393
                                                        • Instruction Fuzzy Hash: 72A1D430D4425DAECF24CE78C8647FEBBA1EF46324F1AC565E9A59B281C630DA458B70
                                                        APIs
                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00DC8871
                                                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00DC8880
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ___std_exception_destroy
                                                        • String ID: [json.exception.
                                                        • API String ID: 4194217158-791563284
                                                        • Opcode ID: 0c428a13234e8201617196ea80f584652e1d4faa52e237c85c999c80eb9694ad
                                                        • Instruction ID: c4e9adaaa25a0ff19ec073cc4e23802c4d685395ac4bbbd91c97318fd1dd419d
                                                        • Opcode Fuzzy Hash: 0c428a13234e8201617196ea80f584652e1d4faa52e237c85c999c80eb9694ad
                                                        • Instruction Fuzzy Hash: 1071E770A002059BDB08CF58D885F9ABBF5FF84300F14452DE805AB7C2EBB4A995DBA1
                                                        APIs
                                                        • ___std_exception_copy.LIBVCRUNTIME ref: 00DD946F
                                                          • Part of subcall function 00E134A6: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,?,?,00E14DCB,?,00E33F20,?,?,?), ref: 00E13506
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise___std_exception_copy
                                                        • String ID: ios_base::badbit set$ios_base::failbit set
                                                        • API String ID: 3109751735-1240500531
                                                        • Opcode ID: 211fddf801f3203cc50146d441884b5ff53a749d668188979f0056b933053e93
                                                        • Instruction ID: 44aee02553007bfa1840adb6cd6c3ffa9028ba30ba390c2f8a0a61330310a1f0
                                                        • Opcode Fuzzy Hash: 211fddf801f3203cc50146d441884b5ff53a749d668188979f0056b933053e93
                                                        • Instruction Fuzzy Hash: DA51F671914208ABC704DF68CC45BAEFBF8EF49310F14822AF955A7781E771A945CBB1
                                                        APIs
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E029E6
                                                        • ReadFile.KERNEL32(?,?,00001000,?,00000000,00E0272F,00000001,00000000,00DDA3A0,00000000,?,?,00000000,?,?,00E02BB2), ref: 00E02A6C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000003.00000002.2260877248.0000000000D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00D90000, based on PE: true
                                                        • Associated: 00000003.00000002.2260847333.0000000000D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2260953393.0000000000E20000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261011137.0000000000E36000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                        • Associated: 00000003.00000002.2261054654.0000000000E39000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_3_2_d90000_api.jbxd
                                                        Similarity
                                                        • API ID: FileReadUnothrow_t@std@@@__ehfuncinfo$??2@
                                                        • String ID: /'
                                                        • API String ID: 1834446548-3429184148
                                                        • Opcode ID: 4d57f91d652158b1a68b6580382a0d413ace28eaafccc335d676c87f7454c309
                                                        • Instruction ID: 3b552cdb678d57c431537c2d1de830aaca3083da0dd8429dcce508fbead00f6a
                                                        • Opcode Fuzzy Hash: 4d57f91d652158b1a68b6580382a0d413ace28eaafccc335d676c87f7454c309
                                                        • Instruction Fuzzy Hash: 5141E071A00258ABCB36CF28CC85BE9B7F5EB48304F5091A9EA89B6181D775DEC58F50

                                                        Execution Graph

                                                        Execution Coverage:11.8%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:1.3%
                                                        Total number of Nodes:2000
                                                        Total number of Limit Nodes:70
                                                        execution_graph 15019 7ff75995a51c 15040 7ff75995a6fc 15019->15040 15022 7ff75995a53d __scrt_acquire_startup_lock 15025 7ff75995a67d 15022->15025 15031 7ff75995a55b __scrt_release_startup_lock 15022->15031 15023 7ff75995a673 15147 7ff75995aa2c IsProcessorFeaturePresent 15023->15147 15026 7ff75995aa2c 7 API calls 15025->15026 15028 7ff75995a688 __FrameHandler3::FrameUnwindToEmptyState 15026->15028 15027 7ff75995a580 15029 7ff75995a606 15048 7ff759968738 15029->15048 15031->15027 15031->15029 15136 7ff759968ae4 15031->15136 15033 7ff75995a60b 15054 7ff759951000 15033->15054 15038 7ff75995a62f 15038->15028 15143 7ff75995a890 15038->15143 15154 7ff75995accc 15040->15154 15043 7ff75995a72b 15156 7ff7599691ec 15043->15156 15044 7ff75995a535 15044->15022 15044->15023 15049 7ff759968748 15048->15049 15050 7ff75996875d 15048->15050 15049->15050 15199 7ff7599681c8 15049->15199 15050->15033 15055 7ff759951011 15054->15055 15395 7ff7599567c0 15055->15395 15057 7ff759951023 15402 7ff759964f7c 15057->15402 15059 7ff7599527ab 15409 7ff759951af0 15059->15409 15063 7ff75995a100 _wfindfirst32i64 8 API calls 15064 7ff7599528de 15063->15064 15141 7ff75995ab80 GetModuleHandleW 15064->15141 15065 7ff7599527c9 15095 7ff7599528ca 15065->15095 15425 7ff759952c50 15065->15425 15067 7ff7599527fb 15067->15095 15428 7ff759955af0 15067->15428 15069 7ff759952817 15070 7ff759952863 15069->15070 15072 7ff759955af0 92 API calls 15069->15072 15443 7ff7599560f0 15070->15443 15077 7ff759952838 __vcrt_freefls 15072->15077 15073 7ff759952878 15447 7ff7599519d0 15073->15447 15076 7ff75995296d 15079 7ff759952998 15076->15079 15569 7ff7599524a0 15076->15569 15077->15070 15082 7ff7599560f0 89 API calls 15077->15082 15078 7ff7599519d0 121 API calls 15081 7ff7599528ae 15078->15081 15087 7ff7599529db 15079->15087 15458 7ff759956db0 15079->15458 15085 7ff7599528f0 15081->15085 15086 7ff7599528b2 15081->15086 15082->15070 15084 7ff7599529b8 15088 7ff7599529bd 15084->15088 15089 7ff7599529ce SetDllDirectoryW 15084->15089 15085->15076 15546 7ff759952de0 15085->15546 15540 7ff759951c50 15086->15540 15472 7ff759954fa0 15087->15472 15091 7ff759951c50 86 API calls 15088->15091 15089->15087 15091->15095 15095->15063 15097 7ff759952912 15102 7ff759951c50 86 API calls 15097->15102 15098 7ff759952a36 15105 7ff759952af6 15098->15105 15111 7ff759952a49 15098->15111 15101 7ff759952940 15101->15076 15104 7ff759952945 15101->15104 15102->15095 15103 7ff7599529f8 15103->15098 15583 7ff7599547a0 15103->15583 15565 7ff75995e60c 15104->15565 15476 7ff759952330 15105->15476 15120 7ff759952a95 15111->15120 15677 7ff759951b30 15111->15677 15112 7ff759952a2c 15117 7ff7599549f0 FreeLibrary 15112->15117 15113 7ff759952a0d 15603 7ff759954730 15113->15603 15117->15098 15118 7ff759952a17 15118->15112 15121 7ff759952a1b 15118->15121 15119 7ff759952b2b 15122 7ff759955af0 92 API calls 15119->15122 15120->15095 15681 7ff7599522d0 15120->15681 15671 7ff759954df0 15121->15671 15127 7ff759952b37 15122->15127 15125 7ff759952ad1 15128 7ff7599549f0 FreeLibrary 15125->15128 15127->15095 15493 7ff759956130 15127->15493 15128->15095 15137 7ff759968afb 15136->15137 15138 7ff759968b1c 15136->15138 15137->15029 17921 7ff759969238 15138->17921 15142 7ff75995ab91 15141->15142 15142->15038 15144 7ff75995a8a1 15143->15144 15145 7ff75995a646 15144->15145 15146 7ff75995be28 __scrt_initialize_crt 7 API calls 15144->15146 15145->15027 15146->15145 15148 7ff75995aa52 _wfindfirst32i64 memcpy_s 15147->15148 15149 7ff75995aa71 RtlCaptureContext RtlLookupFunctionEntry 15148->15149 15150 7ff75995aa9a RtlVirtualUnwind 15149->15150 15151 7ff75995aad6 memcpy_s 15149->15151 15150->15151 15152 7ff75995ab08 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15151->15152 15153 7ff75995ab5a _wfindfirst32i64 15152->15153 15153->15025 15155 7ff75995a71e __scrt_dllmain_crt_thread_attach 15154->15155 15155->15043 15155->15044 15157 7ff75997264c 15156->15157 15158 7ff75995a730 15157->15158 15166 7ff75996bb50 15157->15166 15158->15044 15160 7ff75995be28 15158->15160 15161 7ff75995be3a 15160->15161 15162 7ff75995be30 15160->15162 15161->15044 15178 7ff75995c1a4 15162->15178 15177 7ff75996f808 EnterCriticalSection 15166->15177 15179 7ff75995c1b3 15178->15179 15180 7ff75995be35 15178->15180 15186 7ff75995c3e0 15179->15186 15182 7ff75995c210 15180->15182 15183 7ff75995c23b 15182->15183 15184 7ff75995c21e DeleteCriticalSection 15183->15184 15185 7ff75995c23f 15183->15185 15184->15183 15185->15161 15190 7ff75995c248 15186->15190 15191 7ff75995c362 TlsFree 15190->15191 15197 7ff75995c28c __vcrt_FlsAlloc 15190->15197 15192 7ff75995c2ba LoadLibraryExW 15194 7ff75995c2db GetLastError 15192->15194 15195 7ff75995c331 15192->15195 15193 7ff75995c351 GetProcAddress 15193->15191 15194->15197 15195->15193 15196 7ff75995c348 FreeLibrary 15195->15196 15196->15193 15197->15191 15197->15192 15197->15193 15198 7ff75995c2fd LoadLibraryExW 15197->15198 15198->15195 15198->15197 15200 7ff7599681e1 15199->15200 15211 7ff7599681dd 15199->15211 15220 7ff759971bfc GetEnvironmentStringsW 15200->15220 15203 7ff7599681ee 15227 7ff759969f78 15203->15227 15204 7ff7599681fa 15233 7ff759968348 15204->15233 15208 7ff759969f78 __free_lconv_num 11 API calls 15209 7ff759968221 15208->15209 15210 7ff759969f78 __free_lconv_num 11 API calls 15209->15210 15210->15211 15211->15050 15212 7ff759968588 15211->15212 15213 7ff7599685ab 15212->15213 15214 7ff7599685c2 15212->15214 15213->15050 15214->15213 15215 7ff75996deb8 _get_daylight 11 API calls 15214->15215 15216 7ff759968636 15214->15216 15217 7ff75996e870 MultiByteToWideChar _fread_nolock 15214->15217 15219 7ff759969f78 __free_lconv_num 11 API calls 15214->15219 15215->15214 15218 7ff759969f78 __free_lconv_num 11 API calls 15216->15218 15217->15214 15218->15213 15219->15214 15221 7ff7599681e6 15220->15221 15222 7ff759971c20 15220->15222 15221->15203 15221->15204 15222->15222 15252 7ff75996cc2c 15222->15252 15224 7ff759971c57 memcpy_s 15225 7ff759969f78 __free_lconv_num 11 API calls 15224->15225 15226 7ff759971c77 FreeEnvironmentStringsW 15225->15226 15226->15221 15228 7ff759969f7d RtlDeleteBoundaryDescriptor 15227->15228 15229 7ff759969fac 15227->15229 15228->15229 15230 7ff759969f98 GetLastError 15228->15230 15229->15211 15231 7ff759969fa5 __free_lconv_num 15230->15231 15232 7ff759966088 _get_daylight 9 API calls 15231->15232 15232->15229 15234 7ff759968370 15233->15234 15235 7ff75996deb8 _get_daylight 11 API calls 15234->15235 15244 7ff7599683ab 15235->15244 15236 7ff759969f78 __free_lconv_num 11 API calls 15237 7ff759968202 15236->15237 15237->15208 15238 7ff75996842d 15239 7ff759969f78 __free_lconv_num 11 API calls 15238->15239 15239->15237 15240 7ff75996deb8 _get_daylight 11 API calls 15240->15244 15241 7ff75996841c 15323 7ff759968464 15241->15323 15244->15238 15244->15240 15244->15241 15246 7ff759968450 15244->15246 15249 7ff759969f78 __free_lconv_num 11 API calls 15244->15249 15250 7ff7599683b3 15244->15250 15314 7ff75996f9a4 15244->15314 15329 7ff759969f30 IsProcessorFeaturePresent 15246->15329 15247 7ff759969f78 __free_lconv_num 11 API calls 15247->15250 15249->15244 15250->15236 15253 7ff75996cc77 15252->15253 15258 7ff75996cc3b _get_daylight 15252->15258 15262 7ff759966088 15253->15262 15255 7ff75996cc5e RtlAllocateHeap 15256 7ff75996cc75 15255->15256 15255->15258 15256->15224 15258->15253 15258->15255 15259 7ff759972730 15258->15259 15265 7ff759972770 15259->15265 15271 7ff75996a8f8 GetLastError 15262->15271 15264 7ff759966091 15264->15256 15270 7ff75996f808 EnterCriticalSection 15265->15270 15272 7ff75996a939 FlsSetValue 15271->15272 15277 7ff75996a91c 15271->15277 15273 7ff75996a94b 15272->15273 15276 7ff75996a929 SetLastError 15272->15276 15288 7ff75996deb8 15273->15288 15276->15264 15277->15272 15277->15276 15279 7ff75996a978 FlsSetValue 15281 7ff75996a996 15279->15281 15282 7ff75996a984 FlsSetValue 15279->15282 15280 7ff75996a968 FlsSetValue 15283 7ff75996a971 15280->15283 15295 7ff75996a524 15281->15295 15282->15283 15285 7ff759969f78 __free_lconv_num 5 API calls 15283->15285 15285->15276 15293 7ff75996dec9 _get_daylight 15288->15293 15289 7ff75996df1a 15292 7ff759966088 _get_daylight 10 API calls 15289->15292 15290 7ff75996defe RtlAllocateHeap 15291 7ff75996a95a 15290->15291 15290->15293 15291->15279 15291->15280 15292->15291 15293->15289 15293->15290 15294 7ff759972730 _get_daylight 2 API calls 15293->15294 15294->15293 15300 7ff75996a3fc 15295->15300 15312 7ff75996f808 EnterCriticalSection 15300->15312 15316 7ff75996f9b1 15314->15316 15318 7ff75996f9bb 15314->15318 15315 7ff759966088 _get_daylight 11 API calls 15317 7ff75996f9c3 15315->15317 15316->15318 15321 7ff75996f9d7 15316->15321 15333 7ff759969f10 15317->15333 15318->15315 15320 7ff75996f9cf 15320->15244 15321->15320 15322 7ff759966088 _get_daylight 11 API calls 15321->15322 15322->15317 15327 7ff759968469 15323->15327 15328 7ff759968424 15323->15328 15324 7ff759968492 15325 7ff759969f78 __free_lconv_num 11 API calls 15324->15325 15325->15328 15326 7ff759969f78 __free_lconv_num 11 API calls 15326->15327 15327->15324 15327->15326 15328->15247 15330 7ff759969f43 15329->15330 15373 7ff759969c44 15330->15373 15335 7ff759969da8 15333->15335 15336 7ff759969dd3 15335->15336 15339 7ff759969e44 15336->15339 15338 7ff759969dfa 15347 7ff759969b8c 15339->15347 15342 7ff759969e7f 15342->15338 15345 7ff759969f30 _wfindfirst32i64 17 API calls 15346 7ff759969f0f 15345->15346 15348 7ff759969ba8 GetLastError 15347->15348 15349 7ff759969be3 15347->15349 15350 7ff759969bb8 15348->15350 15349->15342 15353 7ff759969bf8 15349->15353 15356 7ff75996a9c0 15350->15356 15354 7ff759969c2c 15353->15354 15355 7ff759969c14 GetLastError SetLastError 15353->15355 15354->15342 15354->15345 15355->15354 15357 7ff75996a9fa FlsSetValue 15356->15357 15358 7ff75996a9df FlsGetValue 15356->15358 15360 7ff75996aa07 15357->15360 15361 7ff759969bd3 SetLastError 15357->15361 15359 7ff75996a9f4 15358->15359 15358->15361 15359->15357 15362 7ff75996deb8 _get_daylight 11 API calls 15360->15362 15361->15349 15363 7ff75996aa16 15362->15363 15364 7ff75996aa34 FlsSetValue 15363->15364 15365 7ff75996aa24 FlsSetValue 15363->15365 15367 7ff75996aa52 15364->15367 15368 7ff75996aa40 FlsSetValue 15364->15368 15366 7ff75996aa2d 15365->15366 15369 7ff759969f78 __free_lconv_num 11 API calls 15366->15369 15370 7ff75996a524 _get_daylight 11 API calls 15367->15370 15368->15366 15369->15361 15371 7ff75996aa5a 15370->15371 15372 7ff759969f78 __free_lconv_num 11 API calls 15371->15372 15372->15361 15374 7ff759969c7e _wfindfirst32i64 memcpy_s 15373->15374 15375 7ff759969ca6 RtlCaptureContext RtlLookupFunctionEntry 15374->15375 15376 7ff759969d16 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15375->15376 15377 7ff759969ce0 RtlVirtualUnwind 15375->15377 15378 7ff759969d68 _wfindfirst32i64 15376->15378 15377->15376 15381 7ff75995a100 15378->15381 15382 7ff75995a109 15381->15382 15383 7ff75995a114 GetCurrentProcess TerminateProcess 15382->15383 15384 7ff75995a1c0 IsProcessorFeaturePresent 15382->15384 15385 7ff75995a1d8 15384->15385 15390 7ff75995a3b4 RtlCaptureContext 15385->15390 15391 7ff75995a3ce RtlLookupFunctionEntry 15390->15391 15392 7ff75995a1eb 15391->15392 15393 7ff75995a3e4 RtlVirtualUnwind 15391->15393 15394 7ff75995a180 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15392->15394 15393->15391 15393->15392 15397 7ff7599567df 15395->15397 15396 7ff759956830 WideCharToMultiByte 15396->15397 15400 7ff7599568d8 15396->15400 15397->15396 15399 7ff759956886 WideCharToMultiByte 15397->15399 15397->15400 15401 7ff7599567e7 __vcrt_freefls 15397->15401 15399->15397 15399->15400 15709 7ff759951cb0 15400->15709 15401->15057 15405 7ff75996ecc0 15402->15405 15403 7ff75996ed13 15404 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15403->15404 15408 7ff75996ed3c 15404->15408 15405->15403 15406 7ff75996ed66 15405->15406 16059 7ff75996eb98 15406->16059 15408->15059 15410 7ff759951b05 15409->15410 15411 7ff759951b20 15410->15411 16067 7ff759951c10 15410->16067 15411->15095 15413 7ff759952cd0 15411->15413 16090 7ff75995a130 15413->16090 15416 7ff759952d0b 15418 7ff759951cb0 86 API calls 15416->15418 15417 7ff759952d22 16092 7ff759956ec0 15417->16092 15421 7ff759952d1e 15418->15421 15422 7ff75995a100 _wfindfirst32i64 8 API calls 15421->15422 15424 7ff759952d5f 15422->15424 15423 7ff759951c50 86 API calls 15423->15421 15424->15065 15426 7ff759951b30 49 API calls 15425->15426 15427 7ff759952c6d 15426->15427 15427->15067 15429 7ff759955afa 15428->15429 15430 7ff759956db0 88 API calls 15429->15430 15431 7ff759955b1c GetEnvironmentVariableW 15430->15431 15432 7ff759955b34 ExpandEnvironmentStringsW 15431->15432 15433 7ff759955b86 15431->15433 15434 7ff759956ec0 88 API calls 15432->15434 15435 7ff75995a100 _wfindfirst32i64 8 API calls 15433->15435 15436 7ff759955b5c 15434->15436 15437 7ff759955b98 15435->15437 15436->15433 15438 7ff759955b66 15436->15438 15437->15069 16103 7ff75996926c 15438->16103 15441 7ff75995a100 _wfindfirst32i64 8 API calls 15442 7ff759955b7e 15441->15442 15442->15069 15444 7ff759956db0 88 API calls 15443->15444 15445 7ff759956107 SetEnvironmentVariableW 15444->15445 15446 7ff75995611f __vcrt_freefls 15445->15446 15446->15073 15448 7ff759951b30 49 API calls 15447->15448 15449 7ff759951a00 15448->15449 15450 7ff759951b30 49 API calls 15449->15450 15456 7ff759951a7a 15449->15456 15451 7ff759951a22 15450->15451 15452 7ff759952c50 49 API calls 15451->15452 15451->15456 15453 7ff759951a3b 15452->15453 16110 7ff7599517b0 15453->16110 15456->15076 15456->15078 15457 7ff75995e60c 74 API calls 15457->15456 15459 7ff759956e57 MultiByteToWideChar 15458->15459 15460 7ff759956dd1 MultiByteToWideChar 15458->15460 15461 7ff759956e7a 15459->15461 15462 7ff759956e9f 15459->15462 15463 7ff759956e1c 15460->15463 15464 7ff759956df7 15460->15464 15465 7ff759951cb0 86 API calls 15461->15465 15462->15084 15463->15459 15469 7ff759956e32 15463->15469 15466 7ff759951cb0 86 API calls 15464->15466 15467 7ff759956e8d 15465->15467 15468 7ff759956e0a 15466->15468 15467->15084 15468->15084 15470 7ff759951cb0 86 API calls 15469->15470 15471 7ff759956e45 15470->15471 15471->15084 15473 7ff759954fb5 15472->15473 15474 7ff7599529e0 15473->15474 15475 7ff759951c10 86 API calls 15473->15475 15474->15098 15573 7ff759954c40 15474->15573 15475->15474 15478 7ff7599523e4 15476->15478 15483 7ff7599523a3 15476->15483 15477 7ff759952423 15480 7ff75995a100 _wfindfirst32i64 8 API calls 15477->15480 15478->15477 15479 7ff759951ab0 74 API calls 15478->15479 15479->15478 15481 7ff759952435 15480->15481 15481->15095 15486 7ff759956080 15481->15486 15483->15478 16183 7ff759951440 15483->16183 16217 7ff759951dc0 15483->16217 16272 7ff759951780 15483->16272 15487 7ff759956db0 88 API calls 15486->15487 15488 7ff75995609f 15487->15488 15489 7ff759956db0 88 API calls 15488->15489 15490 7ff7599560af 15489->15490 15491 7ff759966818 38 API calls 15490->15491 15492 7ff7599560bd __vcrt_freefls 15491->15492 15492->15119 15494 7ff759956140 15493->15494 15495 7ff759956db0 88 API calls 15494->15495 15496 7ff759956171 SetConsoleCtrlHandler GetStartupInfoW 15495->15496 15497 7ff7599561d2 15496->15497 17126 7ff7599692e4 15497->17126 15541 7ff759951c6e 15540->15541 15542 7ff759951b90 78 API calls 15541->15542 15543 7ff759951c8c 15542->15543 15544 7ff759951d00 86 API calls 15543->15544 15545 7ff759951c9b 15544->15545 15545->15095 15547 7ff759952dec 15546->15547 15548 7ff759956db0 88 API calls 15547->15548 15549 7ff759952e17 15548->15549 15550 7ff759956db0 88 API calls 15549->15550 15551 7ff759952e2a 15550->15551 17182 7ff759965538 15551->17182 15554 7ff75995a100 _wfindfirst32i64 8 API calls 15555 7ff75995290a 15554->15555 15555->15097 15556 7ff759956360 15555->15556 15557 7ff759956384 15556->15557 15558 7ff75995ec94 73 API calls 15557->15558 15563 7ff75995645b __vcrt_freefls 15557->15563 15559 7ff75995639e 15558->15559 15559->15563 17561 7ff759967a9c 15559->17561 15561 7ff75995ec94 73 API calls 15564 7ff7599563b3 15561->15564 15562 7ff75995e95c _fread_nolock 53 API calls 15562->15564 15563->15101 15564->15561 15564->15562 15564->15563 15566 7ff75995e63c 15565->15566 17576 7ff75995e3e8 15566->17576 15568 7ff75995e655 15568->15097 15570 7ff7599524b7 15569->15570 15571 7ff7599524e0 15569->15571 15570->15571 15572 7ff759951780 86 API calls 15570->15572 15571->15079 15572->15570 15574 7ff759954c64 15573->15574 15578 7ff759954c91 15573->15578 15575 7ff759954c8c 15574->15575 15576 7ff759951780 86 API calls 15574->15576 15574->15578 15582 7ff759954c87 memcpy_s __vcrt_freefls 15574->15582 17587 7ff7599512b0 15575->17587 15576->15574 15578->15582 17613 7ff759952e60 15578->17613 15580 7ff759954cf7 15581 7ff759951c50 86 API calls 15580->15581 15580->15582 15581->15582 15582->15103 15584 7ff7599547ba memcpy_s 15583->15584 15585 7ff7599548df 15584->15585 15587 7ff7599548fb 15584->15587 15591 7ff759952e60 49 API calls 15584->15591 15592 7ff7599548c0 15584->15592 15600 7ff759951440 158 API calls 15584->15600 15601 7ff7599548e1 15584->15601 17616 7ff759951650 15584->17616 15588 7ff759952e60 49 API calls 15585->15588 15589 7ff759951c50 86 API calls 15587->15589 15590 7ff759954958 15588->15590 15594 7ff7599548f1 __vcrt_freefls 15589->15594 15593 7ff759952e60 49 API calls 15590->15593 15591->15584 15592->15585 15595 7ff759952e60 49 API calls 15592->15595 15596 7ff759954988 15593->15596 15597 7ff75995a100 _wfindfirst32i64 8 API calls 15594->15597 15595->15585 15599 7ff759952e60 49 API calls 15596->15599 15598 7ff759952a09 15597->15598 15598->15112 15598->15113 15599->15594 15600->15584 15602 7ff759951c50 86 API calls 15601->15602 15602->15594 17621 7ff759956310 15603->17621 15605 7ff759954742 15606 7ff759956310 89 API calls 15605->15606 15607 7ff759954755 15606->15607 15608 7ff75995477a 15607->15608 15609 7ff75995476d GetProcAddress 15607->15609 15610 7ff759951c50 86 API calls 15608->15610 15613 7ff7599550fc GetProcAddress 15609->15613 15614 7ff7599550d9 15609->15614 15612 7ff759954786 15610->15612 15612->15118 15613->15614 15615 7ff759955121 GetProcAddress 15613->15615 15617 7ff759951cb0 86 API calls 15614->15617 15615->15614 15616 7ff759955146 GetProcAddress 15615->15616 15616->15614 15618 7ff75995516e GetProcAddress 15616->15618 15619 7ff7599550ec 15617->15619 15618->15614 15620 7ff759955196 GetProcAddress 15618->15620 15619->15118 15620->15614 15621 7ff7599551be GetProcAddress 15620->15621 15678 7ff759951b55 15677->15678 15679 7ff759963c80 49 API calls 15678->15679 15680 7ff759951b78 15679->15680 15680->15120 17625 7ff759953ac0 15681->17625 15684 7ff75995231d 15684->15125 15686 7ff7599522f4 15686->15684 17681 7ff759953840 15686->17681 15716 7ff759951d00 15709->15716 15717 7ff759951d10 15716->15717 15741 7ff759963c80 15717->15741 15721 7ff759951d70 15774 7ff759951b90 15721->15774 15724 7ff75995a100 _wfindfirst32i64 8 API calls 15725 7ff759951cd7 GetLastError 15724->15725 15726 7ff759956670 15725->15726 15727 7ff75995667c 15726->15727 15728 7ff75995669d FormatMessageW 15727->15728 15729 7ff759956697 GetLastError 15727->15729 15730 7ff7599566ec WideCharToMultiByte 15728->15730 15731 7ff7599566d0 15728->15731 15729->15728 15733 7ff759956726 15730->15733 15734 7ff7599566e3 15730->15734 15732 7ff759951cb0 83 API calls 15731->15732 15732->15734 15735 7ff759951cb0 83 API calls 15733->15735 15736 7ff75995a100 _wfindfirst32i64 8 API calls 15734->15736 15735->15734 15737 7ff759951ce4 15736->15737 15738 7ff759951be0 15737->15738 15739 7ff759951d00 86 API calls 15738->15739 15740 7ff759951c02 15739->15740 15740->15401 15743 7ff759963cda 15741->15743 15742 7ff759963cff 15744 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15742->15744 15743->15742 15745 7ff759963d3b 15743->15745 15747 7ff759963d29 15744->15747 15778 7ff7599616c4 15745->15778 15749 7ff75995a100 _wfindfirst32i64 8 API calls 15747->15749 15748 7ff759963e18 15750 7ff759969f78 __free_lconv_num 11 API calls 15748->15750 15751 7ff759951d58 15749->15751 15750->15747 15759 7ff759956bf0 MultiByteToWideChar 15751->15759 15753 7ff759963e3c 15753->15748 15754 7ff759963e46 15753->15754 15757 7ff759969f78 __free_lconv_num 11 API calls 15754->15757 15755 7ff759969f78 __free_lconv_num 11 API calls 15755->15747 15756 7ff759963de4 15756->15748 15758 7ff759963ded 15756->15758 15757->15747 15758->15755 15760 7ff759956c39 15759->15760 15761 7ff759956c53 15759->15761 15762 7ff759951cb0 82 API calls 15760->15762 15763 7ff759956c69 15761->15763 15764 7ff759956c83 MultiByteToWideChar 15761->15764 15773 7ff759956c4c __vcrt_freefls 15762->15773 15765 7ff759951cb0 82 API calls 15763->15765 15766 7ff759956ca6 15764->15766 15767 7ff759956cc0 WideCharToMultiByte 15764->15767 15765->15773 15768 7ff759951cb0 82 API calls 15766->15768 15769 7ff759956cf6 15767->15769 15771 7ff759956ced 15767->15771 15768->15773 15770 7ff759956d1b WideCharToMultiByte 15769->15770 15769->15771 15770->15771 15770->15773 15772 7ff759951cb0 82 API calls 15771->15772 15772->15773 15773->15721 15775 7ff759951bb6 15774->15775 16044 7ff759963b5c 15775->16044 15777 7ff759951bcc 15777->15724 15779 7ff759961702 15778->15779 15780 7ff7599616f2 15778->15780 15781 7ff75996170b 15779->15781 15788 7ff759961739 15779->15788 15782 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15780->15782 15783 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15781->15783 15784 7ff759961731 15782->15784 15783->15784 15784->15748 15784->15753 15784->15756 15784->15758 15787 7ff7599619e8 15790 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15787->15790 15788->15780 15788->15784 15788->15787 15792 7ff759962614 15788->15792 15818 7ff759961ea4 15788->15818 15848 7ff75996120c 15788->15848 15851 7ff759963830 15788->15851 15790->15780 15793 7ff7599626c9 15792->15793 15794 7ff759962656 15792->15794 15795 7ff7599626ce 15793->15795 15796 7ff759962723 15793->15796 15797 7ff75996265c 15794->15797 15798 7ff7599626f3 15794->15798 15799 7ff759962703 15795->15799 15800 7ff7599626d0 15795->15800 15796->15798 15807 7ff759962732 15796->15807 15816 7ff75996268c 15796->15816 15805 7ff759962661 15797->15805 15797->15807 15875 7ff759960150 15798->15875 15882 7ff75995fd40 15799->15882 15801 7ff759962671 15800->15801 15806 7ff7599626df 15800->15806 15817 7ff759962761 15801->15817 15857 7ff759962f78 15801->15857 15805->15801 15808 7ff7599626a4 15805->15808 15805->15816 15806->15798 15810 7ff7599626e4 15806->15810 15807->15817 15889 7ff759960560 15807->15889 15808->15817 15867 7ff759963434 15808->15867 15810->15817 15871 7ff7599635cc 15810->15871 15812 7ff75995a100 _wfindfirst32i64 8 API calls 15814 7ff7599629f7 15812->15814 15814->15788 15816->15817 15896 7ff75996db60 15816->15896 15817->15812 15819 7ff759961ec5 15818->15819 15820 7ff759961eaf 15818->15820 15821 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15819->15821 15826 7ff759961f03 15819->15826 15822 7ff7599626c9 15820->15822 15823 7ff759962656 15820->15823 15820->15826 15821->15826 15824 7ff7599626ce 15822->15824 15825 7ff759962723 15822->15825 15827 7ff75996265c 15823->15827 15828 7ff7599626f3 15823->15828 15829 7ff759962703 15824->15829 15830 7ff7599626d0 15824->15830 15825->15828 15835 7ff759962732 15825->15835 15846 7ff75996268c 15825->15846 15826->15788 15834 7ff759962661 15827->15834 15827->15835 15831 7ff759960150 38 API calls 15828->15831 15832 7ff75995fd40 38 API calls 15829->15832 15838 7ff7599626df 15830->15838 15841 7ff759962671 15830->15841 15831->15846 15832->15846 15833 7ff759962f78 47 API calls 15833->15846 15836 7ff7599626a4 15834->15836 15834->15841 15834->15846 15837 7ff759960560 38 API calls 15835->15837 15847 7ff759962761 15835->15847 15839 7ff759963434 47 API calls 15836->15839 15836->15847 15837->15846 15838->15828 15840 7ff7599626e4 15838->15840 15839->15846 15843 7ff7599635cc 37 API calls 15840->15843 15840->15847 15841->15833 15841->15847 15842 7ff75995a100 _wfindfirst32i64 8 API calls 15844 7ff7599629f7 15842->15844 15843->15846 15844->15788 15845 7ff75996db60 47 API calls 15845->15846 15846->15845 15846->15847 15847->15842 15981 7ff75995f314 15848->15981 15852 7ff759963847 15851->15852 15998 7ff75996ccc0 15852->15998 15858 7ff759962f9a 15857->15858 15906 7ff75995f180 15858->15906 15863 7ff759963830 45 API calls 15864 7ff7599630d7 15863->15864 15865 7ff759963830 45 API calls 15864->15865 15866 7ff759963160 15864->15866 15865->15866 15866->15816 15868 7ff7599634b4 15867->15868 15869 7ff75996344c 15867->15869 15868->15816 15869->15868 15870 7ff75996db60 47 API calls 15869->15870 15870->15868 15874 7ff7599635ed 15871->15874 15872 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15873 7ff75996361e 15872->15873 15873->15816 15874->15872 15874->15873 15876 7ff759960183 15875->15876 15877 7ff7599601b2 15876->15877 15879 7ff75996026f 15876->15879 15878 7ff75995f180 12 API calls 15877->15878 15881 7ff7599601ef 15877->15881 15878->15881 15880 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15879->15880 15880->15881 15881->15816 15883 7ff75995fd73 15882->15883 15884 7ff75995fda2 15883->15884 15886 7ff75995fe5f 15883->15886 15885 7ff75995f180 12 API calls 15884->15885 15888 7ff75995fddf 15884->15888 15885->15888 15887 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15886->15887 15887->15888 15888->15816 15890 7ff759960593 15889->15890 15891 7ff7599605c2 15890->15891 15893 7ff75996067f 15890->15893 15892 7ff75995f180 12 API calls 15891->15892 15895 7ff7599605ff 15891->15895 15892->15895 15894 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15893->15894 15894->15895 15895->15816 15897 7ff75996db88 15896->15897 15898 7ff75996dbcd 15897->15898 15899 7ff75996db8d memcpy_s 15897->15899 15901 7ff759963830 45 API calls 15897->15901 15902 7ff75996dbb6 memcpy_s 15897->15902 15898->15899 15898->15902 15978 7ff75996f138 15898->15978 15899->15816 15900 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15900->15899 15901->15898 15902->15899 15902->15900 15907 7ff75995f1b7 15906->15907 15913 7ff75995f1a6 15906->15913 15908 7ff75996cc2c _fread_nolock 12 API calls 15907->15908 15907->15913 15909 7ff75995f1e4 15908->15909 15910 7ff75995f1f8 15909->15910 15911 7ff759969f78 __free_lconv_num 11 API calls 15909->15911 15912 7ff759969f78 __free_lconv_num 11 API calls 15910->15912 15911->15910 15912->15913 15914 7ff75996d878 15913->15914 15915 7ff75996d895 15914->15915 15916 7ff75996d8c8 15914->15916 15917 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15915->15917 15916->15915 15918 7ff75996d8fa 15916->15918 15926 7ff7599630b5 15917->15926 15923 7ff75996da0d 15918->15923 15929 7ff75996d942 15918->15929 15919 7ff75996daff 15969 7ff75996cd64 15919->15969 15921 7ff75996dac5 15962 7ff75996d0fc 15921->15962 15922 7ff75996da94 15955 7ff75996d3dc 15922->15955 15923->15919 15923->15921 15923->15922 15925 7ff75996da57 15923->15925 15928 7ff75996da4d 15923->15928 15945 7ff75996d60c 15925->15945 15926->15863 15926->15864 15928->15921 15931 7ff75996da52 15928->15931 15929->15926 15936 7ff75996930c 15929->15936 15931->15922 15931->15925 15934 7ff759969f30 _wfindfirst32i64 17 API calls 15935 7ff75996db5c 15934->15935 15937 7ff759969319 15936->15937 15938 7ff759969323 15936->15938 15937->15938 15943 7ff75996933e 15937->15943 15939 7ff759966088 _get_daylight 11 API calls 15938->15939 15940 7ff75996932a 15939->15940 15941 7ff759969f10 _invalid_parameter_noinfo 37 API calls 15940->15941 15942 7ff759969336 15941->15942 15942->15926 15942->15934 15943->15942 15944 7ff759966088 _get_daylight 11 API calls 15943->15944 15944->15940 15946 7ff75997324c 38 API calls 15945->15946 15947 7ff75996d659 15946->15947 15948 7ff759972c94 37 API calls 15947->15948 15949 7ff75996d6b4 15948->15949 15950 7ff75996d6b8 15949->15950 15951 7ff75996d709 15949->15951 15953 7ff75996d6d4 15949->15953 15950->15926 15952 7ff75996d1f8 45 API calls 15951->15952 15952->15950 15954 7ff75996d4b4 45 API calls 15953->15954 15954->15950 15956 7ff75997324c 38 API calls 15955->15956 15957 7ff75996d426 15956->15957 15958 7ff759972c94 37 API calls 15957->15958 15959 7ff75996d476 15958->15959 15960 7ff75996d47a 15959->15960 15961 7ff75996d4b4 45 API calls 15959->15961 15960->15926 15961->15960 15963 7ff75997324c 38 API calls 15962->15963 15964 7ff75996d147 15963->15964 15965 7ff759972c94 37 API calls 15964->15965 15966 7ff75996d19f 15965->15966 15967 7ff75996d1a3 15966->15967 15968 7ff75996d1f8 45 API calls 15966->15968 15967->15926 15968->15967 15970 7ff75996cddc 15969->15970 15971 7ff75996cda9 15969->15971 15972 7ff75996cdf4 15970->15972 15975 7ff75996ce75 15970->15975 15973 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15971->15973 15974 7ff75996d0fc 46 API calls 15972->15974 15977 7ff75996cdd5 memcpy_s 15973->15977 15974->15977 15976 7ff759963830 45 API calls 15975->15976 15975->15977 15976->15977 15977->15926 15980 7ff75996f15c WideCharToMultiByte 15978->15980 15982 7ff75995f353 15981->15982 15983 7ff75995f341 15981->15983 15986 7ff75995f360 15982->15986 15989 7ff75995f39d 15982->15989 15984 7ff759966088 _get_daylight 11 API calls 15983->15984 15985 7ff75995f346 15984->15985 15987 7ff759969f10 _invalid_parameter_noinfo 37 API calls 15985->15987 15988 7ff759969e44 _invalid_parameter_noinfo 37 API calls 15986->15988 15994 7ff75995f351 15987->15994 15988->15994 15990 7ff75995f446 15989->15990 15991 7ff759966088 _get_daylight 11 API calls 15989->15991 15992 7ff759966088 _get_daylight 11 API calls 15990->15992 15990->15994 15995 7ff75995f43b 15991->15995 15993 7ff75995f4f0 15992->15993 15996 7ff759969f10 _invalid_parameter_noinfo 37 API calls 15993->15996 15994->15788 15997 7ff759969f10 _invalid_parameter_noinfo 37 API calls 15995->15997 15996->15994 15997->15990 15999 7ff75996ccd9 15998->15999 16000 7ff75996386f 15998->16000 15999->16000 16006 7ff7599724a4 15999->16006 16002 7ff75996cd2c 16000->16002 16003 7ff75996387f 16002->16003 16004 7ff75996cd45 16002->16004 16003->15788 16004->16003 16041 7ff759971810 16004->16041 16018 7ff75996a780 GetLastError 16006->16018 16009 7ff7599724fe 16009->16000 16019 7ff75996a7a4 FlsGetValue 16018->16019 16020 7ff75996a7c1 FlsSetValue 16018->16020 16021 7ff75996a7bb 16019->16021 16037 7ff75996a7b1 16019->16037 16022 7ff75996a7d3 16020->16022 16020->16037 16021->16020 16024 7ff75996deb8 _get_daylight 11 API calls 16022->16024 16023 7ff75996a82d SetLastError 16026 7ff75996a84d 16023->16026 16027 7ff75996a83a 16023->16027 16025 7ff75996a7e2 16024->16025 16028 7ff75996a800 FlsSetValue 16025->16028 16029 7ff75996a7f0 FlsSetValue 16025->16029 16030 7ff75996936c __FrameHandler3::FrameUnwindToEmptyState 38 API calls 16026->16030 16027->16009 16040 7ff75996f808 EnterCriticalSection 16027->16040 16032 7ff75996a81e 16028->16032 16033 7ff75996a80c FlsSetValue 16028->16033 16031 7ff75996a7f9 16029->16031 16034 7ff75996a852 16030->16034 16035 7ff759969f78 __free_lconv_num 11 API calls 16031->16035 16036 7ff75996a524 _get_daylight 11 API calls 16032->16036 16033->16031 16035->16037 16038 7ff75996a826 16036->16038 16037->16023 16039 7ff759969f78 __free_lconv_num 11 API calls 16038->16039 16039->16023 16042 7ff75996a780 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 16041->16042 16043 7ff759971819 16042->16043 16045 7ff759963b86 16044->16045 16046 7ff759963bbe 16045->16046 16048 7ff759963bf1 16045->16048 16047 7ff759969e44 _invalid_parameter_noinfo 37 API calls 16046->16047 16050 7ff759963be7 16047->16050 16051 7ff75995f140 16048->16051 16050->15777 16058 7ff75996438c EnterCriticalSection 16051->16058 16066 7ff75996438c EnterCriticalSection 16059->16066 16068 7ff759951d00 86 API calls 16067->16068 16069 7ff759951c37 16068->16069 16072 7ff7599644e0 16069->16072 16073 7ff75996450b 16072->16073 16076 7ff7599643a4 16073->16076 16089 7ff759966d50 EnterCriticalSection 16076->16089 16091 7ff759952cdc GetModuleFileNameW 16090->16091 16091->15416 16091->15417 16093 7ff759956ee4 WideCharToMultiByte 16092->16093 16094 7ff759956f52 WideCharToMultiByte 16092->16094 16095 7ff759956f0e 16093->16095 16098 7ff759956f25 16093->16098 16096 7ff759956f7f 16094->16096 16100 7ff759952d35 16094->16100 16097 7ff759951cb0 86 API calls 16095->16097 16099 7ff759951cb0 86 API calls 16096->16099 16097->16100 16098->16094 16101 7ff759956f3b 16098->16101 16099->16100 16100->15421 16100->15423 16102 7ff759951cb0 86 API calls 16101->16102 16102->16100 16104 7ff759955b6e 16103->16104 16105 7ff759969283 16103->16105 16104->15441 16105->16104 16106 7ff75996930c __std_exception_copy 37 API calls 16105->16106 16107 7ff7599692b0 16106->16107 16107->16104 16108 7ff759969f30 _wfindfirst32i64 17 API calls 16107->16108 16109 7ff7599692e0 16108->16109 16111 7ff7599517d4 16110->16111 16112 7ff7599517e4 16110->16112 16113 7ff759952de0 120 API calls 16111->16113 16114 7ff759956360 83 API calls 16112->16114 16143 7ff759951842 16112->16143 16113->16112 16115 7ff759951815 16114->16115 16115->16143 16144 7ff75995ec94 16115->16144 16117 7ff75995a100 _wfindfirst32i64 8 API calls 16121 7ff7599519c0 16117->16121 16118 7ff75995182b 16119 7ff75995184c 16118->16119 16120 7ff75995182f 16118->16120 16148 7ff75995e95c 16119->16148 16122 7ff759951c10 86 API calls 16120->16122 16121->15456 16121->15457 16122->16143 16125 7ff75995ec94 73 API calls 16127 7ff7599518d1 16125->16127 16126 7ff759951c10 86 API calls 16126->16143 16128 7ff7599518fe 16127->16128 16129 7ff7599518e3 16127->16129 16131 7ff75995e95c _fread_nolock 53 API calls 16128->16131 16130 7ff759951c10 86 API calls 16129->16130 16130->16143 16132 7ff759951913 16131->16132 16133 7ff759951867 16132->16133 16134 7ff759951925 16132->16134 16133->16126 16151 7ff75995e6d0 16134->16151 16137 7ff75995193d 16138 7ff759951c50 86 API calls 16137->16138 16138->16143 16139 7ff759951993 16140 7ff75995e60c 74 API calls 16139->16140 16139->16143 16140->16143 16141 7ff759951950 16141->16139 16142 7ff759951c50 86 API calls 16141->16142 16142->16139 16143->16117 16145 7ff75995ecc4 16144->16145 16157 7ff75995ea24 16145->16157 16147 7ff75995ecdd 16147->16118 16169 7ff75995e97c 16148->16169 16152 7ff759951939 16151->16152 16153 7ff75995e6d9 16151->16153 16152->16137 16152->16141 16154 7ff759966088 _get_daylight 11 API calls 16153->16154 16155 7ff75995e6de 16154->16155 16156 7ff759969f10 _invalid_parameter_noinfo 37 API calls 16155->16156 16156->16152 16158 7ff75995ea8e 16157->16158 16159 7ff75995ea4e 16157->16159 16158->16159 16160 7ff75995ea9a 16158->16160 16161 7ff759969e44 _invalid_parameter_noinfo 37 API calls 16159->16161 16168 7ff75996438c EnterCriticalSection 16160->16168 16164 7ff75995ea75 16161->16164 16164->16147 16170 7ff75995e9a6 16169->16170 16171 7ff759951861 16169->16171 16170->16171 16172 7ff75995e9b5 memcpy_s 16170->16172 16173 7ff75995e9f2 16170->16173 16171->16125 16171->16133 16175 7ff759966088 _get_daylight 11 API calls 16172->16175 16182 7ff75996438c EnterCriticalSection 16173->16182 16177 7ff75995e9ca 16175->16177 16179 7ff759969f10 _invalid_parameter_noinfo 37 API calls 16177->16179 16179->16171 16276 7ff759955880 16183->16276 16185 7ff759951454 16186 7ff759951459 16185->16186 16285 7ff759955ba0 16185->16285 16186->15483 16189 7ff7599514a7 16192 7ff7599514e0 16189->16192 16194 7ff759952de0 120 API calls 16189->16194 16190 7ff759951487 16191 7ff759951c10 86 API calls 16190->16191 16193 7ff75995149d 16191->16193 16195 7ff75995ec94 73 API calls 16192->16195 16193->15483 16196 7ff7599514bf 16194->16196 16197 7ff7599514f2 16195->16197 16196->16192 16198 7ff7599514c7 16196->16198 16199 7ff759951516 16197->16199 16200 7ff7599514f6 16197->16200 16203 7ff759951c50 86 API calls 16198->16203 16201 7ff75995151c 16199->16201 16202 7ff759951534 16199->16202 16204 7ff759951c10 86 API calls 16200->16204 16310 7ff759951050 16201->16310 16206 7ff759951556 16202->16206 16215 7ff759951575 16202->16215 16211 7ff7599514d6 __vcrt_freefls 16203->16211 16204->16211 16209 7ff759951c10 86 API calls 16206->16209 16207 7ff759951624 16208 7ff75995e60c 74 API calls 16207->16208 16208->16193 16209->16211 16210 7ff75995e60c 74 API calls 16210->16207 16211->16207 16211->16210 16212 7ff75995e95c _fread_nolock 53 API calls 16212->16215 16213 7ff7599515d5 16216 7ff759951c10 86 API calls 16213->16216 16215->16211 16215->16212 16215->16213 16328 7ff75995f09c 16215->16328 16216->16211 16218 7ff759951dd6 16217->16218 16219 7ff759951b30 49 API calls 16218->16219 16220 7ff759951e0b 16219->16220 16221 7ff759952c50 49 API calls 16220->16221 16249 7ff759952211 16220->16249 16222 7ff759951e7f 16221->16222 16884 7ff759952230 16222->16884 16225 7ff759951efa 16228 7ff759952230 75 API calls 16225->16228 16226 7ff759951ec1 16227 7ff759955880 127 API calls 16226->16227 16229 7ff759951ec9 16227->16229 16230 7ff759951f4c 16228->16230 16233 7ff759951eea 16229->16233 16892 7ff759955760 16229->16892 16231 7ff759951fb6 16230->16231 16232 7ff759951f50 16230->16232 16237 7ff759952230 75 API calls 16231->16237 16234 7ff759955880 127 API calls 16232->16234 16235 7ff759951c50 86 API calls 16233->16235 16239 7ff759951ef3 16233->16239 16238 7ff759951f58 16234->16238 16235->16239 16240 7ff759951fe2 16237->16240 16238->16233 16242 7ff759955760 138 API calls 16238->16242 16244 7ff75995a100 _wfindfirst32i64 8 API calls 16239->16244 16241 7ff759952230 75 API calls 16240->16241 16252 7ff759952042 16240->16252 16245 7ff759952012 16241->16245 16246 7ff759951f75 16242->16246 16243 7ff759955880 127 API calls 16253 7ff759952052 16243->16253 16247 7ff759951fab 16244->16247 16250 7ff759952230 75 API calls 16245->16250 16245->16252 16246->16233 16248 7ff7599521f6 16246->16248 16247->15483 16250->16252 16252->16243 16252->16249 16253->16249 16273 7ff7599517a1 16272->16273 16274 7ff759951795 16272->16274 16273->15483 16275 7ff759951c50 86 API calls 16274->16275 16275->16273 16277 7ff7599558c8 16276->16277 16278 7ff759955892 16276->16278 16277->16185 16332 7ff7599516d0 16278->16332 16286 7ff759955bb0 16285->16286 16287 7ff759951b30 49 API calls 16286->16287 16288 7ff759955be1 16287->16288 16289 7ff759955dab 16288->16289 16290 7ff759951b30 49 API calls 16288->16290 16291 7ff75995a100 _wfindfirst32i64 8 API calls 16289->16291 16293 7ff759955c08 16290->16293 16292 7ff75995147f 16291->16292 16292->16189 16292->16190 16293->16289 16847 7ff759965158 16293->16847 16295 7ff759955d19 16296 7ff759956db0 88 API calls 16295->16296 16297 7ff759955d31 16296->16297 16298 7ff759955dda 16297->16298 16300 7ff759955af0 92 API calls 16297->16300 16305 7ff759955d62 __vcrt_freefls 16297->16305 16299 7ff759952de0 120 API calls 16298->16299 16299->16289 16300->16305 16301 7ff759955dce 16302 7ff759955d9f 16303 7ff759955c3d 16303->16289 16303->16295 16307 7ff759965158 49 API calls 16303->16307 16308 7ff759956db0 88 API calls 16303->16308 16309 7ff759956a60 58 API calls 16303->16309 16305->16301 16305->16302 16307->16303 16308->16303 16309->16303 16311 7ff7599510a6 16310->16311 16312 7ff7599510ad 16311->16312 16313 7ff7599510d3 16311->16313 16314 7ff759951c50 86 API calls 16312->16314 16316 7ff7599510ed 16313->16316 16317 7ff759951109 16313->16317 16315 7ff7599510c0 16314->16315 16315->16211 16318 7ff759951c10 86 API calls 16316->16318 16319 7ff75995111b 16317->16319 16326 7ff759951137 memcpy_s 16317->16326 16329 7ff75995f0cc 16328->16329 16869 7ff75995edec 16329->16869 16334 7ff7599516f5 16332->16334 16333 7ff759951738 16336 7ff7599558e0 16333->16336 16334->16333 16335 7ff759951c50 86 API calls 16334->16335 16335->16333 16337 7ff7599558f8 16336->16337 16338 7ff75995596b 16337->16338 16339 7ff759955918 16337->16339 16341 7ff759955970 GetTempPathW GetCurrentProcessId 16338->16341 16340 7ff759955af0 92 API calls 16339->16340 16342 7ff759955924 16340->16342 16375 7ff759956610 16341->16375 16399 7ff7599555e0 16342->16399 16347 7ff75995599e __vcrt_freefls 16353 7ff759955a46 16347->16353 16357 7ff7599559d1 16347->16357 16379 7ff7599674d0 16347->16379 16382 7ff759956a60 16347->16382 16349 7ff75995a100 _wfindfirst32i64 8 API calls 16355 7ff759956ec0 88 API calls 16353->16355 16360 7ff759956db0 88 API calls 16357->16360 16374 7ff759955a0a __vcrt_freefls 16357->16374 16374->16349 16376 7ff759956635 16375->16376 16433 7ff759963ed4 16376->16433 16605 7ff7599670fc 16379->16605 16383 7ff75995a130 16382->16383 16400 7ff7599555ec 16399->16400 16401 7ff759956db0 88 API calls 16400->16401 16402 7ff75995560e 16401->16402 16403 7ff759955629 ExpandEnvironmentStringsW 16402->16403 16404 7ff759955616 16402->16404 16406 7ff75995564f __vcrt_freefls 16403->16406 16405 7ff759951c50 86 API calls 16404->16405 16407 7ff759955622 16405->16407 16408 7ff759955653 16406->16408 16409 7ff759955666 16406->16409 16410 7ff75995a100 _wfindfirst32i64 8 API calls 16407->16410 16411 7ff759951c50 86 API calls 16408->16411 16413 7ff759955674 16409->16413 16414 7ff759955680 16409->16414 16412 7ff759955748 16410->16412 16411->16407 16412->16374 16423 7ff759966818 16412->16423 16740 7ff7599660a8 16413->16740 16747 7ff7599653b8 16414->16747 16417 7ff75995567e 16424 7ff759966838 16423->16424 16425 7ff759966825 16423->16425 16435 7ff759963f2e 16433->16435 16434 7ff759963f53 16437 7ff759969e44 _invalid_parameter_noinfo 37 API calls 16434->16437 16435->16434 16436 7ff759963f8f 16435->16436 16451 7ff759961a44 16436->16451 16439 7ff759963f7d 16437->16439 16440 7ff75995a100 _wfindfirst32i64 8 API calls 16439->16440 16443 7ff759956654 16440->16443 16441 7ff759969f78 __free_lconv_num 11 API calls 16441->16439 16443->16347 16444 7ff759964096 16446 7ff7599640a0 16444->16446 16449 7ff759964070 16444->16449 16445 7ff75996403c 16448 7ff759964045 16445->16448 16445->16449 16450 7ff759969f78 __free_lconv_num 11 API calls 16446->16450 16447 7ff759969f78 __free_lconv_num 11 API calls 16447->16439 16448->16447 16449->16441 16450->16439 16452 7ff759961a82 16451->16452 16453 7ff759961a72 16451->16453 16454 7ff759961a8b 16452->16454 16459 7ff759961ab9 16452->16459 16455 7ff759969e44 _invalid_parameter_noinfo 37 API calls 16453->16455 16456 7ff759969e44 _invalid_parameter_noinfo 37 API calls 16454->16456 16457 7ff759961ab1 16455->16457 16456->16457 16457->16444 16457->16445 16457->16448 16457->16449 16459->16453 16459->16457 16462 7ff759962a18 16459->16462 16495 7ff75996202c 16459->16495 16532 7ff75996129c 16459->16532 16463 7ff759962acb 16462->16463 16464 7ff759962a5a 16462->16464 16467 7ff759962b24 16463->16467 16468 7ff759962ad0 16463->16468 16465 7ff759962af5 16464->16465 16466 7ff759962a60 16464->16466 16551 7ff759960354 16465->16551 16469 7ff759962a94 16466->16469 16470 7ff759962a65 16466->16470 16473 7ff759962b3b 16467->16473 16474 7ff759962b2e 16467->16474 16479 7ff759962b33 16467->16479 16471 7ff759962b05 16468->16471 16472 7ff759962ad2 16468->16472 16469->16479 16470->16473 16474->16465 16474->16479 16496 7ff75996203a 16495->16496 16497 7ff759962050 16495->16497 16498 7ff759962090 16496->16498 16499 7ff759962acb 16496->16499 16500 7ff759962a5a 16496->16500 16497->16498 16501 7ff759969e44 _invalid_parameter_noinfo 37 API calls 16497->16501 16498->16459 16504 7ff759962b24 16499->16504 16505 7ff759962ad0 16499->16505 16502 7ff759962af5 16500->16502 16503 7ff759962a60 16500->16503 16501->16498 16588 7ff75995f5c8 16532->16588 16589 7ff75995f5fd 16588->16589 16590 7ff75995f60f 16588->16590 16591 7ff759966088 _get_daylight 11 API calls 16589->16591 16592 7ff75995f61d 16590->16592 16597 7ff75995f659 16590->16597 16741 7ff7599660c6 16740->16741 16744 7ff7599660f9 16740->16744 16742 7ff75996f9a4 _wfindfirst32i64 37 API calls 16741->16742 16741->16744 16744->16417 16748 7ff7599653d4 16747->16748 16749 7ff759965442 16747->16749 16748->16749 16751 7ff7599653d9 16748->16751 16784 7ff75996f110 16749->16784 16787 7ff75996ef20 16784->16787 16848 7ff75996a780 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 16847->16848 16850 7ff75996516d 16848->16850 16849 7ff75996ef17 16856 7ff75995a294 16849->16856 16850->16849 16855 7ff75996ee36 16850->16855 16853 7ff75995a100 _wfindfirst32i64 8 API calls 16854 7ff75996ef0f 16853->16854 16854->16303 16855->16853 16859 7ff75995a2a8 IsProcessorFeaturePresent 16856->16859 16860 7ff75995a2bf 16859->16860 16865 7ff75995a344 RtlCaptureContext RtlLookupFunctionEntry 16860->16865 16866 7ff75995a374 RtlVirtualUnwind 16865->16866 16867 7ff75995a2d3 16865->16867 16866->16867 16868 7ff75995a180 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16867->16868 16870 7ff75995ee0c 16869->16870 16871 7ff75995ee39 16869->16871 16870->16871 16885 7ff759952264 16884->16885 16886 7ff759963c80 49 API calls 16885->16886 16887 7ff75995228a 16886->16887 16888 7ff75995229b 16887->16888 16916 7ff759964e70 16887->16916 16890 7ff75995a100 _wfindfirst32i64 8 API calls 16888->16890 16891 7ff759951ebd 16890->16891 16891->16225 16891->16226 16893 7ff75995576e 16892->16893 16894 7ff759952de0 120 API calls 16893->16894 16895 7ff759955795 16894->16895 16896 7ff759955ba0 138 API calls 16895->16896 16897 7ff7599557a3 16896->16897 16898 7ff759955853 16897->16898 16899 7ff7599557bd 16897->16899 16917 7ff759964e8d 16916->16917 16918 7ff759964e99 16916->16918 16933 7ff7599646e8 16917->16933 16958 7ff759964a84 16918->16958 16923 7ff759964ed1 16969 7ff75996456c 16923->16969 16926 7ff759964f2d 16928 7ff759964e92 16926->16928 16930 7ff759969f78 __free_lconv_num 11 API calls 16926->16930 16927 7ff759964f41 16929 7ff7599646e8 69 API calls 16927->16929 16928->16888 16931 7ff759964f4d 16929->16931 16930->16928 16931->16928 16932 7ff759969f78 __free_lconv_num 11 API calls 16931->16932 16932->16928 16934 7ff75996471f 16933->16934 16935 7ff759964702 16933->16935 16934->16935 16936 7ff759964732 CreateFileW 16934->16936 16937 7ff759966068 _fread_nolock 11 API calls 16935->16937 16938 7ff75996479c 16936->16938 16939 7ff759964766 16936->16939 16940 7ff759964707 16937->16940 17017 7ff759964d60 16938->17017 16991 7ff75996483c GetFileType 16939->16991 16943 7ff759966088 _get_daylight 11 API calls 16940->16943 16946 7ff75996470f 16943->16946 16951 7ff759969f10 _invalid_parameter_noinfo 37 API calls 16946->16951 16949 7ff7599647a5 16950 7ff7599647d0 16953 7ff75996471a 16951->16953 16953->16928 16959 7ff759964aa8 16958->16959 16965 7ff759964aa3 16958->16965 16960 7ff75996a780 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 16959->16960 16959->16965 16961 7ff759964ac3 16960->16961 17079 7ff75996cc8c 16961->17079 16965->16923 16966 7ff75996e144 16965->16966 17087 7ff75996df30 16966->17087 16970 7ff7599645ba 16969->16970 16971 7ff759964596 16969->16971 16973 7ff759964614 16970->16973 16976 7ff7599645bf 16970->16976 16972 7ff7599645a5 16971->16972 16975 7ff759969f78 __free_lconv_num 11 API calls 16971->16975 16972->16926 16972->16927 17097 7ff75996e870 16973->17097 16975->16972 16976->16972 16977 7ff7599645d4 16976->16977 16978 7ff759969f78 __free_lconv_num 11 API calls 16976->16978 16979 7ff75996cc2c _fread_nolock 12 API calls 16977->16979 16978->16977 16979->16972 16992 7ff759964947 16991->16992 16993 7ff75996488a 16991->16993 16995 7ff75996494f 16992->16995 16996 7ff759964971 16992->16996 16994 7ff7599648b6 GetFileInformationByHandle 16993->16994 16998 7ff759964c5c 21 API calls 16993->16998 16999 7ff7599648df 16994->16999 17000 7ff759964962 GetLastError 16994->17000 16995->17000 17001 7ff759964953 16995->17001 16997 7ff759964994 PeekNamedPipe 16996->16997 17007 7ff759964932 16996->17007 16997->17007 17005 7ff7599648a4 16998->17005 17002 7ff759964b20 51 API calls 16999->17002 17004 7ff759965ffc _fread_nolock 11 API calls 17000->17004 17003 7ff759966088 _get_daylight 11 API calls 17001->17003 17006 7ff7599648ea 17002->17006 17003->17007 17004->17007 17005->16994 17005->17007 17008 7ff75995a100 _wfindfirst32i64 8 API calls 17007->17008 17010 7ff759964774 17008->17010 17018 7ff759964d96 17017->17018 17019 7ff759966088 _get_daylight 11 API calls 17018->17019 17037 7ff759964e2e __vcrt_freefls 17018->17037 17021 7ff759964da8 17019->17021 17020 7ff75995a100 _wfindfirst32i64 8 API calls 17022 7ff7599647a1 17020->17022 17023 7ff759966088 _get_daylight 11 API calls 17021->17023 17022->16949 17022->16950 17024 7ff759964db0 17023->17024 17025 7ff7599653b8 45 API calls 17024->17025 17037->17020 17080 7ff75996cca1 17079->17080 17082 7ff759964ae6 17079->17082 17081 7ff7599724a4 45 API calls 17080->17081 17080->17082 17081->17082 17083 7ff75996ccf8 17082->17083 17084 7ff75996cd0d 17083->17084 17085 7ff75996cd20 17083->17085 17084->17085 17086 7ff759971810 45 API calls 17084->17086 17085->16965 17086->17085 17088 7ff75996df8d 17087->17088 17095 7ff75996df88 __vcrt_FlsAlloc 17087->17095 17088->16923 17089 7ff75996dfbd LoadLibraryW 17091 7ff75996e092 17089->17091 17092 7ff75996dfe2 GetLastError 17089->17092 17090 7ff75996e0b2 GetProcAddress 17090->17088 17093 7ff75996e0c3 17090->17093 17091->17090 17094 7ff75996e0a9 FreeLibrary 17091->17094 17092->17095 17093->17088 17094->17090 17095->17088 17095->17089 17095->17090 17096 7ff75996e01c LoadLibraryExW 17095->17096 17096->17091 17096->17095 17099 7ff75996e879 MultiByteToWideChar 17097->17099 17127 7ff7599692ed 17126->17127 17131 7ff7599561da 17126->17131 17128 7ff759966088 _get_daylight 11 API calls 17127->17128 17129 7ff7599692f2 17128->17129 17132 7ff75996705c 17131->17132 17133 7ff75996707a 17132->17133 17134 7ff759967065 17132->17134 17185 7ff75996546c 17182->17185 17183 7ff759965492 17184 7ff759966088 _get_daylight 11 API calls 17183->17184 17186 7ff759965497 17184->17186 17185->17183 17187 7ff7599654c5 17185->17187 17188 7ff759969f10 _invalid_parameter_noinfo 37 API calls 17186->17188 17189 7ff7599654cb 17187->17189 17190 7ff7599654d8 17187->17190 17191 7ff759952e39 17188->17191 17192 7ff759966088 _get_daylight 11 API calls 17189->17192 17201 7ff75996a258 17190->17201 17191->15554 17192->17191 17214 7ff75996f808 EnterCriticalSection 17201->17214 17562 7ff759967acc 17561->17562 17565 7ff7599675a8 17562->17565 17564 7ff759967ae5 17564->15564 17566 7ff7599675c3 17565->17566 17567 7ff7599675f2 17565->17567 17569 7ff759969e44 _invalid_parameter_noinfo 37 API calls 17566->17569 17575 7ff75996438c EnterCriticalSection 17567->17575 17574 7ff7599675e3 17569->17574 17574->17564 17577 7ff75995e403 17576->17577 17578 7ff75995e431 17576->17578 17579 7ff759969e44 _invalid_parameter_noinfo 37 API calls 17577->17579 17580 7ff75995e423 17578->17580 17586 7ff75996438c EnterCriticalSection 17578->17586 17579->17580 17580->15568 17588 7ff7599512f8 17587->17588 17589 7ff7599512c6 17587->17589 17590 7ff75995ec94 73 API calls 17588->17590 17591 7ff759952de0 120 API calls 17589->17591 17592 7ff75995130a 17590->17592 17593 7ff7599512d6 17591->17593 17594 7ff75995130e 17592->17594 17595 7ff75995132f 17592->17595 17593->17588 17596 7ff7599512de 17593->17596 17597 7ff759951c10 86 API calls 17594->17597 17601 7ff759951364 17595->17601 17602 7ff759951344 17595->17602 17598 7ff759951c50 86 API calls 17596->17598 17599 7ff759951325 17597->17599 17600 7ff7599512ee 17598->17600 17599->15578 17600->15578 17604 7ff75995137e 17601->17604 17609 7ff759951395 17601->17609 17603 7ff759951c10 86 API calls 17602->17603 17608 7ff75995135f __vcrt_freefls 17603->17608 17605 7ff759951050 94 API calls 17604->17605 17605->17608 17606 7ff75995e95c _fread_nolock 53 API calls 17606->17609 17607 7ff759951421 17607->15578 17608->17607 17610 7ff75995e60c 74 API calls 17608->17610 17609->17606 17609->17608 17611 7ff7599513de 17609->17611 17610->17607 17612 7ff759951c10 86 API calls 17611->17612 17612->17608 17614 7ff759951b30 49 API calls 17613->17614 17615 7ff759952e90 17614->17615 17615->15580 17617 7ff7599516aa 17616->17617 17618 7ff759951666 17616->17618 17617->15584 17618->17617 17619 7ff759951c50 86 API calls 17618->17619 17620 7ff7599516be 17619->17620 17620->15584 17622 7ff759956db0 88 API calls 17621->17622 17623 7ff759956327 LoadLibraryExW 17622->17623 17624 7ff759956344 __vcrt_freefls 17623->17624 17624->15605 17626 7ff759953ad0 17625->17626 17627 7ff759951b30 49 API calls 17626->17627 17628 7ff759953b02 17627->17628 17629 7ff759953b2b 17628->17629 17630 7ff759953b0b 17628->17630 17632 7ff759953b82 17629->17632 17633 7ff759952e60 49 API calls 17629->17633 17631 7ff759951c50 86 API calls 17630->17631 17652 7ff759953b21 17631->17652 17634 7ff759952e60 49 API calls 17632->17634 17636 7ff759953b4c 17633->17636 17635 7ff759953b9b 17634->17635 17637 7ff759953bb9 17635->17637 17640 7ff759951c50 86 API calls 17635->17640 17638 7ff759953b6a 17636->17638 17642 7ff759951c50 86 API calls 17636->17642 17641 7ff759956310 89 API calls 17637->17641 17696 7ff759952d70 17638->17696 17639 7ff75995a100 _wfindfirst32i64 8 API calls 17644 7ff7599522de 17639->17644 17640->17637 17645 7ff759953bc6 17641->17645 17642->17638 17644->15684 17653 7ff759953e40 17644->17653 17647 7ff759953bcb 17645->17647 17648 7ff759953bed 17645->17648 17649 7ff759951cb0 86 API calls 17647->17649 17702 7ff759952f20 GetProcAddress 17648->17702 17649->17652 17651 7ff759956310 89 API calls 17651->17632 17652->17639 17654 7ff759955af0 92 API calls 17653->17654 17656 7ff759953e55 17654->17656 17655 7ff759953e70 17657 7ff759956db0 88 API calls 17655->17657 17656->17655 17659 7ff759951c50 86 API calls 17656->17659 17658 7ff759953eb4 17657->17658 17660 7ff759953eb9 17658->17660 17661 7ff759953ed0 17658->17661 17659->17655 17662 7ff759951c50 86 API calls 17660->17662 17664 7ff759956db0 88 API calls 17661->17664 17663 7ff759953ec5 17662->17663 17663->15686 17665 7ff759953f05 17664->17665 17668 7ff759951b30 49 API calls 17665->17668 17679 7ff759953f0a __vcrt_freefls 17665->17679 17666 7ff759951c50 86 API calls 17667 7ff7599540b1 17666->17667 17667->15686 17669 7ff759953f87 17668->17669 17670 7ff759953f8e 17669->17670 17671 7ff759953fb3 17669->17671 17672 7ff759951c50 86 API calls 17670->17672 17673 7ff759956db0 88 API calls 17671->17673 17674 7ff759953fa3 17672->17674 17675 7ff759953fcc 17673->17675 17674->15686 17675->17679 17679->17666 17680 7ff75995409a 17679->17680 17680->15686 17682 7ff759953857 17681->17682 17682->17682 17683 7ff759953880 17682->17683 17686 7ff759953897 __vcrt_freefls 17682->17686 17684 7ff759951c50 86 API calls 17683->17684 17687 7ff7599512b0 120 API calls 17686->17687 17688 7ff759951780 86 API calls 17686->17688 17689 7ff75995397b 17686->17689 17687->17686 17688->17686 17697 7ff759952d7a 17696->17697 17698 7ff759956db0 88 API calls 17697->17698 17699 7ff759952da2 17698->17699 17700 7ff75995a100 _wfindfirst32i64 8 API calls 17699->17700 17701 7ff759952dca 17700->17701 17701->17632 17701->17651 17703 7ff759952f6b GetProcAddress 17702->17703 17706 7ff759952f48 17702->17706 17704 7ff759952f90 GetProcAddress 17703->17704 17703->17706 17704->17706 17707 7ff759952fb5 GetProcAddress 17704->17707 17705 7ff759951cb0 86 API calls 17708 7ff759952f5b 17705->17708 17706->17705 17707->17706 17709 7ff759952fdd GetProcAddress 17707->17709 17708->17652 17709->17706 17710 7ff759953005 GetProcAddress 17709->17710 17710->17706 17711 7ff75995302d GetProcAddress 17710->17711 17712 7ff759953049 17711->17712 17713 7ff759953055 GetProcAddress 17711->17713 17712->17713 17714 7ff75995307d GetProcAddress 17713->17714 17715 7ff759953071 17713->17715 17716 7ff759953099 17714->17716 17715->17714 17922 7ff75996a780 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 17921->17922 17923 7ff759969241 17922->17923 17926 7ff75996936c 17923->17926 17935 7ff7599727f0 17926->17935 17961 7ff7599727a8 17935->17961 17966 7ff75996f808 EnterCriticalSection 17961->17966 18024 7ff759968919 18025 7ff759969238 45 API calls 18024->18025 18026 7ff75996891e 18025->18026 18027 7ff759968945 GetModuleHandleW 18026->18027 18028 7ff75996898f 18026->18028 18027->18028 18033 7ff759968952 18027->18033 18036 7ff75996881c 18028->18036 18033->18028 18050 7ff759968a40 GetModuleHandleExW 18033->18050 18056 7ff75996f808 EnterCriticalSection 18036->18056 18051 7ff759968a9d 18050->18051 18052 7ff759968a74 GetProcAddress 18050->18052 18054 7ff759968aa9 18051->18054 18055 7ff759968aa2 FreeLibrary 18051->18055 18053 7ff759968a86 18052->18053 18053->18051 18054->18028 18055->18054 19289 7ff759970620 19307 7ff75996f808 EnterCriticalSection 19289->19307 19380 7ff75995a430 19381 7ff75995a440 19380->19381 19397 7ff75996580c 19381->19397 19383 7ff75995a44c 19403 7ff75995a748 19383->19403 19385 7ff75995a4b9 19386 7ff75995aa2c 7 API calls 19385->19386 19396 7ff75995a4d5 19385->19396 19388 7ff75995a4e5 19386->19388 19387 7ff75995a464 _RTC_Initialize 19387->19385 19408 7ff75995a8f8 19387->19408 19390 7ff75995a479 19411 7ff759967fd0 19390->19411 19398 7ff75996581d 19397->19398 19399 7ff759966088 _get_daylight 11 API calls 19398->19399 19400 7ff759965825 19398->19400 19401 7ff759965834 19399->19401 19400->19383 19402 7ff759969f10 _invalid_parameter_noinfo 37 API calls 19401->19402 19402->19400 19404 7ff75995a759 19403->19404 19407 7ff75995a75e __scrt_acquire_startup_lock 19403->19407 19405 7ff75995aa2c 7 API calls 19404->19405 19404->19407 19406 7ff75995a7d2 19405->19406 19407->19387 19436 7ff75995a8bc 19408->19436 19410 7ff75995a901 19410->19390 19412 7ff759967ff0 19411->19412 19413 7ff75995a485 19411->19413 19414 7ff75996800e GetModuleFileNameW 19412->19414 19415 7ff759967ff8 19412->19415 19413->19385 19435 7ff75995a9cc InitializeSListHead 19413->19435 19419 7ff759968039 19414->19419 19416 7ff759966088 _get_daylight 11 API calls 19415->19416 19417 7ff759967ffd 19416->19417 19418 7ff759969f10 _invalid_parameter_noinfo 37 API calls 19417->19418 19418->19413 19420 7ff759967f70 11 API calls 19419->19420 19421 7ff759968079 19420->19421 19422 7ff759968081 19421->19422 19427 7ff759968099 19421->19427 19423 7ff759966088 _get_daylight 11 API calls 19422->19423 19424 7ff759968086 19423->19424 19425 7ff759969f78 __free_lconv_num 11 API calls 19424->19425 19425->19413 19426 7ff7599680bb 19428 7ff759969f78 __free_lconv_num 11 API calls 19426->19428 19427->19426 19429 7ff7599680e7 19427->19429 19430 7ff759968100 19427->19430 19428->19413 19431 7ff759969f78 __free_lconv_num 11 API calls 19429->19431 19432 7ff759969f78 __free_lconv_num 11 API calls 19430->19432 19433 7ff7599680f0 19431->19433 19432->19426 19434 7ff759969f78 __free_lconv_num 11 API calls 19433->19434 19434->19413 19437 7ff75995a8d6 19436->19437 19439 7ff75995a8cf 19436->19439 19440 7ff75996904c 19437->19440 19439->19410 19443 7ff759968c88 19440->19443 19450 7ff75996f808 EnterCriticalSection 19443->19450 19451 7ff759964330 19452 7ff75996433b 19451->19452 19460 7ff75996e4c4 19452->19460 19473 7ff75996f808 EnterCriticalSection 19460->19473 19019 7ff759968bb0 19022 7ff759968b30 19019->19022 19029 7ff75996f808 EnterCriticalSection 19022->19029 19030 7ff7599796fd 19033 7ff759964398 LeaveCriticalSection 19030->19033 18067 7ff759966878 18068 7ff7599668a6 18067->18068 18069 7ff7599668df 18067->18069 18071 7ff759966088 _get_daylight 11 API calls 18068->18071 18069->18068 18070 7ff7599668e4 FindFirstFileExW 18069->18070 18072 7ff75996694d 18070->18072 18073 7ff759966906 GetLastError 18070->18073 18074 7ff7599668ab 18071->18074 18127 7ff759966ae8 18072->18127 18075 7ff75996693d 18073->18075 18076 7ff759966911 18073->18076 18077 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18074->18077 18080 7ff759966088 _get_daylight 11 API calls 18075->18080 18076->18075 18082 7ff75996691b 18076->18082 18083 7ff75996692d 18076->18083 18084 7ff7599668b6 18077->18084 18080->18084 18081 7ff759966ae8 _wfindfirst32i64 10 API calls 18085 7ff759966973 18081->18085 18082->18075 18086 7ff759966920 18082->18086 18087 7ff759966088 _get_daylight 11 API calls 18083->18087 18088 7ff75995a100 _wfindfirst32i64 8 API calls 18084->18088 18089 7ff759966ae8 _wfindfirst32i64 10 API calls 18085->18089 18090 7ff759966088 _get_daylight 11 API calls 18086->18090 18087->18084 18091 7ff7599668ca 18088->18091 18092 7ff759966981 18089->18092 18090->18084 18093 7ff75996f9a4 _wfindfirst32i64 37 API calls 18092->18093 18094 7ff75996699f 18093->18094 18094->18084 18095 7ff7599669ab 18094->18095 18096 7ff759969f30 _wfindfirst32i64 17 API calls 18095->18096 18097 7ff7599669bf 18096->18097 18098 7ff7599669e9 18097->18098 18100 7ff759966a28 FindNextFileW 18097->18100 18099 7ff759966088 _get_daylight 11 API calls 18098->18099 18101 7ff7599669ee 18099->18101 18102 7ff759966a78 18100->18102 18103 7ff759966a37 GetLastError 18100->18103 18104 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18101->18104 18105 7ff759966ae8 _wfindfirst32i64 10 API calls 18102->18105 18106 7ff759966a6b 18103->18106 18107 7ff759966a42 18103->18107 18108 7ff7599669f9 18104->18108 18110 7ff759966a90 18105->18110 18109 7ff759966088 _get_daylight 11 API calls 18106->18109 18107->18106 18113 7ff759966a4c 18107->18113 18114 7ff759966a5e 18107->18114 18111 7ff75995a100 _wfindfirst32i64 8 API calls 18108->18111 18109->18108 18112 7ff759966ae8 _wfindfirst32i64 10 API calls 18110->18112 18115 7ff759966a0c 18111->18115 18116 7ff759966a9e 18112->18116 18113->18106 18117 7ff759966a51 18113->18117 18118 7ff759966088 _get_daylight 11 API calls 18114->18118 18119 7ff759966ae8 _wfindfirst32i64 10 API calls 18116->18119 18120 7ff759966088 _get_daylight 11 API calls 18117->18120 18118->18108 18121 7ff759966aac 18119->18121 18120->18108 18122 7ff75996f9a4 _wfindfirst32i64 37 API calls 18121->18122 18123 7ff759966aca 18122->18123 18123->18108 18124 7ff759966ad2 18123->18124 18125 7ff759969f30 _wfindfirst32i64 17 API calls 18124->18125 18126 7ff759966ae6 18125->18126 18128 7ff759966b06 FileTimeToSystemTime 18127->18128 18129 7ff759966b00 18127->18129 18130 7ff759966b15 SystemTimeToTzSpecificLocalTime 18128->18130 18131 7ff759966b2b 18128->18131 18129->18128 18129->18131 18130->18131 18132 7ff75995a100 _wfindfirst32i64 8 API calls 18131->18132 18133 7ff759966965 18132->18133 18133->18081 19495 7ff759979577 19496 7ff759979587 19495->19496 19499 7ff759964398 LeaveCriticalSection 19496->19499 19135 7ff75996a600 19136 7ff75996a605 19135->19136 19140 7ff75996a61a 19135->19140 19141 7ff75996a620 19136->19141 19142 7ff75996a66a 19141->19142 19143 7ff75996a662 19141->19143 19145 7ff759969f78 __free_lconv_num 11 API calls 19142->19145 19144 7ff759969f78 __free_lconv_num 11 API calls 19143->19144 19144->19142 19146 7ff75996a677 19145->19146 19147 7ff759969f78 __free_lconv_num 11 API calls 19146->19147 19148 7ff75996a684 19147->19148 19149 7ff759969f78 __free_lconv_num 11 API calls 19148->19149 19150 7ff75996a691 19149->19150 19151 7ff759969f78 __free_lconv_num 11 API calls 19150->19151 19152 7ff75996a69e 19151->19152 19153 7ff759969f78 __free_lconv_num 11 API calls 19152->19153 19154 7ff75996a6ab 19153->19154 19155 7ff759969f78 __free_lconv_num 11 API calls 19154->19155 19156 7ff75996a6b8 19155->19156 19157 7ff759969f78 __free_lconv_num 11 API calls 19156->19157 19158 7ff75996a6c5 19157->19158 19159 7ff759969f78 __free_lconv_num 11 API calls 19158->19159 19160 7ff75996a6d5 19159->19160 19161 7ff759969f78 __free_lconv_num 11 API calls 19160->19161 19162 7ff75996a6e5 19161->19162 19167 7ff75996a4c4 19162->19167 19181 7ff75996f808 EnterCriticalSection 19167->19181 18134 7ff75996fa88 18135 7ff75996faac 18134->18135 18138 7ff75996fabc 18134->18138 18136 7ff759966088 _get_daylight 11 API calls 18135->18136 18156 7ff75996fab1 18136->18156 18137 7ff75996fd9c 18140 7ff759966088 _get_daylight 11 API calls 18137->18140 18138->18137 18139 7ff75996fade 18138->18139 18141 7ff75996faff 18139->18141 18280 7ff759970144 18139->18280 18142 7ff75996fda1 18140->18142 18145 7ff75996fb71 18141->18145 18147 7ff75996fb25 18141->18147 18152 7ff75996fb65 18141->18152 18144 7ff759969f78 __free_lconv_num 11 API calls 18142->18144 18144->18156 18149 7ff75996deb8 _get_daylight 11 API calls 18145->18149 18166 7ff75996fb34 18145->18166 18146 7ff75996fc1e 18155 7ff75996fc3b 18146->18155 18163 7ff75996fc8d 18146->18163 18295 7ff75996867c 18147->18295 18153 7ff75996fb87 18149->18153 18151 7ff759969f78 __free_lconv_num 11 API calls 18151->18156 18152->18146 18152->18166 18301 7ff75997652c 18152->18301 18157 7ff759969f78 __free_lconv_num 11 API calls 18153->18157 18160 7ff759969f78 __free_lconv_num 11 API calls 18155->18160 18161 7ff75996fb95 18157->18161 18158 7ff75996fb4d 18158->18152 18165 7ff759970144 45 API calls 18158->18165 18159 7ff75996fb2f 18162 7ff759966088 _get_daylight 11 API calls 18159->18162 18164 7ff75996fc44 18160->18164 18161->18152 18161->18166 18168 7ff75996deb8 _get_daylight 11 API calls 18161->18168 18162->18166 18163->18166 18167 7ff75997257c 40 API calls 18163->18167 18175 7ff75996fc49 18164->18175 18337 7ff75997257c 18164->18337 18165->18152 18166->18151 18169 7ff75996fcca 18167->18169 18170 7ff75996fbb7 18168->18170 18171 7ff759969f78 __free_lconv_num 11 API calls 18169->18171 18173 7ff759969f78 __free_lconv_num 11 API calls 18170->18173 18174 7ff75996fcd4 18171->18174 18173->18152 18174->18166 18174->18175 18176 7ff75996fd90 18175->18176 18180 7ff75996deb8 _get_daylight 11 API calls 18175->18180 18178 7ff759969f78 __free_lconv_num 11 API calls 18176->18178 18177 7ff75996fc75 18179 7ff759969f78 __free_lconv_num 11 API calls 18177->18179 18178->18156 18179->18175 18181 7ff75996fd18 18180->18181 18182 7ff75996fd29 18181->18182 18183 7ff75996fd20 18181->18183 18185 7ff75996930c __std_exception_copy 37 API calls 18182->18185 18184 7ff759969f78 __free_lconv_num 11 API calls 18183->18184 18186 7ff75996fd27 18184->18186 18187 7ff75996fd38 18185->18187 18192 7ff759969f78 __free_lconv_num 11 API calls 18186->18192 18188 7ff75996fdcb 18187->18188 18189 7ff75996fd40 18187->18189 18191 7ff759969f30 _wfindfirst32i64 17 API calls 18188->18191 18346 7ff759976644 18189->18346 18194 7ff75996fddf 18191->18194 18192->18156 18197 7ff75996fe08 18194->18197 18204 7ff75996fe18 18194->18204 18195 7ff75996fd67 18199 7ff759966088 _get_daylight 11 API calls 18195->18199 18196 7ff75996fd88 18198 7ff759969f78 __free_lconv_num 11 API calls 18196->18198 18200 7ff759966088 _get_daylight 11 API calls 18197->18200 18198->18176 18202 7ff75996fd6c 18199->18202 18201 7ff75996fe0d 18200->18201 18205 7ff759969f78 __free_lconv_num 11 API calls 18202->18205 18203 7ff7599700fb 18207 7ff759966088 _get_daylight 11 API calls 18203->18207 18204->18203 18206 7ff75996fe3a 18204->18206 18205->18186 18208 7ff75996fe57 18206->18208 18265 7ff75997022c 18206->18265 18209 7ff759970100 18207->18209 18212 7ff75996fecb 18208->18212 18214 7ff75996fe7f 18208->18214 18224 7ff75996febf 18208->18224 18211 7ff759969f78 __free_lconv_num 11 API calls 18209->18211 18211->18201 18216 7ff75996fef3 18212->18216 18220 7ff75996deb8 _get_daylight 11 API calls 18212->18220 18232 7ff75996fe8e 18212->18232 18213 7ff75996ff7e 18222 7ff75996ff9b 18213->18222 18233 7ff75996ffee 18213->18233 18365 7ff7599686b8 18214->18365 18218 7ff75996deb8 _get_daylight 11 API calls 18216->18218 18216->18224 18216->18232 18223 7ff75996ff15 18218->18223 18219 7ff759969f78 __free_lconv_num 11 API calls 18219->18201 18225 7ff75996fee5 18220->18225 18229 7ff759969f78 __free_lconv_num 11 API calls 18222->18229 18230 7ff759969f78 __free_lconv_num 11 API calls 18223->18230 18224->18213 18224->18232 18371 7ff7599763ec 18224->18371 18231 7ff759969f78 __free_lconv_num 11 API calls 18225->18231 18226 7ff75996fe89 18228 7ff759966088 _get_daylight 11 API calls 18226->18228 18227 7ff75996fea7 18227->18224 18234 7ff75997022c 45 API calls 18227->18234 18228->18232 18236 7ff75996ffa4 18229->18236 18230->18224 18231->18216 18232->18219 18233->18232 18235 7ff75997257c 40 API calls 18233->18235 18234->18224 18237 7ff75997002c 18235->18237 18239 7ff75997257c 40 API calls 18236->18239 18244 7ff75996ffaa 18236->18244 18238 7ff759969f78 __free_lconv_num 11 API calls 18237->18238 18240 7ff759970036 18238->18240 18242 7ff75996ffd6 18239->18242 18240->18232 18240->18244 18241 7ff7599700ef 18243 7ff759969f78 __free_lconv_num 11 API calls 18241->18243 18245 7ff759969f78 __free_lconv_num 11 API calls 18242->18245 18243->18201 18244->18241 18244->18244 18246 7ff75996deb8 _get_daylight 11 API calls 18244->18246 18245->18244 18247 7ff75997007b 18246->18247 18248 7ff75997008c 18247->18248 18249 7ff759970083 18247->18249 18251 7ff75996f9a4 _wfindfirst32i64 37 API calls 18248->18251 18250 7ff759969f78 __free_lconv_num 11 API calls 18249->18250 18252 7ff75997008a 18250->18252 18253 7ff75997009a 18251->18253 18259 7ff759969f78 __free_lconv_num 11 API calls 18252->18259 18254 7ff7599700a2 SetEnvironmentVariableW 18253->18254 18255 7ff75997012f 18253->18255 18256 7ff7599700e7 18254->18256 18257 7ff7599700c6 18254->18257 18258 7ff759969f30 _wfindfirst32i64 17 API calls 18255->18258 18260 7ff759969f78 __free_lconv_num 11 API calls 18256->18260 18261 7ff759966088 _get_daylight 11 API calls 18257->18261 18262 7ff759970143 18258->18262 18259->18201 18260->18241 18263 7ff7599700cb 18261->18263 18264 7ff759969f78 __free_lconv_num 11 API calls 18263->18264 18264->18252 18266 7ff75997026c 18265->18266 18267 7ff75997024f 18265->18267 18268 7ff75996deb8 _get_daylight 11 API calls 18266->18268 18267->18208 18274 7ff759970290 18268->18274 18269 7ff7599702f1 18271 7ff759969f78 __free_lconv_num 11 API calls 18269->18271 18270 7ff75996936c __FrameHandler3::FrameUnwindToEmptyState 45 API calls 18272 7ff75997031a 18270->18272 18271->18267 18273 7ff75996deb8 _get_daylight 11 API calls 18273->18274 18274->18269 18274->18273 18275 7ff759969f78 __free_lconv_num 11 API calls 18274->18275 18276 7ff75996f9a4 _wfindfirst32i64 37 API calls 18274->18276 18277 7ff759970300 18274->18277 18279 7ff759970314 18274->18279 18275->18274 18276->18274 18278 7ff759969f30 _wfindfirst32i64 17 API calls 18277->18278 18278->18279 18279->18270 18281 7ff759970179 18280->18281 18282 7ff759970161 18280->18282 18283 7ff75996deb8 _get_daylight 11 API calls 18281->18283 18282->18141 18290 7ff75997019d 18283->18290 18284 7ff759970222 18286 7ff75996936c __FrameHandler3::FrameUnwindToEmptyState 45 API calls 18284->18286 18285 7ff7599701fe 18288 7ff759969f78 __free_lconv_num 11 API calls 18285->18288 18287 7ff759970228 18286->18287 18288->18282 18289 7ff75996deb8 _get_daylight 11 API calls 18289->18290 18290->18284 18290->18285 18290->18289 18291 7ff759969f78 __free_lconv_num 11 API calls 18290->18291 18292 7ff75996930c __std_exception_copy 37 API calls 18290->18292 18293 7ff75997020d 18290->18293 18291->18290 18292->18290 18294 7ff759969f30 _wfindfirst32i64 17 API calls 18293->18294 18294->18284 18296 7ff75996868c 18295->18296 18298 7ff759968695 18295->18298 18296->18298 18395 7ff759968154 18296->18395 18298->18158 18298->18159 18302 7ff7599756dc 18301->18302 18303 7ff759976539 18301->18303 18304 7ff7599756e9 18302->18304 18309 7ff75997571f 18302->18309 18305 7ff759964a84 45 API calls 18303->18305 18308 7ff759966088 _get_daylight 11 API calls 18304->18308 18324 7ff759975690 18304->18324 18306 7ff75997656d 18305->18306 18310 7ff759976572 18306->18310 18314 7ff759976583 18306->18314 18317 7ff75997659a 18306->18317 18307 7ff759975749 18311 7ff759966088 _get_daylight 11 API calls 18307->18311 18312 7ff7599756f3 18308->18312 18309->18307 18313 7ff75997576e 18309->18313 18310->18152 18315 7ff75997574e 18311->18315 18316 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18312->18316 18323 7ff759964a84 45 API calls 18313->18323 18327 7ff759975759 18313->18327 18318 7ff759966088 _get_daylight 11 API calls 18314->18318 18319 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18315->18319 18320 7ff7599756fe 18316->18320 18321 7ff7599765b6 18317->18321 18322 7ff7599765a4 18317->18322 18325 7ff759976588 18318->18325 18319->18327 18320->18152 18328 7ff7599765de 18321->18328 18329 7ff7599765c7 18321->18329 18326 7ff759966088 _get_daylight 11 API calls 18322->18326 18323->18327 18324->18152 18330 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18325->18330 18331 7ff7599765a9 18326->18331 18327->18152 18636 7ff759978408 18328->18636 18627 7ff75997572c 18329->18627 18330->18310 18334 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18331->18334 18334->18310 18336 7ff759966088 _get_daylight 11 API calls 18336->18310 18338 7ff75997259e 18337->18338 18339 7ff7599725bb 18337->18339 18338->18339 18341 7ff7599725ac 18338->18341 18340 7ff7599725c5 18339->18340 18676 7ff759977038 18339->18676 18683 7ff75996fa0c 18340->18683 18342 7ff759966088 _get_daylight 11 API calls 18341->18342 18344 7ff7599725b1 memcpy_s 18342->18344 18344->18177 18347 7ff759964a84 45 API calls 18346->18347 18348 7ff7599766aa 18347->18348 18349 7ff7599766b8 18348->18349 18350 7ff75996e144 5 API calls 18348->18350 18351 7ff75996456c 14 API calls 18349->18351 18350->18349 18352 7ff759976714 18351->18352 18353 7ff7599767a4 18352->18353 18354 7ff759964a84 45 API calls 18352->18354 18356 7ff7599767b5 18353->18356 18359 7ff759969f78 __free_lconv_num 11 API calls 18353->18359 18355 7ff759976727 18354->18355 18358 7ff759976730 18355->18358 18361 7ff75996e144 5 API calls 18355->18361 18357 7ff75996fd63 18356->18357 18360 7ff759969f78 __free_lconv_num 11 API calls 18356->18360 18357->18195 18357->18196 18362 7ff75996456c 14 API calls 18358->18362 18359->18356 18360->18357 18361->18358 18363 7ff75997678b 18362->18363 18363->18353 18364 7ff759976793 SetEnvironmentVariableW 18363->18364 18364->18353 18366 7ff7599686d1 18365->18366 18367 7ff7599686c8 18365->18367 18366->18226 18366->18227 18367->18366 18368 7ff7599681c8 40 API calls 18367->18368 18369 7ff7599686da 18368->18369 18369->18366 18370 7ff759968588 12 API calls 18369->18370 18370->18366 18372 7ff7599763f9 18371->18372 18376 7ff759976426 18371->18376 18373 7ff7599763fe 18372->18373 18372->18376 18374 7ff759966088 _get_daylight 11 API calls 18373->18374 18377 7ff759976403 18374->18377 18375 7ff75997646a 18378 7ff759966088 _get_daylight 11 API calls 18375->18378 18376->18375 18379 7ff759976489 18376->18379 18390 7ff75997645e __crtLCMapStringW 18376->18390 18380 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18377->18380 18381 7ff75997646f 18378->18381 18382 7ff7599764a5 18379->18382 18383 7ff759976493 18379->18383 18384 7ff75997640e 18380->18384 18385 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18381->18385 18387 7ff759964a84 45 API calls 18382->18387 18386 7ff759966088 _get_daylight 11 API calls 18383->18386 18384->18224 18385->18390 18388 7ff759976498 18386->18388 18389 7ff7599764b2 18387->18389 18391 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18388->18391 18389->18390 18695 7ff759977fc4 18389->18695 18390->18224 18391->18390 18394 7ff759966088 _get_daylight 11 API calls 18394->18390 18396 7ff75996816d 18395->18396 18397 7ff759968169 18395->18397 18418 7ff7599717b0 18396->18418 18397->18298 18410 7ff7599684a8 18397->18410 18402 7ff75996818b 18444 7ff759968238 18402->18444 18403 7ff75996817f 18404 7ff759969f78 __free_lconv_num 11 API calls 18403->18404 18404->18397 18407 7ff759969f78 __free_lconv_num 11 API calls 18408 7ff7599681b2 18407->18408 18409 7ff759969f78 __free_lconv_num 11 API calls 18408->18409 18409->18397 18411 7ff7599684d1 18410->18411 18416 7ff7599684ea 18410->18416 18411->18298 18412 7ff75996f138 WideCharToMultiByte 18412->18416 18413 7ff75996deb8 _get_daylight 11 API calls 18413->18416 18414 7ff75996857a 18415 7ff759969f78 __free_lconv_num 11 API calls 18414->18415 18415->18411 18416->18411 18416->18412 18416->18413 18416->18414 18417 7ff759969f78 __free_lconv_num 11 API calls 18416->18417 18417->18416 18419 7ff7599717bd 18418->18419 18420 7ff759968172 18418->18420 18463 7ff75996a854 18419->18463 18424 7ff759971aec GetEnvironmentStringsW 18420->18424 18425 7ff759971b1c 18424->18425 18426 7ff759968177 18424->18426 18427 7ff75996f138 WideCharToMultiByte 18425->18427 18426->18402 18426->18403 18428 7ff759971b6d 18427->18428 18429 7ff759971b74 FreeEnvironmentStringsW 18428->18429 18430 7ff75996cc2c _fread_nolock 12 API calls 18428->18430 18429->18426 18431 7ff759971b87 18430->18431 18432 7ff759971b98 18431->18432 18433 7ff759971b8f 18431->18433 18434 7ff75996f138 WideCharToMultiByte 18432->18434 18435 7ff759969f78 __free_lconv_num 11 API calls 18433->18435 18437 7ff759971bbb 18434->18437 18436 7ff759971b96 18435->18436 18436->18429 18438 7ff759971bc9 18437->18438 18439 7ff759971bbf 18437->18439 18441 7ff759969f78 __free_lconv_num 11 API calls 18438->18441 18440 7ff759969f78 __free_lconv_num 11 API calls 18439->18440 18442 7ff759971bc7 FreeEnvironmentStringsW 18440->18442 18441->18442 18442->18426 18445 7ff75996825d 18444->18445 18446 7ff75996deb8 _get_daylight 11 API calls 18445->18446 18457 7ff759968293 18446->18457 18447 7ff75996829b 18448 7ff759969f78 __free_lconv_num 11 API calls 18447->18448 18449 7ff759968193 18448->18449 18449->18407 18450 7ff75996830e 18451 7ff759969f78 __free_lconv_num 11 API calls 18450->18451 18451->18449 18452 7ff75996deb8 _get_daylight 11 API calls 18452->18457 18453 7ff7599682fd 18454 7ff759968464 11 API calls 18453->18454 18456 7ff759968305 18454->18456 18455 7ff75996930c __std_exception_copy 37 API calls 18455->18457 18459 7ff759969f78 __free_lconv_num 11 API calls 18456->18459 18457->18447 18457->18450 18457->18452 18457->18453 18457->18455 18458 7ff759968333 18457->18458 18460 7ff759969f78 __free_lconv_num 11 API calls 18457->18460 18461 7ff759969f30 _wfindfirst32i64 17 API calls 18458->18461 18459->18447 18460->18457 18462 7ff759968346 18461->18462 18464 7ff75996a865 FlsGetValue 18463->18464 18465 7ff75996a880 FlsSetValue 18463->18465 18466 7ff75996a87a 18464->18466 18467 7ff75996a872 18464->18467 18465->18467 18468 7ff75996a88d 18465->18468 18466->18465 18470 7ff75996a878 18467->18470 18471 7ff75996936c __FrameHandler3::FrameUnwindToEmptyState 45 API calls 18467->18471 18469 7ff75996deb8 _get_daylight 11 API calls 18468->18469 18472 7ff75996a89c 18469->18472 18483 7ff759971484 18470->18483 18473 7ff75996a8f5 18471->18473 18474 7ff75996a8ba FlsSetValue 18472->18474 18475 7ff75996a8aa FlsSetValue 18472->18475 18477 7ff75996a8d8 18474->18477 18478 7ff75996a8c6 FlsSetValue 18474->18478 18476 7ff75996a8b3 18475->18476 18479 7ff759969f78 __free_lconv_num 11 API calls 18476->18479 18480 7ff75996a524 _get_daylight 11 API calls 18477->18480 18478->18476 18479->18467 18481 7ff75996a8e0 18480->18481 18482 7ff759969f78 __free_lconv_num 11 API calls 18481->18482 18482->18470 18506 7ff7599716f4 18483->18506 18485 7ff7599714b9 18521 7ff759971184 18485->18521 18488 7ff75996cc2c _fread_nolock 12 API calls 18489 7ff7599714e7 18488->18489 18490 7ff7599714ef 18489->18490 18492 7ff7599714fe 18489->18492 18491 7ff759969f78 __free_lconv_num 11 API calls 18490->18491 18505 7ff7599714d6 18491->18505 18492->18492 18528 7ff75997182c 18492->18528 18495 7ff7599715fa 18497 7ff759966088 _get_daylight 11 API calls 18495->18497 18496 7ff759971614 18498 7ff759971655 18496->18498 18502 7ff759969f78 __free_lconv_num 11 API calls 18496->18502 18499 7ff7599715ff 18497->18499 18500 7ff7599716bc 18498->18500 18539 7ff759970fb4 18498->18539 18501 7ff759969f78 __free_lconv_num 11 API calls 18499->18501 18504 7ff759969f78 __free_lconv_num 11 API calls 18500->18504 18501->18505 18502->18498 18504->18505 18505->18420 18507 7ff759971717 18506->18507 18509 7ff759971721 18507->18509 18554 7ff75996f808 EnterCriticalSection 18507->18554 18511 7ff759971793 18509->18511 18512 7ff75996936c __FrameHandler3::FrameUnwindToEmptyState 45 API calls 18509->18512 18511->18485 18514 7ff7599717ab 18512->18514 18516 7ff759971802 18514->18516 18518 7ff75996a854 50 API calls 18514->18518 18516->18485 18519 7ff7599717ec 18518->18519 18520 7ff759971484 65 API calls 18519->18520 18520->18516 18522 7ff759964a84 45 API calls 18521->18522 18523 7ff759971198 18522->18523 18524 7ff7599711b6 18523->18524 18525 7ff7599711a4 GetOEMCP 18523->18525 18526 7ff7599711bb GetACP 18524->18526 18527 7ff7599711cb 18524->18527 18525->18527 18526->18527 18527->18488 18527->18505 18529 7ff759971184 47 API calls 18528->18529 18531 7ff759971859 18529->18531 18530 7ff7599719af 18533 7ff75995a100 _wfindfirst32i64 8 API calls 18530->18533 18531->18530 18532 7ff759971896 IsValidCodePage 18531->18532 18538 7ff7599718b0 memcpy_s 18531->18538 18532->18530 18535 7ff7599718a7 18532->18535 18534 7ff7599715f1 18533->18534 18534->18495 18534->18496 18536 7ff7599718d6 GetCPInfo 18535->18536 18535->18538 18536->18530 18536->18538 18555 7ff75997129c 18538->18555 18626 7ff75996f808 EnterCriticalSection 18539->18626 18556 7ff7599712d9 GetCPInfo 18555->18556 18557 7ff7599713cf 18555->18557 18556->18557 18562 7ff7599712ec 18556->18562 18558 7ff75995a100 _wfindfirst32i64 8 API calls 18557->18558 18560 7ff75997146e 18558->18560 18560->18530 18566 7ff759971fe0 18562->18566 18565 7ff759976f84 54 API calls 18565->18557 18567 7ff759964a84 45 API calls 18566->18567 18568 7ff759972022 18567->18568 18569 7ff75996e870 _fread_nolock MultiByteToWideChar 18568->18569 18570 7ff759972058 18569->18570 18571 7ff75997205f 18570->18571 18572 7ff75997211c 18570->18572 18573 7ff75996cc2c _fread_nolock 12 API calls 18570->18573 18577 7ff759972088 memcpy_s 18570->18577 18574 7ff75995a100 _wfindfirst32i64 8 API calls 18571->18574 18572->18571 18576 7ff759969f78 __free_lconv_num 11 API calls 18572->18576 18573->18577 18575 7ff759971363 18574->18575 18581 7ff759976f84 18575->18581 18576->18571 18577->18572 18578 7ff75996e870 _fread_nolock MultiByteToWideChar 18577->18578 18579 7ff7599720fe 18578->18579 18579->18572 18580 7ff759972102 GetStringTypeW 18579->18580 18580->18572 18582 7ff759964a84 45 API calls 18581->18582 18583 7ff759976fa9 18582->18583 18586 7ff759976c50 18583->18586 18587 7ff759976c91 18586->18587 18588 7ff75996e870 _fread_nolock MultiByteToWideChar 18587->18588 18593 7ff759976cdb 18588->18593 18589 7ff759976f59 18590 7ff75995a100 _wfindfirst32i64 8 API calls 18589->18590 18592 7ff759971396 18590->18592 18591 7ff759976e11 18591->18589 18596 7ff759969f78 __free_lconv_num 11 API calls 18591->18596 18592->18565 18593->18589 18593->18591 18594 7ff75996cc2c _fread_nolock 12 API calls 18593->18594 18595 7ff759976d13 18593->18595 18594->18595 18595->18591 18597 7ff75996e870 _fread_nolock MultiByteToWideChar 18595->18597 18596->18589 18598 7ff759976d86 18597->18598 18598->18591 18617 7ff75996e304 18598->18617 18601 7ff759976dd1 18601->18591 18603 7ff75996e304 __crtLCMapStringW 6 API calls 18601->18603 18602 7ff759976e22 18604 7ff75996cc2c _fread_nolock 12 API calls 18602->18604 18605 7ff759976ef4 18602->18605 18607 7ff759976e40 18602->18607 18603->18591 18604->18607 18605->18591 18606 7ff759969f78 __free_lconv_num 11 API calls 18605->18606 18606->18591 18607->18591 18608 7ff75996e304 __crtLCMapStringW 6 API calls 18607->18608 18609 7ff759976ec0 18608->18609 18609->18605 18610 7ff759976ef6 18609->18610 18611 7ff759976ee0 18609->18611 18613 7ff75996f138 WideCharToMultiByte 18610->18613 18612 7ff75996f138 WideCharToMultiByte 18611->18612 18614 7ff759976eee 18612->18614 18613->18614 18614->18605 18615 7ff759976f0e 18614->18615 18615->18591 18616 7ff759969f78 __free_lconv_num 11 API calls 18615->18616 18616->18591 18618 7ff75996df30 __crtLCMapStringW 5 API calls 18617->18618 18619 7ff75996e342 18618->18619 18620 7ff75996e34a 18619->18620 18623 7ff75996e3f0 18619->18623 18620->18591 18620->18601 18620->18602 18622 7ff75996e3b3 LCMapStringW 18622->18620 18624 7ff75996df30 __crtLCMapStringW 5 API calls 18623->18624 18625 7ff75996e41e __crtLCMapStringW 18624->18625 18625->18622 18628 7ff759975749 18627->18628 18629 7ff759975760 18627->18629 18630 7ff759966088 _get_daylight 11 API calls 18628->18630 18629->18628 18631 7ff75997576e 18629->18631 18632 7ff75997574e 18630->18632 18634 7ff759964a84 45 API calls 18631->18634 18635 7ff759975759 18631->18635 18633 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18632->18633 18633->18635 18634->18635 18635->18310 18637 7ff759964a84 45 API calls 18636->18637 18638 7ff75997842d 18637->18638 18641 7ff759978084 18638->18641 18643 7ff7599780d2 18641->18643 18642 7ff75995a100 _wfindfirst32i64 8 API calls 18644 7ff759976605 18642->18644 18645 7ff759978159 18643->18645 18647 7ff759978144 GetCPInfo 18643->18647 18648 7ff75997815d 18643->18648 18644->18310 18644->18336 18646 7ff75996e870 _fread_nolock MultiByteToWideChar 18645->18646 18645->18648 18649 7ff7599781f1 18646->18649 18647->18645 18647->18648 18648->18642 18649->18648 18650 7ff75996cc2c _fread_nolock 12 API calls 18649->18650 18651 7ff759978228 18649->18651 18650->18651 18651->18648 18652 7ff75996e870 _fread_nolock MultiByteToWideChar 18651->18652 18653 7ff759978296 18652->18653 18654 7ff759978378 18653->18654 18655 7ff75996e870 _fread_nolock MultiByteToWideChar 18653->18655 18654->18648 18656 7ff759969f78 __free_lconv_num 11 API calls 18654->18656 18657 7ff7599782bc 18655->18657 18656->18648 18657->18654 18658 7ff75996cc2c _fread_nolock 12 API calls 18657->18658 18659 7ff7599782e9 18657->18659 18658->18659 18659->18654 18660 7ff75996e870 _fread_nolock MultiByteToWideChar 18659->18660 18661 7ff759978360 18660->18661 18662 7ff759978366 18661->18662 18663 7ff759978380 18661->18663 18662->18654 18666 7ff759969f78 __free_lconv_num 11 API calls 18662->18666 18670 7ff75996e188 18663->18670 18666->18654 18667 7ff7599783bf 18667->18648 18669 7ff759969f78 __free_lconv_num 11 API calls 18667->18669 18668 7ff759969f78 __free_lconv_num 11 API calls 18668->18667 18669->18648 18671 7ff75996df30 __crtLCMapStringW 5 API calls 18670->18671 18672 7ff75996e1c6 18671->18672 18673 7ff75996e1ce 18672->18673 18674 7ff75996e3f0 __crtLCMapStringW 5 API calls 18672->18674 18673->18667 18673->18668 18675 7ff75996e237 CompareStringW 18674->18675 18675->18673 18677 7ff75997705a HeapSize 18676->18677 18678 7ff759977041 18676->18678 18679 7ff759966088 _get_daylight 11 API calls 18678->18679 18680 7ff759977046 18679->18680 18681 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18680->18681 18682 7ff759977051 18681->18682 18682->18340 18684 7ff75996fa2b 18683->18684 18685 7ff75996fa21 18683->18685 18687 7ff75996fa30 18684->18687 18693 7ff75996fa37 _get_daylight 18684->18693 18686 7ff75996cc2c _fread_nolock 12 API calls 18685->18686 18691 7ff75996fa29 18686->18691 18688 7ff759969f78 __free_lconv_num 11 API calls 18687->18688 18688->18691 18689 7ff75996fa3d 18692 7ff759966088 _get_daylight 11 API calls 18689->18692 18690 7ff75996fa6a HeapReAlloc 18690->18691 18690->18693 18691->18344 18692->18691 18693->18689 18693->18690 18694 7ff759972730 _get_daylight 2 API calls 18693->18694 18694->18693 18697 7ff759977fed __crtLCMapStringW 18695->18697 18696 7ff7599764ee 18696->18390 18696->18394 18697->18696 18698 7ff75996e188 6 API calls 18697->18698 18698->18696 19531 7ff759979792 19532 7ff7599797ab 19531->19532 19533 7ff7599797a1 19531->19533 19535 7ff75996f868 LeaveCriticalSection 19533->19535 17970 7ff75996e95c 17971 7ff75996eb4e 17970->17971 17973 7ff75996e99e _isindst 17970->17973 17972 7ff759966088 _get_daylight 11 API calls 17971->17972 17988 7ff75996eb3e 17972->17988 17973->17971 17976 7ff75996ea1e _isindst 17973->17976 17974 7ff75995a100 _wfindfirst32i64 8 API calls 17975 7ff75996eb69 17974->17975 17991 7ff759975434 17976->17991 17981 7ff75996eb7a 17983 7ff759969f30 _wfindfirst32i64 17 API calls 17981->17983 17985 7ff75996eb8e 17983->17985 17988->17974 17989 7ff75996ea7b 17989->17988 18015 7ff759975478 17989->18015 17992 7ff759975443 17991->17992 17995 7ff75996ea3c 17991->17995 18022 7ff75996f808 EnterCriticalSection 17992->18022 17997 7ff759974838 17995->17997 17998 7ff759974841 17997->17998 18000 7ff75996ea51 17997->18000 17999 7ff759966088 _get_daylight 11 API calls 17998->17999 18001 7ff759974846 17999->18001 18000->17981 18003 7ff759974868 18000->18003 18002 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18001->18002 18002->18000 18004 7ff759974871 18003->18004 18008 7ff75996ea62 18003->18008 18005 7ff759966088 _get_daylight 11 API calls 18004->18005 18006 7ff759974876 18005->18006 18007 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18006->18007 18007->18008 18008->17981 18009 7ff759974898 18008->18009 18010 7ff75996ea73 18009->18010 18011 7ff7599748a1 18009->18011 18010->17981 18010->17989 18012 7ff759966088 _get_daylight 11 API calls 18011->18012 18013 7ff7599748a6 18012->18013 18014 7ff759969f10 _invalid_parameter_noinfo 37 API calls 18013->18014 18014->18010 18023 7ff75996f808 EnterCriticalSection 18015->18023 18699 7ff7599596f0 18700 7ff75995971e 18699->18700 18701 7ff759959705 18699->18701 18701->18700 18703 7ff75996cc2c 12 API calls 18701->18703 18702 7ff75995977c 18703->18702 19568 7ff759970870 19579 7ff7599767e4 19568->19579 19580 7ff7599767f1 19579->19580 19581 7ff759969f78 __free_lconv_num 11 API calls 19580->19581 19582 7ff75997680d 19580->19582 19581->19580 19583 7ff759969f78 __free_lconv_num 11 API calls 19582->19583 19584 7ff759970879 19582->19584 19583->19582 19585 7ff75996f808 EnterCriticalSection 19584->19585

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 135 7ff759974ea0-7ff759974edb call 7ff759974828 call 7ff759974830 call 7ff759974898 142 7ff759975105-7ff759975151 call 7ff759969f30 call 7ff759974828 call 7ff759974830 call 7ff759974898 135->142 143 7ff759974ee1-7ff759974eec call 7ff759974838 135->143 169 7ff759975157-7ff759975162 call 7ff759974838 142->169 170 7ff75997528f-7ff7599752fd call 7ff759969f30 call 7ff759970738 142->170 143->142 148 7ff759974ef2-7ff759974efc 143->148 150 7ff759974f1e-7ff759974f22 148->150 151 7ff759974efe-7ff759974f01 148->151 155 7ff759974f25-7ff759974f2d 150->155 154 7ff759974f04-7ff759974f0f 151->154 157 7ff759974f1a-7ff759974f1c 154->157 158 7ff759974f11-7ff759974f18 154->158 155->155 159 7ff759974f2f-7ff759974f42 call 7ff75996cc2c 155->159 157->150 162 7ff759974f4b-7ff759974f59 157->162 158->154 158->157 165 7ff759974f5a-7ff759974f66 call 7ff759969f78 159->165 166 7ff759974f44-7ff759974f46 call 7ff759969f78 159->166 176 7ff759974f6d-7ff759974f75 165->176 166->162 169->170 178 7ff759975168-7ff759975173 call 7ff759974868 169->178 187 7ff75997530b-7ff75997530e 170->187 188 7ff7599752ff-7ff759975306 170->188 176->176 179 7ff759974f77-7ff759974f88 call 7ff75996f9a4 176->179 178->170 189 7ff759975179-7ff75997519c call 7ff759969f78 GetTimeZoneInformation 178->189 179->142 190 7ff759974f8e-7ff759974fe4 call 7ff75995b880 * 4 call 7ff759974dbc 179->190 192 7ff759975345-7ff759975358 call 7ff75996cc2c 187->192 193 7ff759975310 187->193 191 7ff75997539b-7ff75997539e 188->191 204 7ff759975264-7ff75997528e call 7ff759974820 call 7ff759974810 call 7ff759974818 189->204 205 7ff7599751a2-7ff7599751c3 189->205 247 7ff759974fe6-7ff759974fea 190->247 196 7ff759975313 call 7ff75997511c 191->196 197 7ff7599753a4-7ff7599753ac call 7ff759974ea0 191->197 211 7ff75997535a 192->211 212 7ff759975363-7ff75997537e call 7ff759970738 192->212 193->196 209 7ff759975318-7ff759975344 call 7ff759969f78 call 7ff75995a100 196->209 197->209 213 7ff7599751ce-7ff7599751d5 205->213 214 7ff7599751c5-7ff7599751cb 205->214 221 7ff75997535c-7ff759975361 call 7ff759969f78 211->221 232 7ff759975385-7ff759975397 call 7ff759969f78 212->232 233 7ff759975380-7ff759975383 212->233 216 7ff7599751e9 213->216 217 7ff7599751d7-7ff7599751df 213->217 214->213 224 7ff7599751eb-7ff75997525f call 7ff75995b880 * 4 call 7ff759971cfc call 7ff7599753b4 * 2 216->224 217->216 223 7ff7599751e1-7ff7599751e7 217->223 221->193 223->224 224->204 232->191 233->221 249 7ff759974fec 247->249 250 7ff759974ff0-7ff759974ff4 247->250 249->250 250->247 252 7ff759974ff6-7ff75997501b call 7ff759977ce4 250->252 258 7ff75997501e-7ff759975022 252->258 260 7ff759975024-7ff75997502f 258->260 261 7ff759975031-7ff759975035 258->261 260->261 263 7ff759975037-7ff75997503b 260->263 261->258 266 7ff75997503d-7ff759975065 call 7ff759977ce4 263->266 267 7ff7599750bc-7ff7599750c0 263->267 275 7ff759975067 266->275 276 7ff759975083-7ff759975087 266->276 269 7ff7599750c7-7ff7599750d4 267->269 270 7ff7599750c2-7ff7599750c4 267->270 271 7ff7599750d6-7ff7599750ec call 7ff759974dbc 269->271 272 7ff7599750ef-7ff7599750fe call 7ff759974820 call 7ff759974810 269->272 270->269 271->272 272->142 279 7ff75997506a-7ff759975071 275->279 276->267 281 7ff759975089-7ff7599750a7 call 7ff759977ce4 276->281 279->276 282 7ff759975073-7ff759975081 279->282 287 7ff7599750b3-7ff7599750ba 281->287 282->276 282->279 287->267 288 7ff7599750a9-7ff7599750ad 287->288 288->267 289 7ff7599750af 288->289 289->287
                                                        APIs
                                                        • _get_daylight.LIBCMT ref: 00007FF759974EE5
                                                          • Part of subcall function 00007FF759974838: _invalid_parameter_noinfo.LIBCMT ref: 00007FF75997484C
                                                          • Part of subcall function 00007FF759969F78: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF759971EC2,?,?,?,00007FF759971EFF,?,?,00000000,00007FF7599723C5,?,?,00000000,00007FF7599722F7), ref: 00007FF759969F8E
                                                          • Part of subcall function 00007FF759969F78: GetLastError.KERNEL32(?,?,?,00007FF759971EC2,?,?,?,00007FF759971EFF,?,?,00000000,00007FF7599723C5,?,?,00000000,00007FF7599722F7), ref: 00007FF759969F98
                                                          • Part of subcall function 00007FF759969F30: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF759969F0F,?,?,?,?,?,00007FF759961A40), ref: 00007FF759969F39
                                                          • Part of subcall function 00007FF759969F30: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF759969F0F,?,?,?,?,?,00007FF759961A40), ref: 00007FF759969F5E
                                                        • _get_daylight.LIBCMT ref: 00007FF759974ED4
                                                          • Part of subcall function 00007FF759974898: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7599748AC
                                                        • _get_daylight.LIBCMT ref: 00007FF75997514A
                                                        • _get_daylight.LIBCMT ref: 00007FF75997515B
                                                        • _get_daylight.LIBCMT ref: 00007FF75997516C
                                                        • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF7599753AC), ref: 00007FF759975193
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _get_daylight$_invalid_parameter_noinfo$BoundaryCurrentDeleteDescriptorErrorFeatureInformationLastPresentProcessProcessorTimeZone
                                                        • String ID: Eastern Standard Time$Eastern Summer Time
                                                        • API String ID: 3714727158-239921721
                                                        • Opcode ID: aa85b069b6fb92bd10a5b6d5be9144cf64bbc0ff06c8fbb0fdd7caf4b6a87e0b
                                                        • Instruction ID: 6bc84ef92ad5c217dc5fdb3a69a0f2c6a7b7d43f64f89a599a6eecbcb828eae8
                                                        • Opcode Fuzzy Hash: aa85b069b6fb92bd10a5b6d5be9144cf64bbc0ff06c8fbb0fdd7caf4b6a87e0b
                                                        • Instruction Fuzzy Hash: DCD1C066E1824286EB60BF25D8811B9E371FFC6784FC89136EA0D47696DF3CE441C7A0

                                                        Control-flow Graph

                                                        APIs
                                                        • GetTempPathW.KERNEL32(?,00000000,?,00007FF7599558AD), ref: 00007FF75995597A
                                                        • GetCurrentProcessId.KERNEL32(?,00007FF7599558AD), ref: 00007FF759955980
                                                          • Part of subcall function 00007FF759955AF0: GetEnvironmentVariableW.KERNEL32(00007FF759952817,?,?,?,?,?,?), ref: 00007FF759955B2A
                                                          • Part of subcall function 00007FF759955AF0: ExpandEnvironmentStringsW.KERNEL32(?,?,?,?,?,?), ref: 00007FF759955B47
                                                          • Part of subcall function 00007FF759966818: _invalid_parameter_noinfo.LIBCMT ref: 00007FF759966831
                                                        • SetEnvironmentVariableW.KERNEL32(?,TokenIntegrityLevel), ref: 00007FF759955A31
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Environment$Variable$CurrentExpandPathProcessStringsTemp_invalid_parameter_noinfo
                                                        • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                                        • API String ID: 1556224225-1116378104
                                                        • Opcode ID: c805534fc36cce2f638f5d4b2e31efb0a3bdcbd638384fcea02245f06552b5c8
                                                        • Instruction ID: 93277449ee78579f757eb180dca41a26a7c993466d0237072a5309200c12a8f5
                                                        • Opcode Fuzzy Hash: c805534fc36cce2f638f5d4b2e31efb0a3bdcbd638384fcea02245f06552b5c8
                                                        • Instruction Fuzzy Hash: F3518D50B0D68351FA55BF62A9552BAD2A1AFD6BC0FCD4035EC0E8B797EF2CE4018720

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 390 7ff759975dec-7ff759975e5f call 7ff759975b20 393 7ff759975e79-7ff759975e83 call 7ff759966e60 390->393 394 7ff759975e61-7ff759975e6a call 7ff759966068 390->394 400 7ff759975e9e-7ff759975f07 CreateFileW 393->400 401 7ff759975e85-7ff759975e9c call 7ff759966068 call 7ff759966088 393->401 399 7ff759975e6d-7ff759975e74 call 7ff759966088 394->399 413 7ff7599761ba-7ff7599761da 399->413 404 7ff759975f09-7ff759975f0f 400->404 405 7ff759975f84-7ff759975f8f GetFileType 400->405 401->399 410 7ff759975f51-7ff759975f7f GetLastError call 7ff759965ffc 404->410 411 7ff759975f11-7ff759975f15 404->411 407 7ff759975f91-7ff759975fcc GetLastError call 7ff759965ffc CloseHandle 405->407 408 7ff759975fe2-7ff759975fe9 405->408 407->399 424 7ff759975fd2-7ff759975fdd call 7ff759966088 407->424 416 7ff759975feb-7ff759975fef 408->416 417 7ff759975ff1-7ff759975ff4 408->417 410->399 411->410 418 7ff759975f17-7ff759975f4f CreateFileW 411->418 422 7ff759975ffa-7ff75997604f call 7ff759966d78 416->422 417->422 423 7ff759975ff6 417->423 418->405 418->410 428 7ff75997606e-7ff75997609f call 7ff7599758a0 422->428 429 7ff759976051-7ff75997605d call 7ff759975d28 422->429 423->422 424->399 436 7ff7599760a5-7ff7599760e7 428->436 437 7ff7599760a1-7ff7599760a3 428->437 429->428 435 7ff75997605f 429->435 438 7ff759976061-7ff759976069 call 7ff75996a0f0 435->438 439 7ff759976109-7ff759976114 436->439 440 7ff7599760e9-7ff7599760ed 436->440 437->438 438->413 441 7ff75997611a-7ff75997611e 439->441 442 7ff7599761b8 439->442 440->439 444 7ff7599760ef-7ff759976104 440->444 441->442 445 7ff759976124-7ff759976169 CloseHandle CreateFileW 441->445 442->413 444->439 447 7ff75997619e-7ff7599761b3 445->447 448 7ff75997616b-7ff759976199 GetLastError call 7ff759965ffc call 7ff759966fa0 445->448 447->442 448->447
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                        • String ID:
                                                        • API String ID: 1617910340-0
                                                        • Opcode ID: 52a4378cdb78c32285671ba8c66096e739a338fe2dbd84037285ee5c330aca07
                                                        • Instruction ID: 33bf0895a9f886bd93a0cd8c299c3f1e286768b4eaffff7a83aa6c252b17aafe
                                                        • Opcode Fuzzy Hash: 52a4378cdb78c32285671ba8c66096e739a338fe2dbd84037285ee5c330aca07
                                                        • Instruction Fuzzy Hash: AFC1E332B28A8285EB50EF65C4902AC7771FB8AB98F890235DE1E577D5DF38D055C350

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 795 7ff75997511c-7ff759975151 call 7ff759974828 call 7ff759974830 call 7ff759974898 802 7ff759975157-7ff759975162 call 7ff759974838 795->802 803 7ff75997528f-7ff7599752fd call 7ff759969f30 call 7ff759970738 795->803 802->803 808 7ff759975168-7ff759975173 call 7ff759974868 802->808 814 7ff75997530b-7ff75997530e 803->814 815 7ff7599752ff-7ff759975306 803->815 808->803 816 7ff759975179-7ff75997519c call 7ff759969f78 GetTimeZoneInformation 808->816 818 7ff759975345-7ff759975358 call 7ff75996cc2c 814->818 819 7ff759975310 814->819 817 7ff75997539b-7ff75997539e 815->817 828 7ff759975264-7ff75997528e call 7ff759974820 call 7ff759974810 call 7ff759974818 816->828 829 7ff7599751a2-7ff7599751c3 816->829 821 7ff759975313 call 7ff75997511c 817->821 822 7ff7599753a4-7ff7599753ac call 7ff759974ea0 817->822 833 7ff75997535a 818->833 834 7ff759975363-7ff75997537e call 7ff759970738 818->834 819->821 831 7ff759975318-7ff759975344 call 7ff759969f78 call 7ff75995a100 821->831 822->831 835 7ff7599751ce-7ff7599751d5 829->835 836 7ff7599751c5-7ff7599751cb 829->836 842 7ff75997535c-7ff759975361 call 7ff759969f78 833->842 851 7ff759975385-7ff759975397 call 7ff759969f78 834->851 852 7ff759975380-7ff759975383 834->852 837 7ff7599751e9 835->837 838 7ff7599751d7-7ff7599751df 835->838 836->835 844 7ff7599751eb-7ff75997525f call 7ff75995b880 * 4 call 7ff759971cfc call 7ff7599753b4 * 2 837->844 838->837 843 7ff7599751e1-7ff7599751e7 838->843 842->819 843->844 844->828 851->817 852->842
                                                        APIs
                                                        • _get_daylight.LIBCMT ref: 00007FF75997514A
                                                          • Part of subcall function 00007FF759974898: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7599748AC
                                                        • _get_daylight.LIBCMT ref: 00007FF75997515B
                                                          • Part of subcall function 00007FF759974838: _invalid_parameter_noinfo.LIBCMT ref: 00007FF75997484C
                                                        • _get_daylight.LIBCMT ref: 00007FF75997516C
                                                          • Part of subcall function 00007FF759974868: _invalid_parameter_noinfo.LIBCMT ref: 00007FF75997487C
                                                          • Part of subcall function 00007FF759969F78: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF759971EC2,?,?,?,00007FF759971EFF,?,?,00000000,00007FF7599723C5,?,?,00000000,00007FF7599722F7), ref: 00007FF759969F8E
                                                          • Part of subcall function 00007FF759969F78: GetLastError.KERNEL32(?,?,?,00007FF759971EC2,?,?,?,00007FF759971EFF,?,?,00000000,00007FF7599723C5,?,?,00000000,00007FF7599722F7), ref: 00007FF759969F98
                                                        • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF7599753AC), ref: 00007FF759975193
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _get_daylight_invalid_parameter_noinfo$BoundaryDeleteDescriptorErrorInformationLastTimeZone
                                                        • String ID: Eastern Standard Time$Eastern Summer Time
                                                        • API String ID: 1511944507-239921721
                                                        • Opcode ID: 745ef94ea7204a2bfbd30c29007a49fe20bc82f24fe0203fc347e73c8b1ad169
                                                        • Instruction ID: da4961104e48f1d005884e9730631a9bddfc89e3a749da56084752915fd9807a
                                                        • Opcode Fuzzy Hash: 745ef94ea7204a2bfbd30c29007a49fe20bc82f24fe0203fc347e73c8b1ad169
                                                        • Instruction Fuzzy Hash: 67519C72A1864286F750FF21E9811B9E375BFC9784FC8513AEA0D87696DF3CE44087A0
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: CurrentFeaturePresentProcessProcessor
                                                        • String ID:
                                                        • API String ID: 1010374628-0
                                                        • Opcode ID: 036bb9af6ac8c728884dbc430cc13962f440282e35d529492d92ee50b2a68dd9
                                                        • Instruction ID: 9dd62e8b029df7c41570d314538a0743663e91f89d6ca2d83630180d12e8f738
                                                        • Opcode Fuzzy Hash: 036bb9af6ac8c728884dbc430cc13962f440282e35d529492d92ee50b2a68dd9
                                                        • Instruction Fuzzy Hash: 1A028E21A0D68341FA55BF26E850279A6B4AFC6BE0FDD4635DD6D4A3D2DF3DE8018320

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _fread_nolock$_invalid_parameter_noinfo
                                                        • String ID: Cannot read Table of Contents.$Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                        • API String ID: 3405171723-4158440160
                                                        • Opcode ID: 835103007f02c9749ac647d58f048ab1686cef21957037b090b7deb9b795050b
                                                        • Instruction ID: 7e04b00b44234568771d1c16493688f22dfe73a36bf073d75e4b116391836054
                                                        • Opcode Fuzzy Hash: 835103007f02c9749ac647d58f048ab1686cef21957037b090b7deb9b795050b
                                                        • Instruction Fuzzy Hash: 46518471A0960296EB64EF24E55017DB3B0FFC8B48B994535DA0D87399EF3CE440C750

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 53 7ff759951440-7ff759951457 call 7ff759955880 56 7ff759951459-7ff759951461 53->56 57 7ff759951462-7ff759951485 call 7ff759955ba0 53->57 60 7ff7599514a7-7ff7599514ad 57->60 61 7ff759951487-7ff7599514a2 call 7ff759951c10 57->61 63 7ff7599514af-7ff7599514ba call 7ff759952de0 60->63 64 7ff7599514e0-7ff7599514f4 call 7ff75995ec94 60->64 68 7ff759951635-7ff759951647 61->68 69 7ff7599514bf-7ff7599514c5 63->69 72 7ff759951516-7ff75995151a 64->72 73 7ff7599514f6-7ff759951511 call 7ff759951c10 64->73 69->64 71 7ff7599514c7-7ff7599514db call 7ff759951c50 69->71 84 7ff759951617-7ff75995161d 71->84 74 7ff75995151c-7ff759951528 call 7ff759951050 72->74 75 7ff759951534-7ff759951554 call 7ff75996414c 72->75 73->84 82 7ff75995152d-7ff75995152f 74->82 85 7ff759951575-7ff75995157b 75->85 86 7ff759951556-7ff759951570 call 7ff759951c10 75->86 82->84 87 7ff75995162b-7ff75995162e call 7ff75995e60c 84->87 88 7ff75995161f call 7ff75995e60c 84->88 91 7ff759951605-7ff759951608 call 7ff759964138 85->91 92 7ff759951581-7ff759951586 85->92 99 7ff75995160d-7ff759951612 86->99 94 7ff759951633 87->94 98 7ff759951624 88->98 91->99 97 7ff759951590-7ff7599515b2 call 7ff75995e95c 92->97 94->68 102 7ff7599515b4-7ff7599515cc call 7ff75995f09c 97->102 103 7ff7599515e5-7ff7599515ec 97->103 98->87 99->84 108 7ff7599515ce-7ff7599515d1 102->108 109 7ff7599515d5-7ff7599515e3 102->109 104 7ff7599515f3-7ff7599515fb call 7ff759951c10 103->104 112 7ff759951600 104->112 108->97 111 7ff7599515d3 108->111 109->104 111->112 112->91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                        • API String ID: 0-666925554
                                                        • Opcode ID: 9960f63575f751e35a3844e99a4979cf69418d4c573dd41fa87a4345e49a5c97
                                                        • Instruction ID: 6be2009328183c252f27a89130c7bf9debbcfabd34262de06cf4507ee73f494f
                                                        • Opcode Fuzzy Hash: 9960f63575f751e35a3844e99a4979cf69418d4c573dd41fa87a4345e49a5c97
                                                        • Instruction Fuzzy Hash: B7519961B09642A1EA20BF21E6506BAE3B0AFC6BD4FCC4531DE1D47696FF3DE5458320

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Token$ConvertDescriptorInformationProcessSecurityString$CloseCreateCurrentDirectoryErrorFreeHandleLastLocalOpen
                                                        • String ID: D:(A;;FA;;;%s)$S-1-3-4
                                                        • API String ID: 4998090-2855260032
                                                        • Opcode ID: 04a4952acd007a2d57849bf4a7f549880b035f2fca275a5dfd27a02a5c87a0f0
                                                        • Instruction ID: 21b22208a473809b7640de68ab64468cf65092a0c8a88c8a2ed32fb2816d849f
                                                        • Opcode Fuzzy Hash: 04a4952acd007a2d57849bf4a7f549880b035f2fca275a5dfd27a02a5c87a0f0
                                                        • Instruction Fuzzy Hash: 2841713161CA8292EB50AF60E4446AAB371FFC6794FC80635EA5E476D5DF3CD449CB20

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                        • String ID: CreateProcessW$Error creating child process!
                                                        • API String ID: 2895956056-3524285272
                                                        • Opcode ID: d5693698e4819ce5d510509d5cda6c943b390b1bcdb6e918232fd1435297541c
                                                        • Instruction ID: 76a43fd3b02af1a777aa8873d05a5fd4416c0857bc136e57c33af8272207c97e
                                                        • Opcode Fuzzy Hash: d5693698e4819ce5d510509d5cda6c943b390b1bcdb6e918232fd1435297541c
                                                        • Instruction Fuzzy Hash: 5A410D31A0878282EA20AF60E4452AAF3B0FFD5360F940735E6AD47BD5DF7CD0488B50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 453 7ff759951000-7ff7599527b6 call 7ff75995e3e0 call 7ff75995e3d8 call 7ff7599567c0 call 7ff75995a130 call 7ff759964310 call 7ff759964f7c call 7ff759951af0 469 7ff7599527bc-7ff7599527cb call 7ff759952cd0 453->469 470 7ff7599528ca 453->470 469->470 475 7ff7599527d1-7ff7599527e4 call 7ff759952ba0 469->475 472 7ff7599528cf-7ff7599528ef call 7ff75995a100 470->472 475->470 479 7ff7599527ea-7ff7599527fd call 7ff759952c50 475->479 479->470 482 7ff759952803-7ff75995282a call 7ff759955af0 479->482 485 7ff75995286c-7ff759952894 call 7ff7599560f0 call 7ff7599519d0 482->485 486 7ff75995282c-7ff75995283b call 7ff759955af0 482->486 496 7ff75995297d-7ff75995298e 485->496 497 7ff75995289a-7ff7599528b0 call 7ff7599519d0 485->497 486->485 492 7ff75995283d-7ff759952843 486->492 494 7ff759952845-7ff75995284d 492->494 495 7ff75995284f-7ff759952869 call 7ff759964138 call 7ff7599560f0 492->495 494->495 495->485 501 7ff7599529a3-7ff7599529bb call 7ff759956db0 496->501 502 7ff759952990-7ff75995299a call 7ff7599524a0 496->502 508 7ff7599528f0-7ff7599528f3 497->508 509 7ff7599528b2-7ff7599528c5 call 7ff759951c50 497->509 514 7ff7599529bd-7ff7599529c9 call 7ff759951c50 501->514 515 7ff7599529ce-7ff7599529d5 SetDllDirectoryW 501->515 512 7ff7599529db-7ff7599529e8 call 7ff759954fa0 502->512 513 7ff75995299c 502->513 508->496 517 7ff7599528f9-7ff759952910 call 7ff759952de0 508->517 509->470 526 7ff7599529ea-7ff7599529fa call 7ff759954c40 512->526 527 7ff759952a36-7ff759952a3b call 7ff759954f20 512->527 513->501 514->470 515->512 524 7ff759952917-7ff759952943 call 7ff759956360 517->524 525 7ff759952912-7ff759952915 517->525 536 7ff75995296d-7ff75995297b 524->536 537 7ff759952945-7ff75995294d call 7ff75995e60c 524->537 528 7ff759952952-7ff759952968 call 7ff759951c50 525->528 526->527 541 7ff7599529fc-7ff759952a0b call 7ff7599547a0 526->541 534 7ff759952a40-7ff759952a43 527->534 528->470 539 7ff759952a49-7ff759952a56 534->539 540 7ff759952af6-7ff759952b05 call 7ff759952330 534->540 536->502 537->528 544 7ff759952a60-7ff759952a6a 539->544 540->470 555 7ff759952b0b-7ff759952b42 call 7ff759956080 call 7ff759955af0 call 7ff759954540 540->555 553 7ff759952a2c-7ff759952a31 call 7ff7599549f0 541->553 554 7ff759952a0d-7ff759952a19 call 7ff759954730 541->554 549 7ff759952a6c-7ff759952a71 544->549 550 7ff759952a73-7ff759952a75 544->550 549->544 549->550 551 7ff759952a77-7ff759952a9a call 7ff759951b30 550->551 552 7ff759952ac1-7ff759952af1 call 7ff759952490 call 7ff7599522d0 call 7ff759952480 call 7ff7599549f0 call 7ff759954f20 550->552 551->470 565 7ff759952aa0-7ff759952aab 551->565 552->472 553->527 554->553 566 7ff759952a1b-7ff759952a2a call 7ff759954df0 554->566 555->470 578 7ff759952b48-7ff759952b7d call 7ff759952490 call 7ff759956130 call 7ff7599549f0 call 7ff759954f20 555->578 569 7ff759952ab0-7ff759952abf 565->569 566->534 569->552 569->569 591 7ff759952b87-7ff759952b8a call 7ff759951ab0 578->591 592 7ff759952b7f-7ff759952b82 call 7ff759955df0 578->592 595 7ff759952b8f-7ff759952b91 591->595 592->591 595->472
                                                        APIs
                                                          • Part of subcall function 00007FF759952CD0: GetModuleFileNameW.KERNEL32(?,00007FF7599527C9,?,?,?,?,?,?), ref: 00007FF759952D01
                                                        • SetDllDirectoryW.KERNEL32 ref: 00007FF7599529D5
                                                          • Part of subcall function 00007FF759955AF0: GetEnvironmentVariableW.KERNEL32(00007FF759952817,?,?,?,?,?,?), ref: 00007FF759955B2A
                                                          • Part of subcall function 00007FF759955AF0: ExpandEnvironmentStringsW.KERNEL32(?,?,?,?,?,?), ref: 00007FF759955B47
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Environment$DirectoryExpandFileModuleNameStringsVariable
                                                        • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                        • API String ID: 2344891160-3602715111
                                                        • Opcode ID: 9cc289c9195a371b6f24d31b42917e49a42ba6d60d8658c917f02b3ce32f2aaf
                                                        • Instruction ID: dd7068710be220c1abbc3ea07a3d919f340b274f3f28caf2709f595dbbd5e807
                                                        • Opcode Fuzzy Hash: 9cc289c9195a371b6f24d31b42917e49a42ba6d60d8658c917f02b3ce32f2aaf
                                                        • Instruction Fuzzy Hash: 27C16021A2C68265FA64BF2195512FFE3B1BFD4784FC85032EA4D4769AEF2CE505C720

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 596 7ff759951050-7ff7599510ab call 7ff759959990 599 7ff7599510ad-7ff7599510d2 call 7ff759951c50 596->599 600 7ff7599510d3-7ff7599510eb call 7ff75996414c 596->600 605 7ff7599510ed-7ff759951104 call 7ff759951c10 600->605 606 7ff759951109-7ff759951119 call 7ff75996414c 600->606 611 7ff75995126c-7ff7599512a0 call 7ff759959670 call 7ff759964138 * 2 605->611 612 7ff75995111b-7ff759951132 call 7ff759951c10 606->612 613 7ff759951137-7ff759951147 606->613 612->611 615 7ff759951150-7ff759951175 call 7ff75995e95c 613->615 623 7ff75995117b-7ff759951185 call 7ff75995e6d0 615->623 624 7ff75995125e 615->624 623->624 630 7ff75995118b-7ff759951197 623->630 627 7ff759951264 624->627 627->611 631 7ff7599511a0-7ff7599511c8 call 7ff759957de0 630->631 634 7ff7599511ca-7ff7599511cd 631->634 635 7ff759951241-7ff75995125c call 7ff759951c50 631->635 636 7ff75995123c 634->636 637 7ff7599511cf-7ff7599511d9 634->637 635->627 636->635 639 7ff7599511db-7ff7599511e8 call 7ff75995f09c 637->639 640 7ff759951203-7ff759951206 637->640 647 7ff7599511ed-7ff7599511f0 639->647 642 7ff759951208-7ff759951216 call 7ff75995aec0 640->642 643 7ff759951219-7ff75995121e 640->643 642->643 643->631 646 7ff759951220-7ff759951223 643->646 649 7ff759951237-7ff75995123a 646->649 650 7ff759951225-7ff759951228 646->650 651 7ff7599511fe-7ff759951201 647->651 652 7ff7599511f2-7ff7599511fc call 7ff75995e6d0 647->652 649->627 650->635 653 7ff75995122a-7ff759951232 650->653 651->635 652->643 652->651 653->615
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 1.2.13$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                        • API String ID: 0-1655038675
                                                        • Opcode ID: af04965e2dbcd0d8e1621cd66b39530d0b4f4ad9fcd8e07e4d45104bc70e5302
                                                        • Instruction ID: ea4f4e5a340953bacaff18066637a777c68a5da6ece31f09c28e573c86133112
                                                        • Opcode Fuzzy Hash: af04965e2dbcd0d8e1621cd66b39530d0b4f4ad9fcd8e07e4d45104bc70e5302
                                                        • Instruction Fuzzy Hash: 1F519C22A09682A1EA70BF51E5403BAA2A0BFC5798FCC4135DE4E87795FF3CE545C720

                                                        Control-flow Graph

                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,00000000,?,00007FF75996E2CA,?,?,-00000018,00007FF75996A383,?,?,?,00007FF75996A27A,?,?,?,00007FF7599654E2), ref: 00007FF75996E0AC
                                                        • GetProcAddress.KERNEL32(?,00000000,?,00007FF75996E2CA,?,?,-00000018,00007FF75996A383,?,?,?,00007FF75996A27A,?,?,?,00007FF7599654E2), ref: 00007FF75996E0B8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeLibraryProc
                                                        • String ID: api-ms-$ext-ms-
                                                        • API String ID: 3013587201-537541572
                                                        • Opcode ID: 5d4014bca18f9f9ee9ee76f308e7221266f6712ab36b1d3e30b229e2872ef72f
                                                        • Instruction ID: 07998a99c4e0b97ae75273e9face9fd3f230911a098c111fbe83e17da6126c37
                                                        • Opcode Fuzzy Hash: 5d4014bca18f9f9ee9ee76f308e7221266f6712ab36b1d3e30b229e2872ef72f
                                                        • Instruction Fuzzy Hash: 4F410161B1AA5281FA12AF56D800675A3B1BFC5BA0FCC4539DD1D8B384EF3CE445C324

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 682 7ff75996b08c-7ff75996b0b2 683 7ff75996b0cd-7ff75996b0d1 682->683 684 7ff75996b0b4-7ff75996b0c8 call 7ff759966068 call 7ff759966088 682->684 686 7ff75996b4a7-7ff75996b4b3 call 7ff759966068 call 7ff759966088 683->686 687 7ff75996b0d7-7ff75996b0de 683->687 700 7ff75996b4be 684->700 706 7ff75996b4b9 call 7ff759969f10 686->706 687->686 689 7ff75996b0e4-7ff75996b112 687->689 689->686 692 7ff75996b118-7ff75996b11f 689->692 695 7ff75996b138-7ff75996b13b 692->695 696 7ff75996b121-7ff75996b133 call 7ff759966068 call 7ff759966088 692->696 698 7ff75996b4a3-7ff75996b4a5 695->698 699 7ff75996b141-7ff75996b147 695->699 696->706 703 7ff75996b4c1-7ff75996b4d8 698->703 699->698 704 7ff75996b14d-7ff75996b150 699->704 700->703 704->696 707 7ff75996b152-7ff75996b177 704->707 706->700 710 7ff75996b179-7ff75996b17b 707->710 711 7ff75996b1aa-7ff75996b1b1 707->711 713 7ff75996b17d-7ff75996b184 710->713 714 7ff75996b1a2-7ff75996b1a8 710->714 715 7ff75996b186-7ff75996b19d call 7ff759966068 call 7ff759966088 call 7ff759969f10 711->715 716 7ff75996b1b3-7ff75996b1db call 7ff75996cc2c call 7ff759969f78 * 2 711->716 713->714 713->715 719 7ff75996b228-7ff75996b23f 714->719 747 7ff75996b330 715->747 743 7ff75996b1dd-7ff75996b1f3 call 7ff759966088 call 7ff759966068 716->743 744 7ff75996b1f8-7ff75996b223 call 7ff75996b8b4 716->744 722 7ff75996b2ba-7ff75996b2c4 call 7ff759972abc 719->722 723 7ff75996b241-7ff75996b249 719->723 735 7ff75996b34e 722->735 736 7ff75996b2ca-7ff75996b2df 722->736 723->722 724 7ff75996b24b-7ff75996b24d 723->724 724->722 728 7ff75996b24f-7ff75996b265 724->728 728->722 732 7ff75996b267-7ff75996b273 728->732 732->722 737 7ff75996b275-7ff75996b277 732->737 739 7ff75996b353-7ff75996b373 ReadFile 735->739 736->735 741 7ff75996b2e1-7ff75996b2f3 GetConsoleMode 736->741 737->722 742 7ff75996b279-7ff75996b291 737->742 745 7ff75996b46d-7ff75996b476 GetLastError 739->745 746 7ff75996b379-7ff75996b381 739->746 741->735 748 7ff75996b2f5-7ff75996b2fd 741->748 742->722 752 7ff75996b293-7ff75996b29f 742->752 743->747 744->719 749 7ff75996b478-7ff75996b48e call 7ff759966088 call 7ff759966068 745->749 750 7ff75996b493-7ff75996b496 745->750 746->745 754 7ff75996b387 746->754 751 7ff75996b333-7ff75996b33d call 7ff759969f78 747->751 748->739 756 7ff75996b2ff-7ff75996b321 ReadConsoleW 748->756 749->747 760 7ff75996b49c-7ff75996b49e 750->760 761 7ff75996b329-7ff75996b32b call 7ff759965ffc 750->761 751->703 752->722 759 7ff75996b2a1-7ff75996b2a3 752->759 763 7ff75996b38e-7ff75996b3a3 754->763 765 7ff75996b323 GetLastError 756->765 766 7ff75996b342-7ff75996b34c 756->766 759->722 770 7ff75996b2a5-7ff75996b2b5 759->770 760->751 761->747 763->751 772 7ff75996b3a5-7ff75996b3b0 763->772 765->761 766->763 770->722 775 7ff75996b3d7-7ff75996b3df 772->775 776 7ff75996b3b2-7ff75996b3cb call 7ff75996aca4 772->776 777 7ff75996b45b-7ff75996b468 call 7ff75996aae4 775->777 778 7ff75996b3e1-7ff75996b3f3 775->778 784 7ff75996b3d0-7ff75996b3d2 776->784 777->784 781 7ff75996b44e-7ff75996b456 778->781 782 7ff75996b3f5 778->782 781->751 785 7ff75996b3fa-7ff75996b401 782->785 784->751 787 7ff75996b43d-7ff75996b448 785->787 788 7ff75996b403-7ff75996b407 785->788 787->781 789 7ff75996b409-7ff75996b410 788->789 790 7ff75996b423 788->790 789->790 791 7ff75996b412-7ff75996b416 789->791 792 7ff75996b429-7ff75996b439 790->792 791->790 793 7ff75996b418-7ff75996b421 791->793 792->785 794 7ff75996b43b 792->794 793->792 794->781
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 5e2fa04a27a554ad5a06cbbe01d601b05b68f3aeb2922c25288f770f6f319bba
                                                        • Instruction ID: 956f924bc8cd71f1dccfd23491324f7b0afe9ca7069b14b4bda2196306e369c2
                                                        • Opcode Fuzzy Hash: 5e2fa04a27a554ad5a06cbbe01d601b05b68f3aeb2922c25288f770f6f319bba
                                                        • Instruction Fuzzy Hash: 2AC1BD22A0C6C691E720AF15D4402BEABB9EBC5B80FDD4135DA4E07795EF7DE8498360

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 872 7ff75996c590-7ff75996c5b5 873 7ff75996c5bb-7ff75996c5be 872->873 874 7ff75996c883 872->874 875 7ff75996c5f7-7ff75996c623 873->875 876 7ff75996c5c0-7ff75996c5f2 call 7ff759969e44 873->876 877 7ff75996c885-7ff75996c895 874->877 879 7ff75996c62e-7ff75996c634 875->879 880 7ff75996c625-7ff75996c62c 875->880 876->877 882 7ff75996c636-7ff75996c63f call 7ff75996b950 879->882 883 7ff75996c644-7ff75996c659 call 7ff759972abc 879->883 880->876 880->879 882->883 887 7ff75996c773-7ff75996c77c 883->887 888 7ff75996c65f-7ff75996c668 883->888 889 7ff75996c77e-7ff75996c784 887->889 890 7ff75996c7d0-7ff75996c7f5 WriteFile 887->890 888->887 891 7ff75996c66e-7ff75996c672 888->891 894 7ff75996c7bc-7ff75996c7ce call 7ff75996c048 889->894 895 7ff75996c786-7ff75996c789 889->895 892 7ff75996c7f7-7ff75996c7fd GetLastError 890->892 893 7ff75996c800 890->893 896 7ff75996c683-7ff75996c68e 891->896 897 7ff75996c674-7ff75996c67c call 7ff759963830 891->897 892->893 902 7ff75996c803 893->902 916 7ff75996c760-7ff75996c767 894->916 903 7ff75996c78b-7ff75996c78e 895->903 904 7ff75996c7a8-7ff75996c7ba call 7ff75996c268 895->904 899 7ff75996c69f-7ff75996c6b4 GetConsoleMode 896->899 900 7ff75996c690-7ff75996c699 896->900 897->896 907 7ff75996c76c 899->907 908 7ff75996c6ba-7ff75996c6c0 899->908 900->887 900->899 910 7ff75996c808 902->910 911 7ff75996c814-7ff75996c81e 903->911 912 7ff75996c794-7ff75996c7a6 call 7ff75996c14c 903->912 904->916 907->887 914 7ff75996c749-7ff75996c75b call 7ff75996bbd0 908->914 915 7ff75996c6c6-7ff75996c6c9 908->915 917 7ff75996c80d 910->917 918 7ff75996c87c-7ff75996c881 911->918 919 7ff75996c820-7ff75996c825 911->919 912->916 914->916 923 7ff75996c6cb-7ff75996c6ce 915->923 924 7ff75996c6d4-7ff75996c6e2 915->924 916->910 917->911 918->877 925 7ff75996c827-7ff75996c82a 919->925 926 7ff75996c853-7ff75996c85d 919->926 923->917 923->924 931 7ff75996c6e4 924->931 932 7ff75996c740-7ff75996c744 924->932 927 7ff75996c82c-7ff75996c83b 925->927 928 7ff75996c843-7ff75996c84e call 7ff759966044 925->928 929 7ff75996c864-7ff75996c873 926->929 930 7ff75996c85f-7ff75996c862 926->930 927->928 928->926 929->918 930->874 930->929 934 7ff75996c6e8-7ff75996c6ff call 7ff759972b88 931->934 932->902 938 7ff75996c737-7ff75996c73d GetLastError 934->938 939 7ff75996c701-7ff75996c70d 934->939 938->932 940 7ff75996c72c-7ff75996c733 939->940 941 7ff75996c70f-7ff75996c721 call 7ff759972b88 939->941 940->932 942 7ff75996c735 940->942 941->938 945 7ff75996c723-7ff75996c72a 941->945 942->934 945->940
                                                        APIs
                                                        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF75996C57B), ref: 00007FF75996C6AC
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF75996C57B), ref: 00007FF75996C737
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ConsoleErrorLastMode
                                                        • String ID:
                                                        • API String ID: 953036326-0
                                                        • Opcode ID: 1ee269c4fb3492fdab786e16ea0be33da994e1b3a3006f3c14cd8905a42bf150
                                                        • Instruction ID: 07e63ef3d95689bfaaca90cfc714a77399111b4c0e1fd7e448602c3b125c1626
                                                        • Opcode Fuzzy Hash: 1ee269c4fb3492fdab786e16ea0be33da994e1b3a3006f3c14cd8905a42bf150
                                                        • Instruction Fuzzy Hash: C691B532F1869285F760AF65D4402BDABB4BB95B88F984139EF0E57A84EF3CD441C760

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _get_daylight$_isindst
                                                        • String ID:
                                                        • API String ID: 4170891091-0
                                                        • Opcode ID: 993f4cb53d01987759aa9ab87d439edc94425a62c6450610c4994d1423bcdf7f
                                                        • Instruction ID: fa32da0952482889541bdf40f283ef24fa5c020d8e8017cd08c98dc715491f14
                                                        • Opcode Fuzzy Hash: 993f4cb53d01987759aa9ab87d439edc94425a62c6450610c4994d1423bcdf7f
                                                        • Instruction Fuzzy Hash: C9510372F042928BFB14EFB5D9456BCA7B1ABC0398F9C0139DD1E56AE5DF38A4128710

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 1279662727-0
                                                        • Opcode ID: 3d6046d72fa2396df0887b114e3627fe285c38a7a8010f89346fd758d181b2b8
                                                        • Instruction ID: 95ec346940dc3767e1493005dca74e8fe40ba9d1442f7146d28e4dff3abd19ab
                                                        • Opcode Fuzzy Hash: 3d6046d72fa2396df0887b114e3627fe285c38a7a8010f89346fd758d181b2b8
                                                        • Instruction Fuzzy Hash: EE41B062D187C283E710AFA0D510369B371FBD67A4F58A334EA9D03AD5DF6CA4A08720
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                        • String ID:
                                                        • API String ID: 3058843127-0
                                                        • Opcode ID: 0a8c62a57e2cf59f1561fe537eeb51f2220189f8d74725526a3d26dbeb988a7e
                                                        • Instruction ID: 596d97b3385904de774f6d0197ec6386e2ce4a59491fa5d8e77f420c4ba02044
                                                        • Opcode Fuzzy Hash: 0a8c62a57e2cf59f1561fe537eeb51f2220189f8d74725526a3d26dbeb988a7e
                                                        • Instruction Fuzzy Hash: 56311821E0E14262FA14BF21D5113BAA2F1AFC1784FCC4435EA0D4B297DF2DE845827A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: fc68bfbf785dc4e8d02d30f22ac316467e06faf73d836825e3014864920bd8dd
                                                        • Instruction ID: 44383caa55dea4aebb1f83e2423ce828fbc50a4e94be81262cc1415ed2fecc7e
                                                        • Opcode Fuzzy Hash: fc68bfbf785dc4e8d02d30f22ac316467e06faf73d836825e3014864920bd8dd
                                                        • Instruction Fuzzy Hash: A3D09E10B1968246EA543F719C551B992715FD9756F881438CC4F56393CF3DE44D8261
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: a3600ff4682811ddeb36fb761298261c2e9791cf1ca8f4758584451e9995ac85
                                                        • Instruction ID: 4693d371c40f99f0e87e07388762a956681c2d9f0a6e38438a0bdbecb70ea885
                                                        • Opcode Fuzzy Hash: a3600ff4682811ddeb36fb761298261c2e9791cf1ca8f4758584451e9995ac85
                                                        • Instruction Fuzzy Hash: F451E661B0968176FB78BEA5940067BA2A5BFC4BA4F9C4638DE7C077D9CF3DD4018620
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: FileHandleType
                                                        • String ID:
                                                        • API String ID: 3000768030-0
                                                        • Opcode ID: 51d66a3ea3a1e5720d3031fa8d01ef1f6d3b4a26eee4bfd04239a76c9c1293a5
                                                        • Instruction ID: 3f6d6d14e40b9dac3be02c67f35518ae7a2f9a2d3096968201de7115f04ad278
                                                        • Opcode Fuzzy Hash: 51d66a3ea3a1e5720d3031fa8d01ef1f6d3b4a26eee4bfd04239a76c9c1293a5
                                                        • Instruction Fuzzy Hash: 76318431A1CB9641E7609F25D590178AAA8FB85BB4FAC1339DB6E073E4DF38E491D310
                                                        APIs
                                                        • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF75996A005,?,?,00000000,00007FF75996A0BA), ref: 00007FF75996A1F6
                                                        • GetLastError.KERNEL32(?,?,?,00007FF75996A005,?,?,00000000,00007FF75996A0BA), ref: 00007FF75996A200
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseErrorFindLastNotification
                                                        • String ID:
                                                        • API String ID: 1687624791-0
                                                        • Opcode ID: 6fe57093fbbb00cdf8389479e1e18e52ea82cce6ea34632ee61e1d7ac301845a
                                                        • Instruction ID: 028d487cf2a9a71ebec6d1b60a313ce96698d4501bcd7d7892f99d9c2d9853b9
                                                        • Opcode Fuzzy Hash: 6fe57093fbbb00cdf8389479e1e18e52ea82cce6ea34632ee61e1d7ac301845a
                                                        • Instruction Fuzzy Hash: BA21CF21B196C241FE50BF61D990279A2B1AFC47A0FAC4235DA2E472C5CF6CA4848322
                                                        APIs
                                                        • SetFilePointerEx.KERNELBASE(?,?,?,?,?,00007FF75996B750,00000000,?,?,?,00007FF759951023,00007FF75996B859), ref: 00007FF75996B7B0
                                                        • GetLastError.KERNEL32(?,?,?,?,?,00007FF75996B750,00000000,?,?,?,00007FF759951023,00007FF75996B859), ref: 00007FF75996B7BA
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastPointer
                                                        • String ID:
                                                        • API String ID: 2976181284-0
                                                        • Opcode ID: 7196098b30ecd42809471233c9619b7315c9fb41ce716e28bdee8d0b35162eb6
                                                        • Instruction ID: e8de3b58843ac5999db32ea75bdb50c2267dd31c86084eb2f236635d73a82786
                                                        • Opcode Fuzzy Hash: 7196098b30ecd42809471233c9619b7315c9fb41ce716e28bdee8d0b35162eb6
                                                        • Instruction Fuzzy Hash: C311C16261CA8281DA10AF26E804169A379AB85BF4F984331EE7D0BBD9DF3CD0548750
                                                        APIs
                                                        • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF759966965), ref: 00007FF759966B0B
                                                        • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF759966965), ref: 00007FF759966B21
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Time$System$FileLocalSpecific
                                                        • String ID:
                                                        • API String ID: 1707611234-0
                                                        • Opcode ID: ac061897d341fb700666fc9327f8304620b74f462cdcac4e9011de69f9e9d462
                                                        • Instruction ID: 273e3bf6ed018b554aff2d478911083e5a83a7b2791a7d44c36469857906edde
                                                        • Opcode Fuzzy Hash: ac061897d341fb700666fc9327f8304620b74f462cdcac4e9011de69f9e9d462
                                                        • Instruction Fuzzy Hash: FA01613251C691C6E750AF25E40123AF7B1FBC5761FA80235F6A9419D4DF3DD050DB24
                                                        APIs
                                                        • RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF759971EC2,?,?,?,00007FF759971EFF,?,?,00000000,00007FF7599723C5,?,?,00000000,00007FF7599722F7), ref: 00007FF759969F8E
                                                        • GetLastError.KERNEL32(?,?,?,00007FF759971EC2,?,?,?,00007FF759971EFF,?,?,00000000,00007FF7599723C5,?,?,00000000,00007FF7599722F7), ref: 00007FF759969F98
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: BoundaryDeleteDescriptorErrorLast
                                                        • String ID:
                                                        • API String ID: 2050971199-0
                                                        • Opcode ID: 38b70030576bf13f94cd83556ee530387765cecd0e7570bb2763cadcf4087263
                                                        • Instruction ID: 98dbf666938c3efa7156d0410765a5d404139a1b584e5b21a4b103295e24449a
                                                        • Opcode Fuzzy Hash: 38b70030576bf13f94cd83556ee530387765cecd0e7570bb2763cadcf4087263
                                                        • Instruction Fuzzy Hash: EAE0EC50F0E68382FF18BFB6D98517896755FC5741BCD4434D90D5A251EF2CA8898271
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 2018770650-0
                                                        • Opcode ID: d9df61864aacf0c38aa57b7a7eccc268b2766f97fd3960567bd6780660c5006e
                                                        • Instruction ID: bc6c7ac28a4bed4c45987a8588817c7b263e3542d6d2f875d91ceac03a9ff3ce
                                                        • Opcode Fuzzy Hash: d9df61864aacf0c38aa57b7a7eccc268b2766f97fd3960567bd6780660c5006e
                                                        • Instruction Fuzzy Hash: BAD0C914E1D64381EA143F75994517995B01FC6721FDC0A34D82D802D0EF1CA0894132
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: DirectoryErrorLastRemove
                                                        • String ID:
                                                        • API String ID: 377330604-0
                                                        • Opcode ID: f10b0acbf04ce372ff2bba8e22346aa2cd94a9581c077f1b6ddec38c1268e9e8
                                                        • Instruction ID: c1cebdfb9523c1f8ae1670adc05ba06da2c397be7ee403ca1ad76c166d6ed8c9
                                                        • Opcode Fuzzy Hash: f10b0acbf04ce372ff2bba8e22346aa2cd94a9581c077f1b6ddec38c1268e9e8
                                                        • Instruction Fuzzy Hash: 5ED01210F1D58381F6147F759C0517C94B02FC6725FD80634C02D812D0EF2CE4894132
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_findclose
                                                        • String ID:
                                                        • API String ID: 2772937645-0
                                                        • Opcode ID: 628285328bb618edcfe9754a4ff814bb64e2feda71a532fcc2d8bd8f687e193b
                                                        • Instruction ID: 697eaec3a9458717b7f88276fa949ab93a51a8b48642d208568f727be1d04d4a
                                                        • Opcode Fuzzy Hash: 628285328bb618edcfe9754a4ff814bb64e2feda71a532fcc2d8bd8f687e193b
                                                        • Instruction Fuzzy Hash: 4F716D52E18AC591E7119F2CD5052FDA370FBE9B48F98E325DB9C12592EF28E2D9C700
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 4a6c5a3d4d07d346d85f1dfcc86011b7ee547b027a92df06dc97a85d25961c85
                                                        • Instruction ID: 0b736469cc200fad9cc83790cb14e96d26c54d52c02c6c295d590a6d1686b49b
                                                        • Opcode Fuzzy Hash: 4a6c5a3d4d07d346d85f1dfcc86011b7ee547b027a92df06dc97a85d25961c85
                                                        • Instruction Fuzzy Hash: 2641B43290C28187EA24EF19E5402BDF7B4EB96B94F981131D78E876D5EF2CE402C761
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _fread_nolock
                                                        • String ID:
                                                        • API String ID: 840049012-0
                                                        • Opcode ID: f285b20302beaefcf1bb3539b442360c68e2f6062702bb5b73d900193ad1ebd1
                                                        • Instruction ID: a232cfc140b280c8510719af32b4a1875bfc8e574529bb028c6ca10717ca6435
                                                        • Opcode Fuzzy Hash: f285b20302beaefcf1bb3539b442360c68e2f6062702bb5b73d900193ad1ebd1
                                                        • Instruction Fuzzy Hash: 41215E21B086D266EA14BF52A9043BBEA61BF89BD4FCC5430EE0D07786CF7DE4458614
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: ff4bd6b019ced27284b6fa2760217448de45b7808968d4935831090a049e7df0
                                                        • Instruction ID: fb401fb57efb72a37fb132568b7045aba853e9c549946c266819940720ebb746
                                                        • Opcode Fuzzy Hash: ff4bd6b019ced27284b6fa2760217448de45b7808968d4935831090a049e7df0
                                                        • Instruction Fuzzy Hash: 5B31A162A196C281E711BF5AC84037CAA70AFC0B94FD90139EA1D437D2DF7DE8418772
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: HandleModule$AddressFreeLibraryProc
                                                        • String ID:
                                                        • API String ID: 3947729631-0
                                                        • Opcode ID: 7474e071a48ef7130f5acd4d7b35ddfbaeb0d66e7037ac086cf5d56d8c80b409
                                                        • Instruction ID: b43c1a5454fb0e5ae53c914eed97756fe2728c914b9fa2e00d006c3e564dd977
                                                        • Opcode Fuzzy Hash: 7474e071a48ef7130f5acd4d7b35ddfbaeb0d66e7037ac086cf5d56d8c80b409
                                                        • Instruction Fuzzy Hash: 4721AE72A047828AEB24AF65C4402FC73B0EB8531DF881A36D76D06AC5DF7CD485CBA1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 25f020cec256df429067bb606d051891f0f83e0bb8faa834007163ccabd97c9c
                                                        • Instruction ID: 0ba916d216a2e2ee853e3152d67453413698e37af0b3663d8f2c70c608de945b
                                                        • Opcode Fuzzy Hash: 25f020cec256df429067bb606d051891f0f83e0bb8faa834007163ccabd97c9c
                                                        • Instruction Fuzzy Hash: 4E118122A1D6C181EB60BF52D50027DE270BFC9B80FDC4475EA8C57A8ACF7DD8018761
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: e860bb9bc84c29a06dccfc010b7eb52daf61d2c250f48aeb7393b4a8ace16f10
                                                        • Instruction ID: f613bd151718bc589ec232705eab40597d4358b4816272117225c49d3098ad1b
                                                        • Opcode Fuzzy Hash: e860bb9bc84c29a06dccfc010b7eb52daf61d2c250f48aeb7393b4a8ace16f10
                                                        • Instruction Fuzzy Hash: AF21C632A18A8287EBA1AF18D4403B9B6B0FBC5B54F9C4234E75D876D9DF3CD8018B51
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 298f7b2a666c55937c0a4044f00fb88544ba948c427ceaa5fd6043e577695ec0
                                                        • Instruction ID: 339c320daa26776ef5ae310a71d9e68f57eb667f870d1cefe233299ec8106c52
                                                        • Opcode Fuzzy Hash: 298f7b2a666c55937c0a4044f00fb88544ba948c427ceaa5fd6043e577695ec0
                                                        • Instruction Fuzzy Hash: 1401A161A0879151EA54FF92990016EE7A5AFC6FE0F8C4639EEAC17BDACF3DD4118310
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: ec6a8bbc8393b9a035b98e996b47f7bdc6c1af4ae5fba4cb41e2bad1113de79b
                                                        • Instruction ID: 66f2753fc542e9b0ab60b66502957b7124269fbecd1aa763a9c3e4910f17c798
                                                        • Opcode Fuzzy Hash: ec6a8bbc8393b9a035b98e996b47f7bdc6c1af4ae5fba4cb41e2bad1113de79b
                                                        • Instruction Fuzzy Hash: 6001AD60E0D6C241FE607F29E94A139E6B4AFC17D4FCC4135EA1C466CADF2CE8408230
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF75996AA16,?,?,?,00007FF759969BD3,?,?,00000000,00007FF759969E6E), ref: 00007FF75996DF0D
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 69550027ed8e3bf035e7bef6798a6f7658c1153be72ca181ca789a5114add420
                                                        • Instruction ID: 730741dcb377e6093eaa951a5438e93d23d1781eab007d3a339ba8b96ccb2296
                                                        • Opcode Fuzzy Hash: 69550027ed8e3bf035e7bef6798a6f7658c1153be72ca181ca789a5114add420
                                                        • Instruction Fuzzy Hash: 56F06D60F1A29340FE597F66DD502B8D2B45FE5B40FCC4434C91E862D2DF2CE4868230
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(?,?,?,00007FF75995F1E4,?,?,?,00007FF7599606F6,?,?,?,?,?,00007FF75996275D), ref: 00007FF75996CC6A
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: b827a7ab023d1767f95784f6f7fefaf86c66ee15463514ccfd07e797832e7771
                                                        • Instruction ID: e4ad492af0a936d4f440466a2c38f7ff54cc9ef012ce539e7ff797dd588fcd48
                                                        • Opcode Fuzzy Hash: b827a7ab023d1767f95784f6f7fefaf86c66ee15463514ccfd07e797832e7771
                                                        • Instruction Fuzzy Hash: FEF05E50B192C640FE157F72994027991B48FC57A0FCC4A34EA2E452D1EF2EE44092B0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: d8ddd072cb9aeb27808c6bd09a31392064f42f391621abce153dcee42f6a1f6e
                                                        • Instruction ID: 38539e1725b7bc90197674d646f3bad9c91df8b460bd35b5438d45b1a05c2e79
                                                        • Opcode Fuzzy Hash: d8ddd072cb9aeb27808c6bd09a31392064f42f391621abce153dcee42f6a1f6e
                                                        • Instruction Fuzzy Hash: D2E012A1E092C752FA147EB5C58217891309FD8344FCC4038D948462C7DF1DBC595771
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: DirectoryErrorLastRemove
                                                        • String ID:
                                                        • API String ID: 377330604-0
                                                        • Opcode ID: 739fc36d95d46a0547d4d4511d317fb5cae8f37791182581b6b727d6f7db331d
                                                        • Instruction ID: a7a068711225851f61a852781a240abd2cc68a813f7fcc057308b23b96977f74
                                                        • Opcode Fuzzy Hash: 739fc36d95d46a0547d4d4511d317fb5cae8f37791182581b6b727d6f7db331d
                                                        • Instruction Fuzzy Hash: 8D418456D187C192EA11AF2495052BDA370FFE5744F88A232DB8D42247EF28E6C9C320
                                                        APIs
                                                        • GetProcAddress.KERNEL32(?,?,00000000,00007FF7599522DE,?,?,?,?), ref: 00007FF759952F36
                                                        • GetProcAddress.KERNEL32(?,?,00000000,00007FF7599522DE,?,?,?,?), ref: 00007FF759952F75
                                                        • GetProcAddress.KERNEL32(?,?,00000000,00007FF7599522DE,?,?,?,?), ref: 00007FF759952F9A
                                                        • GetProcAddress.KERNEL32(?,?,00000000,00007FF7599522DE,?,?,?,?), ref: 00007FF759952FBF
                                                        • GetProcAddress.KERNEL32(?,?,00000000,00007FF7599522DE,?,?,?,?), ref: 00007FF759952FE7
                                                        • GetProcAddress.KERNEL32(?,?,00000000,00007FF7599522DE,?,?,?,?), ref: 00007FF75995300F
                                                        • GetProcAddress.KERNEL32(?,?,00000000,00007FF7599522DE,?,?,?,?), ref: 00007FF759953037
                                                        • GetProcAddress.KERNEL32(?,?,00000000,00007FF7599522DE,?,?,?,?), ref: 00007FF75995305F
                                                        • GetProcAddress.KERNEL32(?,?,00000000,00007FF7599522DE,?,?,?,?), ref: 00007FF759953087
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: AddressProc
                                                        • String ID: Failed to get address for PyDict_GetItemString$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyList_New$Failed to get address for PyLong_AsLong$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PySys_AddWarnOption$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetArgvEx$Failed to get address for PySys_SetObject$Failed to get address for PySys_SetPath$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_BuildValue$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_DontWriteBytecodeFlag$Failed to get address for Py_FileSystemDefaultEncoding$Failed to get address for Py_Finalize$Failed to get address for Py_FrozenFlag$Failed to get address for Py_GetPath$Failed to get address for Py_IgnoreEnvironmentFlag$Failed to get address for Py_IncRef$Failed to get address for Py_Initialize$Failed to get address for Py_NoSiteFlag$Failed to get address for Py_NoUserSiteDirectory$Failed to get address for Py_OptimizeFlag$Failed to get address for Py_SetPath$Failed to get address for Py_SetProgramName$Failed to get address for Py_SetPythonHome$Failed to get address for Py_UTF8Mode$Failed to get address for Py_UnbufferedStdioFlag$Failed to get address for Py_VerboseFlag$GetProcAddress$PyDict_GetItemString$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyList_New$PyLong_AsLong$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyRun_SimpleStringFlags$PySys_AddWarnOption$PySys_GetObject$PySys_SetArgvEx$PySys_SetObject$PySys_SetPath$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_BuildValue$Py_DecRef$Py_DecodeLocale$Py_DontWriteBytecodeFlag$Py_FileSystemDefaultEncoding$Py_Finalize$Py_FrozenFlag$Py_GetPath$Py_IgnoreEnvironmentFlag$Py_IncRef$Py_Initialize$Py_NoSiteFlag$Py_NoUserSiteDirectory$Py_OptimizeFlag$Py_SetPath$Py_SetProgramName$Py_SetPythonHome$Py_UTF8Mode$Py_UnbufferedStdioFlag$Py_VerboseFlag
                                                        • API String ID: 190572456-3109299426
                                                        • Opcode ID: 3d8788b48c699204fb620db4b6681a167f3e5177f9efbc96361098fa63709e71
                                                        • Instruction ID: 8b674339008928456d20b6302d4ce796f65f6b81576aacf580fa7cb8b70402d5
                                                        • Opcode Fuzzy Hash: 3d8788b48c699204fb620db4b6681a167f3e5177f9efbc96361098fa63709e71
                                                        • Instruction Fuzzy Hash: 63429FA4A0AB03A1FA55BF05B854179E3B5AFCA791FCC5435C80E06768FFBCE5489321
                                                        APIs
                                                        • GetLastError.KERNEL32(WideCharToMultiByte,00007FF759951CE4,?,?,00000000,00007FF759956904), ref: 00007FF759956697
                                                        • FormatMessageW.KERNEL32 ref: 00007FF7599566C6
                                                        • WideCharToMultiByte.KERNEL32 ref: 00007FF75995671C
                                                          • Part of subcall function 00007FF759951CB0: GetLastError.KERNEL32(?,?,00000000,00007FF759956904,?,?,?,?,?,?,?,?,?,?,?,00007FF759951023), ref: 00007FF759951CD7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$ByteCharFormatMessageMultiWide
                                                        • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                                        • API String ID: 2383786077-2573406579
                                                        • Opcode ID: ee4750cad08e904e569e44cd6da303e01fcfffc44399732fd87d74f29f2688a4
                                                        • Instruction ID: 78f771f358e269c43d0bcbec440f4a86c9ed028f17164eb95f86f3c897d52d0b
                                                        • Opcode Fuzzy Hash: ee4750cad08e904e569e44cd6da303e01fcfffc44399732fd87d74f29f2688a4
                                                        • Instruction Fuzzy Hash: C8214C71A18A4292FB60AF15E8542AAA3B5FFC9385FCC0135E54D826A4FF3DE149C720
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                        • String ID:
                                                        • API String ID: 3140674995-0
                                                        • Opcode ID: 414c3b7d1a52ef3ba5408d69683659119c26abb58edcf35ad0cee906abb0d3fb
                                                        • Instruction ID: 730d01cf703fc721a38a6d18c2fe461349dc38daeefdcf63bf65eed5b5e4738c
                                                        • Opcode Fuzzy Hash: 414c3b7d1a52ef3ba5408d69683659119c26abb58edcf35ad0cee906abb0d3fb
                                                        • Instruction Fuzzy Hash: 0C315E72609A819AEB60AF60E8403EEB3B5FB85744F884439DA4D47A94DF3CD548C724
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                        • String ID:
                                                        • API String ID: 1239891234-0
                                                        • Opcode ID: 5dfb057c3f1a11160ff10646ccc1b52b02cf652cbed9a545e94d4dbf2c44da7d
                                                        • Instruction ID: 16356ce668b527e5817db9bac3d22172325d9fb78a78fb731c0026d9730a5b5a
                                                        • Opcode Fuzzy Hash: 5dfb057c3f1a11160ff10646ccc1b52b02cf652cbed9a545e94d4dbf2c44da7d
                                                        • Instruction Fuzzy Hash: 38315E32618B8296EB60DF25E8402AEB3B4FBC9754F980135EA8D47B94DF3CD155CB10
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: FileFindFirst_invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 2227656907-0
                                                        • Opcode ID: ced153bd746da3696451066ca553fc750e98195ae426049d21287c39b66479d4
                                                        • Instruction ID: e7a2b7d2bd27d0c9be27516b5de5c1c40a854499ef20e6588ed8e3b25bc4e545
                                                        • Opcode Fuzzy Hash: ced153bd746da3696451066ca553fc750e98195ae426049d21287c39b66479d4
                                                        • Instruction Fuzzy Hash: 79B19322B1869281EE61AF25E4002BDE371EBC6BE4F8C5131E95D4BAC5DF7CE441C320
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: HeapProcess
                                                        • String ID:
                                                        • API String ID: 54951025-0
                                                        • Opcode ID: 5644672d7aec8b178d5bd48a95ace976e45fdc56d1edf0a539dccc581205543b
                                                        • Instruction ID: 1121624fd7e93161a457f54036f4e72d14297739ef04790bb6a16e43ba938707
                                                        • Opcode Fuzzy Hash: 5644672d7aec8b178d5bd48a95ace976e45fdc56d1edf0a539dccc581205543b
                                                        • Instruction Fuzzy Hash: A0B09220F07B02C2EE083F216D8262862B87FC8B11FCC0038C00C80320DF2C60AA5731
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$LibraryLoad
                                                        • String ID: Failed to get address for Tcl_Alloc$Failed to get address for Tcl_ConditionFinalize$Failed to get address for Tcl_ConditionNotify$Failed to get address for Tcl_ConditionWait$Failed to get address for Tcl_CreateInterp$Failed to get address for Tcl_CreateObjCommand$Failed to get address for Tcl_CreateThread$Failed to get address for Tcl_DeleteInterp$Failed to get address for Tcl_DoOneEvent$Failed to get address for Tcl_EvalEx$Failed to get address for Tcl_EvalFile$Failed to get address for Tcl_EvalObjv$Failed to get address for Tcl_Finalize$Failed to get address for Tcl_FinalizeThread$Failed to get address for Tcl_FindExecutable$Failed to get address for Tcl_Free$Failed to get address for Tcl_GetCurrentThread$Failed to get address for Tcl_GetObjResult$Failed to get address for Tcl_GetString$Failed to get address for Tcl_GetVar2$Failed to get address for Tcl_Init$Failed to get address for Tcl_MutexLock$Failed to get address for Tcl_MutexUnlock$Failed to get address for Tcl_NewByteArrayObj$Failed to get address for Tcl_NewStringObj$Failed to get address for Tcl_SetVar2$Failed to get address for Tcl_SetVar2Ex$Failed to get address for Tcl_ThreadAlert$Failed to get address for Tcl_ThreadQueueEvent$Failed to get address for Tk_GetNumMainWindows$Failed to get address for Tk_Init$GetProcAddress$LOADER: Failed to load tcl/tk libraries$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                        • API String ID: 2238633743-1453502826
                                                        • Opcode ID: 387b05963c1573a630a89e02a7d3e5c8a0eed87054fdcdadb8995d5c72bb8a89
                                                        • Instruction ID: d32fad8c5bd2f95c088e31af1ae9ddfe643d2e65732fed61aef09db8abe072ac
                                                        • Opcode Fuzzy Hash: 387b05963c1573a630a89e02a7d3e5c8a0eed87054fdcdadb8995d5c72bb8a89
                                                        • Instruction Fuzzy Hash: 35E1D260A0EB03A1FA55BF14A850175A3B5AFCA791BDCA431C80E06365FF7CF54893B2
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32 ref: 00007FF759956C2C
                                                          • Part of subcall function 00007FF759951CB0: GetLastError.KERNEL32(?,?,00000000,00007FF759956904,?,?,?,?,?,?,?,?,?,?,?,00007FF759951023), ref: 00007FF759951CD7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ByteCharErrorLastMultiWide
                                                        • String ID: Failed to decode wchar_t from UTF-8$Failed to encode filename as ANSI.$Failed to get ANSI buffer size.$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$WideCharToMultiByte$win32_utils_from_utf8$win32_wcs_to_mbs
                                                        • API String ID: 203985260-1562484376
                                                        • Opcode ID: 3649c6f93bb09270b823ff22ec7b0eec6d42e79460650eefbf3c7b929506c9f8
                                                        • Instruction ID: ab6a165b73fed37d4da0446cde5bae4812d52decb35fb8af4c2e17ffbac055e5
                                                        • Opcode Fuzzy Hash: 3649c6f93bb09270b823ff22ec7b0eec6d42e79460650eefbf3c7b929506c9f8
                                                        • Instruction Fuzzy Hash: 9F417F61A0CA8292E620BF21EC4007AE6B1BFD5BD0FDC4535E94E47BA5EF3CE5418760
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: f$f$p$p$f
                                                        • API String ID: 3215553584-1325933183
                                                        • Opcode ID: 5b8d5396a44c552a0cc4e48ad8092be8cf806d396b8c8f6251230df5f0eb9214
                                                        • Instruction ID: bf8765ecd3201d8e318ec02d2a3ab87e35bbb764b3d0073f8e42b80c27b444ef
                                                        • Opcode Fuzzy Hash: 5b8d5396a44c552a0cc4e48ad8092be8cf806d396b8c8f6251230df5f0eb9214
                                                        • Instruction Fuzzy Hash: 4B126062A0C543A6FB20BE15E0647BBF675EFC0764FDC4036E699466C8DB7CE5808B21
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                        • API String ID: 0-3659356012
                                                        • Opcode ID: 27849c73a2b453c9c71bd8b325d1811199276ab163fc5dd860d9c84c8935c1af
                                                        • Instruction ID: 051823fea10bd3e4a084e13e875771eadda11b5dc424cebd1252aa4048aafb8b
                                                        • Opcode Fuzzy Hash: 27849c73a2b453c9c71bd8b325d1811199276ab163fc5dd860d9c84c8935c1af
                                                        • Instruction Fuzzy Hash: BC416D21A49642A2EA24FF11E9502BAE3B0EF857D4FC84432DE4D47A55FF3DE582C320
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                        • String ID: csm$csm$csm
                                                        • API String ID: 849930591-393685449
                                                        • Opcode ID: c9717f7599358984fa081211ebe6d8e8a7f2fe77f13a54a703b9fcdffbee59eb
                                                        • Instruction ID: 66fedcd500d899ab057a99dd6765b54bb91a8d581f9e41e4120d38cf2ad535ae
                                                        • Opcode Fuzzy Hash: c9717f7599358984fa081211ebe6d8e8a7f2fe77f13a54a703b9fcdffbee59eb
                                                        • Instruction Fuzzy Hash: C3E19D32A087419AEB20AF65D4402AEB7B0FFC4798F880135EE8D57B95DF38E481C760
                                                        APIs
                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF759951023), ref: 00007FF75995685F
                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF759951023), ref: 00007FF7599568AF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide
                                                        • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                        • API String ID: 626452242-27947307
                                                        • Opcode ID: 8d77172852237fffccb974c6d54fb7d37946d1ed41806d5f964de7f541550d5e
                                                        • Instruction ID: 404b57a83313ceea3af3414dd2a95d46fcb0469a417f2dd45eae8682b876ce26
                                                        • Opcode Fuzzy Hash: 8d77172852237fffccb974c6d54fb7d37946d1ed41806d5f964de7f541550d5e
                                                        • Instruction Fuzzy Hash: DB415C32A09B8292E720AF15F84016AE7B4FFD5B94F984135DA8D47B98EF3CE456C710
                                                        APIs
                                                        • WideCharToMultiByte.KERNEL32(00000000,00007FF759952D35,?,?,?,?,?,?), ref: 00007FF759956F01
                                                          • Part of subcall function 00007FF759951CB0: GetLastError.KERNEL32(?,?,00000000,00007FF759956904,?,?,?,?,?,?,?,?,?,?,?,00007FF759951023), ref: 00007FF759951CD7
                                                        • WideCharToMultiByte.KERNEL32(00000000,00007FF759952D35,?,?,?,?,?,?), ref: 00007FF759956F75
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                        • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                        • API String ID: 1717984340-27947307
                                                        • Opcode ID: d869b65ad41923ea885775a182ffbbb4fa8a6a55f9429b012359a23964d7bd56
                                                        • Instruction ID: 79d662c6afe667fa06932b71a999c62dd887ace7070b54cb4857f4ae922ded96
                                                        • Opcode Fuzzy Hash: d869b65ad41923ea885775a182ffbbb4fa8a6a55f9429b012359a23964d7bd56
                                                        • Instruction Fuzzy Hash: 28215C71A09B4296EB20AF16E84006AF7B1AFC5B90FDC4535DA4D837A4EF3CE5558350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: f$p$p
                                                        • API String ID: 3215553584-1995029353
                                                        • Opcode ID: d478605e8072a694eb9a9d804e4987f1596106984b5661be3eee2fb972e34d58
                                                        • Instruction ID: a7d3f5254d079c317421bc823ea65c69f98a04cd7379ab7f5b837586cecc9e0a
                                                        • Opcode Fuzzy Hash: d478605e8072a694eb9a9d804e4987f1596106984b5661be3eee2fb972e34d58
                                                        • Instruction Fuzzy Hash: 46126062E0C2C386FB24BE15D1542B9F6B5EBC1754FDC4136E6994B6C8DB3DE5808B20
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide
                                                        • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                        • API String ID: 626452242-876015163
                                                        • Opcode ID: 9e091cbaac830d0070f3842cc1d5ec76c8d2d2f90cb19691d00490de1532936c
                                                        • Instruction ID: c9722ffeb002f7074de5b568e9b0a15666b1f0a7bacf540e4265e04212cef58d
                                                        • Opcode Fuzzy Hash: 9e091cbaac830d0070f3842cc1d5ec76c8d2d2f90cb19691d00490de1532936c
                                                        • Instruction Fuzzy Hash: 9D419232A08B4292EA10EF25A88016AE7B5FFD5790F9C4135EE8D47BA4EF3CD552C710
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF75995C4FA,?,?,?,00007FF75995C1EC,?,?,00000001,00007FF75995BE09), ref: 00007FF75995C2CD
                                                        • GetLastError.KERNEL32(?,?,?,00007FF75995C4FA,?,?,?,00007FF75995C1EC,?,?,00000001,00007FF75995BE09), ref: 00007FF75995C2DB
                                                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF75995C4FA,?,?,?,00007FF75995C1EC,?,?,00000001,00007FF75995BE09), ref: 00007FF75995C305
                                                        • FreeLibrary.KERNEL32(?,?,?,00007FF75995C4FA,?,?,?,00007FF75995C1EC,?,?,00000001,00007FF75995BE09), ref: 00007FF75995C34B
                                                        • GetProcAddress.KERNEL32(?,?,?,00007FF75995C4FA,?,?,?,00007FF75995C1EC,?,?,00000001,00007FF75995BE09), ref: 00007FF75995C357
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Library$Load$AddressErrorFreeLastProc
                                                        • String ID: api-ms-
                                                        • API String ID: 2559590344-2084034818
                                                        • Opcode ID: 9ce77a0163c425c367fd7c26c9c82fe5a817cd2dfec158d19dd861a4531b58f3
                                                        • Instruction ID: 2a1cc7c729acc5e73cd31a608c28a9aa83c2a06f2f09a651641b97e76e7e80ba
                                                        • Opcode Fuzzy Hash: 9ce77a0163c425c367fd7c26c9c82fe5a817cd2dfec158d19dd861a4531b58f3
                                                        • Instruction Fuzzy Hash: 5F31B221A0B646A1EE51AF02A40157AA3F4FF89BA0F9D0535DD1D4A344FF3CE0448774
                                                        APIs
                                                          • Part of subcall function 00007FF759956DB0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?), ref: 00007FF759956DEA
                                                        • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF75995592F,?,00000000,?,TokenIntegrityLevel), ref: 00007FF75995563F
                                                        Strings
                                                        • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF759955653
                                                        • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF75995569A
                                                        • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF759955616
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ByteCharEnvironmentExpandMultiStringsWide
                                                        • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                                        • API String ID: 2001182103-3498232454
                                                        • Opcode ID: aa564683267f47d688a8517bb88a9b0a9054f6e1f4b3a9048b672f302df95511
                                                        • Instruction ID: 3cb9fbe9b6f211e683f140c8925d90e0d43c31c070ffd2996cf5baf2074c6bc5
                                                        • Opcode Fuzzy Hash: aa564683267f47d688a8517bb88a9b0a9054f6e1f4b3a9048b672f302df95511
                                                        • Instruction Fuzzy Hash: 69317251B1A7C2A1FB24BF21E9552BBD2B1AFD97C0FCC0435DA4E42796EF2CE1048621
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?), ref: 00007FF759956DEA
                                                          • Part of subcall function 00007FF759951CB0: GetLastError.KERNEL32(?,?,00000000,00007FF759956904,?,?,?,?,?,?,?,?,?,?,?,00007FF759951023), ref: 00007FF759951CD7
                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?), ref: 00007FF759956E70
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                        • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                        • API String ID: 1717984340-876015163
                                                        • Opcode ID: 7f54e5da8ee4cb54e1cd0e604769d215f15cea2374718bc11fd99751b49c0007
                                                        • Instruction ID: 9cb90cc2ae8e2167cb96b898780beb04c46f683d9e38a82613ebeb95d3d23363
                                                        • Opcode Fuzzy Hash: 7f54e5da8ee4cb54e1cd0e604769d215f15cea2374718bc11fd99751b49c0007
                                                        • Instruction Fuzzy Hash: 59217121B08A4291EB10EF19F84016AE7B1BFD57C4F9C4131DB4C83BA9EF2DD5518710
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F,?,?,?,00007FF759969473), ref: 00007FF75996A78F
                                                        • FlsGetValue.KERNEL32(?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F,?,?,?,00007FF759969473), ref: 00007FF75996A7A4
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F,?,?,?,00007FF759969473), ref: 00007FF75996A7C5
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F,?,?,?,00007FF759969473), ref: 00007FF75996A7F2
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F,?,?,?,00007FF759969473), ref: 00007FF75996A803
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F,?,?,?,00007FF759969473), ref: 00007FF75996A814
                                                        • SetLastError.KERNEL32(?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F,?,?,?,00007FF759969473), ref: 00007FF75996A82F
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Value$ErrorLast
                                                        • String ID:
                                                        • API String ID: 2506987500-0
                                                        • Opcode ID: 69b8ad2768efc01d88fd7f8132853dff404c26667984aa111fd74584065afc1c
                                                        • Instruction ID: 63296c48b8158c4b50c615ae588f20c1c020635857deda2d3a0c20cec44a37e4
                                                        • Opcode Fuzzy Hash: 69b8ad2768efc01d88fd7f8132853dff404c26667984aa111fd74584065afc1c
                                                        • Instruction Fuzzy Hash: 64212F20E0A68741FA587FA1E54117AE1765FC5BA0FEC4738D93E0BAD6DF2CB4414262
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                        • String ID: CONOUT$
                                                        • API String ID: 3230265001-3130406586
                                                        • Opcode ID: 900c1da012dee1dfb60ea43974335527b3f6c3b56b4e810762f126343bdfd55c
                                                        • Instruction ID: 2432d6861692a13c4ca276290ac5df53bac845d99bbde50a7a5c03ab9e0d55d0
                                                        • Opcode Fuzzy Hash: 900c1da012dee1dfb60ea43974335527b3f6c3b56b4e810762f126343bdfd55c
                                                        • Instruction Fuzzy Hash: C0118E25A18A4186F350AF12E854329E2B4FBCABE4F8C0234EA1D87794CF3CD4448750
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,00007FF759966091,?,?,?,?,00007FF75996DF1F,?,?,00000000,00007FF75996AA16,?,?,?), ref: 00007FF75996A907
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF759966091,?,?,?,?,00007FF75996DF1F,?,?,00000000,00007FF75996AA16,?,?,?), ref: 00007FF75996A93D
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF759966091,?,?,?,?,00007FF75996DF1F,?,?,00000000,00007FF75996AA16,?,?,?), ref: 00007FF75996A96A
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF759966091,?,?,?,?,00007FF75996DF1F,?,?,00000000,00007FF75996AA16,?,?,?), ref: 00007FF75996A97B
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF759966091,?,?,?,?,00007FF75996DF1F,?,?,00000000,00007FF75996AA16,?,?,?), ref: 00007FF75996A98C
                                                        • SetLastError.KERNEL32(?,?,?,00007FF759966091,?,?,?,?,00007FF75996DF1F,?,?,00000000,00007FF75996AA16,?,?,?), ref: 00007FF75996A9A7
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Value$ErrorLast
                                                        • String ID:
                                                        • API String ID: 2506987500-0
                                                        • Opcode ID: 9b225a077f4281318a7ef705813386e144cc6119260bee2e0aedcf55e065e7dc
                                                        • Instruction ID: 82f8f1ab5acfd893716b338e27e1836ad896b448048da1a9f59ea561db1967b2
                                                        • Opcode Fuzzy Hash: 9b225a077f4281318a7ef705813386e144cc6119260bee2e0aedcf55e065e7dc
                                                        • Instruction Fuzzy Hash: 35116D20B0A68242FA587F61E95113AE1724FC67B0FAD4739E96E0B7D6DF2CA4414222
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                        • String ID: csm$f
                                                        • API String ID: 2395640692-629598281
                                                        • Opcode ID: e4cc0f9b1589dd73a5d4f416534ce71b9b3e94dd2aede877d85d93aa73312820
                                                        • Instruction ID: 5e2e47a1ca788683bb7b2ecc76d3b93d4b7b93a7229837d50f281ece811eecc9
                                                        • Opcode Fuzzy Hash: e4cc0f9b1589dd73a5d4f416534ce71b9b3e94dd2aede877d85d93aa73312820
                                                        • Instruction Fuzzy Hash: 1551C472A096469BEB14EF15E404B7AB7B9FF81B88F988030DA4E47748DF39E841C710
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 78a1a69aac29132cf000f84d0d5f993c26bceca4d1e4e1c3cfa2e89eec15c9a9
                                                        • Instruction ID: df33b23493ee873e2b225585d261e19ccaf37254c3f67a3f56cd7a54c902222e
                                                        • Opcode Fuzzy Hash: 78a1a69aac29132cf000f84d0d5f993c26bceca4d1e4e1c3cfa2e89eec15c9a9
                                                        • Instruction Fuzzy Hash: 8CF04F61A19B4281FE14AF25E8453799370BFCA7A1F9C0639CA6D455E4DF2CD049C320
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _set_statfp
                                                        • String ID:
                                                        • API String ID: 1156100317-0
                                                        • Opcode ID: 69d38c35bd33e64192705e47d806ebaffe6519085bb8d16871af39b095092657
                                                        • Instruction ID: b3c7303b3f6d7a748b9785f0929be573d8311530aafd7ca54a1e010f9e1ac4f7
                                                        • Opcode Fuzzy Hash: 69d38c35bd33e64192705e47d806ebaffe6519085bb8d16871af39b095092657
                                                        • Instruction Fuzzy Hash: 4C118F22E18A0311F6543F6AD8CA3F599716FD6374E8C0A38E97E466DBDF2CF8414261
                                                        APIs
                                                        • FlsGetValue.KERNEL32(?,?,?,00007FF759969BD3,?,?,00000000,00007FF759969E6E,?,?,?,?,?,00007FF759961A40), ref: 00007FF75996A9DF
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF759969BD3,?,?,00000000,00007FF759969E6E,?,?,?,?,?,00007FF759961A40), ref: 00007FF75996A9FE
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF759969BD3,?,?,00000000,00007FF759969E6E,?,?,?,?,?,00007FF759961A40), ref: 00007FF75996AA26
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF759969BD3,?,?,00000000,00007FF759969E6E,?,?,?,?,?,00007FF759961A40), ref: 00007FF75996AA37
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF759969BD3,?,?,00000000,00007FF759969E6E,?,?,?,?,?,00007FF759961A40), ref: 00007FF75996AA48
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Value
                                                        • String ID:
                                                        • API String ID: 3702945584-0
                                                        • Opcode ID: 7e9f7daeefede5d6cf057412dd821cf39c29068a7a1c9ec5056b211d60d8f6b4
                                                        • Instruction ID: e1be6cc29470ac031505f077cdfd3e5f93e9ce2b08335a528beac89e7e43f397
                                                        • Opcode Fuzzy Hash: 7e9f7daeefede5d6cf057412dd821cf39c29068a7a1c9ec5056b211d60d8f6b4
                                                        • Instruction Fuzzy Hash: BF114210B0968241F9587F65EA4117AE1735FC57A0FAC5339E83E0B6D6DF2CA4514622
                                                        APIs
                                                        • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F), ref: 00007FF75996A865
                                                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F), ref: 00007FF75996A884
                                                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F), ref: 00007FF75996A8AC
                                                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F), ref: 00007FF75996A8BD
                                                        • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7599724B3,?,?,?,00007FF75996CCEC,?,?,00000000,00007FF75996386F), ref: 00007FF75996A8CE
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Value
                                                        • String ID:
                                                        • API String ID: 3702945584-0
                                                        • Opcode ID: beb9e1a05ea758e4ab17276de5b2837cba649d003c822ebdac11e23849688a82
                                                        • Instruction ID: ad8126982526b9e61b80ab8abc8913a54b22ac870984e08b6bd1ce6c3c8f573b
                                                        • Opcode Fuzzy Hash: beb9e1a05ea758e4ab17276de5b2837cba649d003c822ebdac11e23849688a82
                                                        • Instruction Fuzzy Hash: 3911FE20E0A28741F9587EA5D85217AD1724FC5770FEC4738D93E0A2D2DF2CB4524232
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                        • API String ID: 3215553584-1196891531
                                                        • Opcode ID: fa9c2c0b9e0b51f4f192ae3b8b8b95ed4a793ff286fdede4dba764f85164dfb1
                                                        • Instruction ID: d145201d8235b5b4b99cfd3a29167f08bbbb19383b5d17833fb55802a90ec4f4
                                                        • Opcode Fuzzy Hash: fa9c2c0b9e0b51f4f192ae3b8b8b95ed4a793ff286fdede4dba764f85164dfb1
                                                        • Instruction Fuzzy Hash: 9D81C332E0C28285F7647F2AC154678B6B0EF95BC4FDD8039DA0997A89CF2DE9019731
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: CallEncodePointerTranslator
                                                        • String ID: MOC$RCC
                                                        • API String ID: 3544855599-2084237596
                                                        • Opcode ID: f09742bcba9082defbae069630545238114b431a0e4fd7be58dd8469a5d7fef1
                                                        • Instruction ID: 115b9b6399b53cf91dab0fe931a2696fb8b4359042a3f77089b98f136a869c9c
                                                        • Opcode Fuzzy Hash: f09742bcba9082defbae069630545238114b431a0e4fd7be58dd8469a5d7fef1
                                                        • Instruction Fuzzy Hash: CB617B72A09A459AEB10EF65D0403AEB7B0FB85B8CF484225EF4D17B98DF38E056C750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                        • String ID: csm$csm
                                                        • API String ID: 3896166516-3733052814
                                                        • Opcode ID: a3990994d2fbb822c09bdc2a35b5fa2b647080e9aebb1a5b00e12dffe7bfe986
                                                        • Instruction ID: 8b8a5e3e5a3cd20b593b6aaa0b711630fd50762716149e72112dc2d9f8146522
                                                        • Opcode Fuzzy Hash: a3990994d2fbb822c09bdc2a35b5fa2b647080e9aebb1a5b00e12dffe7bfe986
                                                        • Instruction Fuzzy Hash: 9851BD3290968296EB64AF21945036AB7B0FFC5B95F8C4136DB9C47B99CF3CE450CB10
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,00007FF7599527C9,?,?,?,?,?,?), ref: 00007FF759952D01
                                                          • Part of subcall function 00007FF759951CB0: GetLastError.KERNEL32(?,?,00000000,00007FF759956904,?,?,?,?,?,?,?,?,?,?,?,00007FF759951023), ref: 00007FF759951CD7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastModuleName
                                                        • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                                        • API String ID: 2776309574-1977442011
                                                        • Opcode ID: 7987a5ce4ff3c8cba7d8c38c60f2d05ca27952d1a3ea66f3204455115dc1ef10
                                                        • Instruction ID: 70132a1707434f69ce95fa43871d29f10dddacaf8fc070649e32e01a8ed0c8a3
                                                        • Opcode Fuzzy Hash: 7987a5ce4ff3c8cba7d8c38c60f2d05ca27952d1a3ea66f3204455115dc1ef10
                                                        • Instruction Fuzzy Hash: 3C01A760B1D642A2FB61BF20D8453BAD2B5AFD97C0FCC4032D84D86296EF1DE144C720
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: FileWrite$ConsoleErrorLastOutput
                                                        • String ID:
                                                        • API String ID: 2718003287-0
                                                        • Opcode ID: 47f9f7c1e3185106a498671fedee26090088e719dd8e44b73d57f810765c87d4
                                                        • Instruction ID: 79d50cae4bdd7f2b1f8f9878bed1f556841033320cc75acb1538483282b5cb2c
                                                        • Opcode Fuzzy Hash: 47f9f7c1e3185106a498671fedee26090088e719dd8e44b73d57f810765c87d4
                                                        • Instruction Fuzzy Hash: 64D12372B08A8089E710DF69C4402ACB7B5FB847D8B884236DE5E97B99EF38D016C750
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                        • String ID:
                                                        • API String ID: 2780335769-0
                                                        • Opcode ID: 1291a0862dc251a0f1dda952d285f4a36c3dc69b0fb142e3468d3d288eb0a289
                                                        • Instruction ID: 336ab6cb2fce0f8c57e41eeb6324002855be486da9254fb4db72d01d71fea1cd
                                                        • Opcode Fuzzy Hash: 1291a0862dc251a0f1dda952d285f4a36c3dc69b0fb142e3468d3d288eb0a289
                                                        • Instruction Fuzzy Hash: A451B062E086818AFB10EFB1D4503BDA3B1BF85B59F989035DE4E57689DF38D481C760
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _get_daylight$_invalid_parameter_noinfo
                                                        • String ID: ?
                                                        • API String ID: 1286766494-1684325040
                                                        • Opcode ID: 610c018c2ed3d43a6dc6b39dfd7623f8c002a97b49fdc2d3a9d4eaa2ab755e24
                                                        • Instruction ID: f9951acc7f3ed1f4cd9f511d82c0d392bde210473635ce05a317d7227f86763e
                                                        • Opcode Fuzzy Hash: 610c018c2ed3d43a6dc6b39dfd7623f8c002a97b49fdc2d3a9d4eaa2ab755e24
                                                        • Instruction Fuzzy Hash: BA41E462B1828242FF64AF25E401379E771EFD2BA4F985235EE5C46AD6DF3CD4818710
                                                        APIs
                                                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF759968002
                                                          • Part of subcall function 00007FF759969F78: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF759971EC2,?,?,?,00007FF759971EFF,?,?,00000000,00007FF7599723C5,?,?,00000000,00007FF7599722F7), ref: 00007FF759969F8E
                                                          • Part of subcall function 00007FF759969F78: GetLastError.KERNEL32(?,?,?,00007FF759971EC2,?,?,?,00007FF759971EFF,?,?,00000000,00007FF7599723C5,?,?,00000000,00007FF7599722F7), ref: 00007FF759969F98
                                                        • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF75995A485), ref: 00007FF759968020
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: BoundaryDeleteDescriptorErrorFileLastModuleName_invalid_parameter_noinfo
                                                        • String ID: C:\Users\user\AppData\Local\Temp\lib.exe
                                                        • API String ID: 3976345311-1935384366
                                                        • Opcode ID: 87397ab4d942c93eb7ecf5272dbc7224ab3e9c0a5ace0b49458789d652eb9e0d
                                                        • Instruction ID: 949a99336f953dee09efc373ca1c6a077a390b9b7634acb6f7a1ab5a0c79ee05
                                                        • Opcode Fuzzy Hash: 87397ab4d942c93eb7ecf5272dbc7224ab3e9c0a5ace0b49458789d652eb9e0d
                                                        • Instruction Fuzzy Hash: 59417236A08B8286E714BF26D8410FDA3B8EB857C4BD94435E94E47B95DF3CE4818360
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastWrite
                                                        • String ID: U
                                                        • API String ID: 442123175-4171548499
                                                        • Opcode ID: 3868b3aae24abb70b6c7ced641cfa87b6d54125405e373b4c87f7bfc476be08b
                                                        • Instruction ID: 92eeb12e51fb9ddfc919a17fe197bc60e79dd84bd4f86e091674bf78a0dd96f3
                                                        • Opcode Fuzzy Hash: 3868b3aae24abb70b6c7ced641cfa87b6d54125405e373b4c87f7bfc476be08b
                                                        • Instruction Fuzzy Hash: 4E41B432619A8186DB209F65E8457AAB7B0FBD8794F884035EE4D87758EF3CD441C7A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory
                                                        • String ID: :
                                                        • API String ID: 1611563598-336475711
                                                        • Opcode ID: 299dd2601fabda0eaedb6d74bbca1af16fe573635883c06f79dbd5a665f7b651
                                                        • Instruction ID: 242b0dd1a07bcb72c6efe980ecdd9da54a1db9b1689bdfb08a15e71748eb4313
                                                        • Opcode Fuzzy Hash: 299dd2601fabda0eaedb6d74bbca1af16fe573635883c06f79dbd5a665f7b651
                                                        • Instruction Fuzzy Hash: 2021B162B086C182FB20AF55D44426EB3B2FBC4B84FD98039DA8D47285DF7CE955CB61
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFileHeaderRaise
                                                        • String ID: csm
                                                        • API String ID: 2573137834-1018135373
                                                        • Opcode ID: ee4cd62d6736e0f26efa3482034fbaa09f2706f16dc7c85cfdea4997af4e44da
                                                        • Instruction ID: e032faa1ff7745428abdd20a5e3cbd384fd7b5f36786c93ae9ddef4844113f3a
                                                        • Opcode Fuzzy Hash: ee4cd62d6736e0f26efa3482034fbaa09f2706f16dc7c85cfdea4997af4e44da
                                                        • Instruction Fuzzy Hash: BC114C32608B4192EB209F15F44026AB7B4FB88B84F5C4234EE8D07B68DF3DD551CB10
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000005.00000002.2090004096.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000005.00000002.2089978420.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090097587.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090226640.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000005.00000002.2090324210.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_5_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: DriveType_invalid_parameter_noinfo
                                                        • String ID: :
                                                        • API String ID: 2595371189-336475711
                                                        • Opcode ID: 231bdef7d4e4c9a314d514652501e8a1bb3d1d6653b2e53c967e9d93a887682d
                                                        • Instruction ID: 836b9f914563a62e45f7578329e4b428c19935c954d3484b74206964cd444be3
                                                        • Opcode Fuzzy Hash: 231bdef7d4e4c9a314d514652501e8a1bb3d1d6653b2e53c967e9d93a887682d
                                                        • Instruction Fuzzy Hash: BF014F61A1C68286FB20BF60D46227EA3B0EFC9748FC8103AD54D86695DF3CE585CB35

                                                        Execution Graph

                                                        Execution Coverage:4.6%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:776
                                                        Total number of Limit Nodes:18
                                                        execution_graph 29176 7ff75995a51c 29197 7ff75995a6fc 29176->29197 29179 7ff75995a53d __scrt_acquire_startup_lock 29182 7ff75995a67d 29179->29182 29188 7ff75995a55b __scrt_release_startup_lock 29179->29188 29180 7ff75995a673 29298 7ff75995aa2c 7 API calls 2 library calls 29180->29298 29299 7ff75995aa2c 7 API calls 2 library calls 29182->29299 29184 7ff75995a580 29185 7ff75995a688 _CallSETranslator 29186 7ff75995a606 29205 7ff759968738 29186->29205 29188->29184 29188->29186 29295 7ff759968ae4 45 API calls 29188->29295 29190 7ff75995a60b 29211 7ff759951000 29190->29211 29194 7ff75995a62f 29194->29185 29297 7ff75995a890 7 API calls __scrt_initialize_crt 29194->29297 29196 7ff75995a646 29196->29184 29300 7ff75995accc 29197->29300 29200 7ff75995a72b 29302 7ff7599691ec 29200->29302 29204 7ff75995a535 29204->29179 29204->29180 29206 7ff759968748 29205->29206 29210 7ff75996875d 29205->29210 29206->29210 29319 7ff7599681c8 40 API calls __free_lconv_mon 29206->29319 29208 7ff759968766 29208->29210 29320 7ff759968588 12 API calls 3 library calls 29208->29320 29210->29190 29212 7ff759951011 29211->29212 29321 7ff7599567c0 29212->29321 29214 7ff759951023 29328 7ff759964f7c 29214->29328 29216 7ff7599527ab 29335 7ff759951af0 29216->29335 29222 7ff7599527c9 29286 7ff7599528ca 29222->29286 29351 7ff759952c50 29222->29351 29224 7ff7599527fb 29224->29286 29354 7ff759955af0 29224->29354 29226 7ff759952817 29228 7ff759955af0 92 API calls 29226->29228 29242 7ff759952863 29226->29242 29232 7ff759952838 __vcrt_freefls 29228->29232 29229 7ff759952878 29373 7ff7599519d0 29229->29373 29237 7ff7599560f0 89 API calls 29232->29237 29232->29242 29233 7ff7599519d0 121 API calls 29236 7ff7599528ae 29233->29236 29234 7ff75995296d 29243 7ff759952998 29234->29243 29478 7ff7599524a0 86 API calls 29234->29478 29240 7ff7599528f0 29236->29240 29241 7ff7599528b2 29236->29241 29237->29242 29239 7ff7599529b8 29245 7ff7599529bd 29239->29245 29246 7ff7599529ce SetDllDirectoryW 29239->29246 29240->29234 29455 7ff759952de0 29240->29455 29440 7ff759951c50 29241->29440 29369 7ff7599560f0 29242->29369 29244 7ff7599529db 29243->29244 29384 7ff759956db0 29243->29384 29398 7ff759954fa0 29244->29398 29248 7ff759951c50 86 API calls 29245->29248 29246->29244 29248->29286 29253 7ff759952912 29258 7ff759951c50 86 API calls 29253->29258 29254 7ff759952a36 29261 7ff759952af6 29254->29261 29267 7ff759952a49 29254->29267 29257 7ff759952940 29257->29234 29260 7ff759952945 29257->29260 29258->29286 29259 7ff7599529f8 29259->29254 29480 7ff7599547a0 158 API calls 3 library calls 29259->29480 29474 7ff75995e60c 29260->29474 29430 7ff759952330 29261->29430 29265 7ff759952a09 29268 7ff759952a2c 29265->29268 29269 7ff759952a0d 29265->29269 29274 7ff759952a95 29267->29274 29484 7ff759951b30 29267->29484 29483 7ff7599549f0 FreeLibrary 29268->29483 29481 7ff759954730 120 API calls 29269->29481 29274->29286 29402 7ff7599522d0 29274->29402 29275 7ff759952a17 29275->29268 29277 7ff759952a1b 29275->29277 29276 7ff759952b2b 29278 7ff759955af0 92 API calls 29276->29278 29482 7ff759954df0 87 API calls 29277->29482 29281 7ff759952b37 29278->29281 29284 7ff759952b48 29281->29284 29281->29286 29282 7ff759952ad1 29488 7ff7599549f0 FreeLibrary 29282->29488 29283 7ff759952a2a 29283->29254 29490 7ff759956130 94 API calls 2 library calls 29284->29490 29446 7ff75995a100 29286->29446 29288 7ff759952b60 29491 7ff7599549f0 FreeLibrary 29288->29491 29290 7ff759952b87 29493 7ff759951ab0 74 API calls __vcrt_freefls 29290->29493 29291 7ff759952b6c 29291->29290 29492 7ff759955df0 98 API calls 2 library calls 29291->29492 29294 7ff759952b8f 29294->29286 29295->29186 29296 7ff75995ab80 GetModuleHandleW 29296->29194 29297->29196 29298->29182 29299->29185 29301 7ff75995a71e __scrt_dllmain_crt_thread_attach 29300->29301 29301->29200 29301->29204 29303 7ff75997264c 29302->29303 29304 7ff75995a730 29303->29304 29307 7ff75996bb50 29303->29307 29304->29204 29306 7ff75995be28 7 API calls 2 library calls 29304->29306 29306->29204 29318 7ff75996f808 EnterCriticalSection 29307->29318 29309 7ff75996bb60 29310 7ff759966ca8 43 API calls 29309->29310 29311 7ff75996bb69 29310->29311 29312 7ff75996bb77 29311->29312 29314 7ff75996b958 45 API calls 29311->29314 29313 7ff75996f868 _isindst LeaveCriticalSection 29312->29313 29315 7ff75996bb83 29313->29315 29316 7ff75996bb72 29314->29316 29315->29303 29317 7ff75996ba48 GetStdHandle GetFileType 29316->29317 29317->29312 29319->29208 29320->29210 29322 7ff7599567df 29321->29322 29323 7ff759956830 WideCharToMultiByte 29322->29323 29324 7ff7599567e7 __vcrt_freefls 29322->29324 29326 7ff759956886 WideCharToMultiByte 29322->29326 29327 7ff7599568d8 29322->29327 29323->29322 29323->29327 29324->29214 29326->29322 29326->29327 29494 7ff759951cb0 86 API calls 29327->29494 29331 7ff75996ecc0 29328->29331 29329 7ff75996ed13 29495 7ff759969e44 37 API calls 2 library calls 29329->29495 29331->29329 29332 7ff75996ed66 29331->29332 29496 7ff75996eb98 71 API calls _fread_nolock 29332->29496 29334 7ff75996ed3c 29334->29216 29336 7ff759951b05 29335->29336 29337 7ff759951b20 29336->29337 29497 7ff759951c10 86 API calls 29336->29497 29337->29286 29339 7ff759952cd0 29337->29339 29498 7ff75995a130 29339->29498 29342 7ff759952d0b 29500 7ff759951cb0 86 API calls 29342->29500 29343 7ff759952d22 29501 7ff759956ec0 88 API calls 29343->29501 29346 7ff759952d35 29348 7ff759951c50 86 API calls 29346->29348 29349 7ff759952d1e 29346->29349 29347 7ff75995a100 _wfindfirst32i64 8 API calls 29350 7ff759952d5f 29347->29350 29348->29349 29349->29347 29350->29222 29352 7ff759951b30 49 API calls 29351->29352 29353 7ff759952c6d 29352->29353 29353->29224 29355 7ff759955afa 29354->29355 29356 7ff759956db0 88 API calls 29355->29356 29357 7ff759955b1c GetEnvironmentVariableW 29356->29357 29358 7ff759955b34 ExpandEnvironmentStringsW 29357->29358 29359 7ff759955b86 29357->29359 29502 7ff759956ec0 88 API calls 29358->29502 29360 7ff75995a100 _wfindfirst32i64 8 API calls 29359->29360 29362 7ff759955b98 29360->29362 29362->29226 29363 7ff759955b5c 29363->29359 29364 7ff759955b66 29363->29364 29503 7ff75996926c 37 API calls 2 library calls 29364->29503 29366 7ff759955b6e 29367 7ff75995a100 _wfindfirst32i64 8 API calls 29366->29367 29368 7ff759955b7e 29367->29368 29368->29226 29370 7ff759956db0 88 API calls 29369->29370 29371 7ff759956107 SetEnvironmentVariableW 29370->29371 29372 7ff75995611f __vcrt_freefls 29371->29372 29372->29229 29374 7ff759951b30 49 API calls 29373->29374 29375 7ff759951a00 29374->29375 29376 7ff759951b30 49 API calls 29375->29376 29381 7ff759951a7a 29375->29381 29377 7ff759951a22 29376->29377 29378 7ff759952c50 49 API calls 29377->29378 29377->29381 29379 7ff759951a3b 29378->29379 29504 7ff7599517b0 29379->29504 29381->29233 29381->29234 29383 7ff75995e60c 74 API calls 29383->29381 29385 7ff759956e57 MultiByteToWideChar 29384->29385 29386 7ff759956dd1 MultiByteToWideChar 29384->29386 29387 7ff759956e7a 29385->29387 29388 7ff759956e9f 29385->29388 29389 7ff759956e1c 29386->29389 29390 7ff759956df7 29386->29390 29587 7ff759951cb0 86 API calls 29387->29587 29388->29239 29389->29385 29395 7ff759956e32 29389->29395 29585 7ff759951cb0 86 API calls 29390->29585 29393 7ff759956e8d 29393->29239 29394 7ff759956e0a 29394->29239 29586 7ff759951cb0 86 API calls 29395->29586 29397 7ff759956e45 29397->29239 29399 7ff759954fb5 29398->29399 29400 7ff7599529e0 29399->29400 29588 7ff759951c10 86 API calls 29399->29588 29400->29254 29479 7ff759954c40 120 API calls 2 library calls 29400->29479 29589 7ff759953ac0 29402->29589 29405 7ff75995231d 29405->29282 29407 7ff7599522f4 29407->29405 29645 7ff759953840 29407->29645 29409 7ff759952300 29409->29405 29655 7ff7599539a0 29409->29655 29411 7ff75995230c 29411->29405 29412 7ff75995255c 29411->29412 29413 7ff759952547 29411->29413 29416 7ff75995257c 29412->29416 29422 7ff759952592 __vcrt_freefls 29412->29422 29414 7ff759951c50 86 API calls 29413->29414 29415 7ff759952553 29414->29415 29417 7ff75995a100 _wfindfirst32i64 8 API calls 29415->29417 29418 7ff759951c50 86 API calls 29416->29418 29419 7ff7599526ea 29417->29419 29418->29415 29419->29282 29422->29415 29423 7ff759951b30 49 API calls 29422->29423 29424 7ff75995273f 29422->29424 29426 7ff759952719 29422->29426 29428 7ff7599526f6 29422->29428 29660 7ff7599512b0 29422->29660 29686 7ff759951780 86 API calls 29422->29686 29423->29422 29425 7ff759951c50 86 API calls 29424->29425 29425->29415 29427 7ff759951c50 86 API calls 29426->29427 29427->29415 29429 7ff759951c50 86 API calls 29428->29429 29429->29415 29438 7ff7599523a3 29430->29438 29439 7ff7599523e4 29430->29439 29431 7ff759952423 29433 7ff75995a100 _wfindfirst32i64 8 API calls 29431->29433 29434 7ff759952435 29433->29434 29434->29286 29489 7ff759956080 88 API calls __vcrt_freefls 29434->29489 29438->29439 29770 7ff759951dc0 29438->29770 29825 7ff759951440 158 API calls 2 library calls 29438->29825 29827 7ff759951780 86 API calls 29438->29827 29439->29431 29826 7ff759951ab0 74 API calls __vcrt_freefls 29439->29826 29441 7ff759951c6e 29440->29441 29922 7ff759951b90 29441->29922 29447 7ff75995a109 29446->29447 29448 7ff75995a1c0 IsProcessorFeaturePresent 29447->29448 29449 7ff7599528de 29447->29449 29450 7ff75995a1d8 29448->29450 29449->29296 29971 7ff75995a3b4 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 29450->29971 29452 7ff75995a1eb 29972 7ff75995a180 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 29452->29972 29456 7ff759952dec 29455->29456 29457 7ff759956db0 88 API calls 29456->29457 29458 7ff759952e17 29457->29458 29459 7ff759956db0 88 API calls 29458->29459 29460 7ff759952e2a 29459->29460 29973 7ff759965538 29460->29973 29463 7ff75995a100 _wfindfirst32i64 8 API calls 29464 7ff75995290a 29463->29464 29464->29253 29465 7ff759956360 29464->29465 29466 7ff759956384 29465->29466 29467 7ff75995ec94 73 API calls 29466->29467 29472 7ff75995645b __vcrt_freefls 29466->29472 29468 7ff75995639e 29467->29468 29468->29472 30141 7ff759967a9c 29468->30141 29470 7ff75995ec94 73 API calls 29473 7ff7599563b3 29470->29473 29471 7ff75995e95c _fread_nolock 53 API calls 29471->29473 29472->29257 29473->29470 29473->29471 29473->29472 29475 7ff75995e63c 29474->29475 30157 7ff75995e3e8 29475->30157 29477 7ff75995e655 29477->29253 29478->29243 29479->29259 29480->29265 29481->29275 29482->29283 29483->29254 29485 7ff759951b55 29484->29485 29486 7ff759963c80 49 API calls 29485->29486 29487 7ff759951b78 29486->29487 29487->29274 29488->29286 29489->29276 29490->29288 29491->29291 29492->29290 29493->29294 29494->29324 29495->29334 29496->29334 29497->29337 29499 7ff759952cdc GetModuleFileNameW 29498->29499 29499->29342 29499->29343 29500->29349 29501->29346 29502->29363 29503->29366 29505 7ff7599517d4 29504->29505 29506 7ff7599517e4 29504->29506 29507 7ff759952de0 120 API calls 29505->29507 29508 7ff759956360 83 API calls 29506->29508 29534 7ff759951842 29506->29534 29507->29506 29509 7ff759951815 29508->29509 29509->29534 29538 7ff75995ec94 29509->29538 29511 7ff75995182b 29513 7ff75995184c 29511->29513 29514 7ff75995182f 29511->29514 29512 7ff75995a100 _wfindfirst32i64 8 API calls 29515 7ff7599519c0 29512->29515 29542 7ff75995e95c 29513->29542 29551 7ff759951c10 86 API calls 29514->29551 29515->29381 29515->29383 29519 7ff759951867 29552 7ff759951c10 86 API calls 29519->29552 29520 7ff75995ec94 73 API calls 29522 7ff7599518d1 29520->29522 29523 7ff7599518fe 29522->29523 29524 7ff7599518e3 29522->29524 29526 7ff75995e95c _fread_nolock 53 API calls 29523->29526 29553 7ff759951c10 86 API calls 29524->29553 29527 7ff759951913 29526->29527 29527->29519 29528 7ff759951925 29527->29528 29545 7ff75995e6d0 29528->29545 29531 7ff75995193d 29532 7ff759951c50 86 API calls 29531->29532 29532->29534 29533 7ff759951993 29533->29534 29536 7ff75995e60c 74 API calls 29533->29536 29534->29512 29535 7ff759951950 29535->29533 29537 7ff759951c50 86 API calls 29535->29537 29536->29534 29537->29533 29539 7ff75995ecc4 29538->29539 29554 7ff75995ea24 29539->29554 29541 7ff75995ecdd 29541->29511 29567 7ff75995e97c 29542->29567 29546 7ff75995e6d9 29545->29546 29550 7ff759951939 29545->29550 29583 7ff759966088 11 API calls _get_daylight 29546->29583 29548 7ff75995e6de 29584 7ff759969f10 37 API calls _invalid_parameter_noinfo 29548->29584 29550->29531 29550->29535 29551->29534 29552->29534 29553->29534 29555 7ff75995ea8e 29554->29555 29556 7ff75995ea4e 29554->29556 29555->29556 29558 7ff75995ea9a 29555->29558 29566 7ff759969e44 37 API calls 2 library calls 29556->29566 29565 7ff75996438c EnterCriticalSection 29558->29565 29560 7ff75995ea9f 29561 7ff75995eba8 71 API calls 29560->29561 29562 7ff75995eab1 29561->29562 29563 7ff759964398 _fread_nolock LeaveCriticalSection 29562->29563 29564 7ff75995ea75 29563->29564 29564->29541 29566->29564 29568 7ff75995e9a6 29567->29568 29569 7ff759951861 29567->29569 29568->29569 29570 7ff75995e9b5 memcpy_s 29568->29570 29571 7ff75995e9f2 29568->29571 29569->29519 29569->29520 29581 7ff759966088 11 API calls _get_daylight 29570->29581 29580 7ff75996438c EnterCriticalSection 29571->29580 29574 7ff75995e9fa 29576 7ff75995e6fc _fread_nolock 51 API calls 29574->29576 29575 7ff75995e9ca 29582 7ff759969f10 37 API calls _invalid_parameter_noinfo 29575->29582 29578 7ff75995ea11 29576->29578 29579 7ff759964398 _fread_nolock LeaveCriticalSection 29578->29579 29579->29569 29581->29575 29583->29548 29585->29394 29586->29397 29587->29393 29588->29400 29590 7ff759953ad0 29589->29590 29591 7ff759951b30 49 API calls 29590->29591 29592 7ff759953b02 29591->29592 29593 7ff759953b2b 29592->29593 29594 7ff759953b0b 29592->29594 29596 7ff759953b82 29593->29596 29687 7ff759952e60 29593->29687 29595 7ff759951c50 86 API calls 29594->29595 29598 7ff759953b21 29595->29598 29597 7ff759952e60 49 API calls 29596->29597 29601 7ff759953b9b 29597->29601 29603 7ff75995a100 _wfindfirst32i64 8 API calls 29598->29603 29600 7ff759953b4c 29602 7ff759953b6a 29600->29602 29605 7ff759951c50 86 API calls 29600->29605 29604 7ff759953bb9 29601->29604 29608 7ff759951c50 86 API calls 29601->29608 29690 7ff759952d70 29602->29690 29607 7ff7599522de 29603->29607 29696 7ff759956310 29604->29696 29605->29602 29607->29405 29617 7ff759953e40 29607->29617 29608->29604 29611 7ff759953bc6 29612 7ff759953bcb 29611->29612 29613 7ff759953bed 29611->29613 29700 7ff759951cb0 86 API calls 29612->29700 29701 7ff759952f20 141 API calls 29613->29701 29616 7ff759956310 89 API calls 29616->29596 29618 7ff759955af0 92 API calls 29617->29618 29621 7ff759953e55 29618->29621 29619 7ff759953e70 29620 7ff759956db0 88 API calls 29619->29620 29622 7ff759953eb4 29620->29622 29621->29619 29623 7ff759951c50 86 API calls 29621->29623 29624 7ff759953eb9 29622->29624 29625 7ff759953ed0 29622->29625 29623->29619 29626 7ff759951c50 86 API calls 29624->29626 29628 7ff759956db0 88 API calls 29625->29628 29627 7ff759953ec5 29626->29627 29627->29407 29629 7ff759953f05 29628->29629 29631 7ff759951b30 49 API calls 29629->29631 29643 7ff759953f0a __vcrt_freefls 29629->29643 29630 7ff759951c50 86 API calls 29632 7ff7599540b1 29630->29632 29633 7ff759953f87 29631->29633 29632->29407 29634 7ff759953f8e 29633->29634 29635 7ff759953fb3 29633->29635 29636 7ff759951c50 86 API calls 29634->29636 29637 7ff759956db0 88 API calls 29635->29637 29638 7ff759953fa3 29636->29638 29639 7ff759953fcc 29637->29639 29638->29407 29639->29643 29702 7ff759953c20 29639->29702 29643->29630 29644 7ff75995409a 29643->29644 29644->29407 29646 7ff759953857 29645->29646 29646->29646 29647 7ff759953880 29646->29647 29653 7ff759953897 __vcrt_freefls 29646->29653 29648 7ff759951c50 86 API calls 29647->29648 29649 7ff75995388c 29648->29649 29649->29409 29650 7ff75995397b 29650->29409 29651 7ff7599512b0 120 API calls 29651->29653 29653->29650 29653->29651 29654 7ff759951c50 86 API calls 29653->29654 29744 7ff759951780 86 API calls 29653->29744 29654->29653 29657 7ff759953aa7 29655->29657 29659 7ff7599539bb 29655->29659 29657->29411 29658 7ff759951c50 86 API calls 29658->29659 29659->29657 29659->29658 29745 7ff759951780 86 API calls 29659->29745 29661 7ff7599512f8 29660->29661 29662 7ff7599512c6 29660->29662 29664 7ff75995ec94 73 API calls 29661->29664 29663 7ff759952de0 120 API calls 29662->29663 29665 7ff7599512d6 29663->29665 29666 7ff75995130a 29664->29666 29665->29661 29667 7ff7599512de 29665->29667 29668 7ff75995130e 29666->29668 29669 7ff75995132f 29666->29669 29671 7ff759951c50 86 API calls 29667->29671 29764 7ff759951c10 86 API calls 29668->29764 29674 7ff759951364 29669->29674 29675 7ff759951344 29669->29675 29673 7ff7599512ee 29671->29673 29672 7ff759951325 29672->29422 29673->29422 29677 7ff75995137e 29674->29677 29681 7ff759951395 29674->29681 29765 7ff759951c10 86 API calls 29675->29765 29746 7ff759951050 29677->29746 29679 7ff75995e95c _fread_nolock 53 API calls 29679->29681 29680 7ff759951421 29680->29422 29681->29679 29683 7ff7599513de 29681->29683 29684 7ff75995135f __vcrt_freefls 29681->29684 29682 7ff75995e60c 74 API calls 29682->29680 29766 7ff759951c10 86 API calls 29683->29766 29684->29680 29684->29682 29686->29422 29688 7ff759951b30 49 API calls 29687->29688 29689 7ff759952e90 29688->29689 29689->29600 29691 7ff759952d7a 29690->29691 29692 7ff759956db0 88 API calls 29691->29692 29693 7ff759952da2 29692->29693 29694 7ff75995a100 _wfindfirst32i64 8 API calls 29693->29694 29695 7ff759952dca 29694->29695 29695->29596 29695->29616 29697 7ff759956db0 88 API calls 29696->29697 29698 7ff759956327 LoadLibraryW 29697->29698 29699 7ff759956344 __vcrt_freefls 29698->29699 29699->29611 29700->29598 29701->29598 29703 7ff759953c3a 29702->29703 29707 7ff759953d53 29703->29707 29711 7ff759953e29 29703->29711 29728 7ff759953df1 29703->29728 29730 7ff759965740 47 API calls 29703->29730 29731 7ff759951780 86 API calls 29703->29731 29704 7ff75995a100 _wfindfirst32i64 8 API calls 29705 7ff759953e10 29704->29705 29729 7ff759956fb0 88 API calls __vcrt_freefls 29705->29729 29707->29728 29732 7ff7599692e4 29707->29732 29713 7ff759951c50 86 API calls 29711->29713 29713->29728 29714 7ff759953d76 29715 7ff7599692e4 _fread_nolock 37 API calls 29714->29715 29716 7ff759953d88 29715->29716 29739 7ff75996584c 39 API calls 3 library calls 29716->29739 29718 7ff759953d94 29740 7ff759965dd4 73 API calls 29718->29740 29720 7ff759953da6 29741 7ff759965dd4 73 API calls 29720->29741 29722 7ff759953db8 29723 7ff759964f7c 71 API calls 29722->29723 29724 7ff759953dc9 29723->29724 29725 7ff759964f7c 71 API calls 29724->29725 29726 7ff759953ddd 29725->29726 29727 7ff759964f7c 71 API calls 29726->29727 29727->29728 29728->29704 29729->29643 29730->29703 29731->29703 29733 7ff7599692ed 29732->29733 29734 7ff759953d6a 29732->29734 29742 7ff759966088 11 API calls _get_daylight 29733->29742 29738 7ff75996584c 39 API calls 3 library calls 29734->29738 29736 7ff7599692f2 29743 7ff759969f10 37 API calls _invalid_parameter_noinfo 29736->29743 29738->29714 29739->29718 29740->29720 29741->29722 29742->29736 29744->29653 29745->29659 29747 7ff7599510a6 29746->29747 29748 7ff7599510ad 29747->29748 29749 7ff7599510d3 29747->29749 29750 7ff759951c50 86 API calls 29748->29750 29752 7ff7599510ed 29749->29752 29753 7ff759951109 29749->29753 29751 7ff7599510c0 29750->29751 29751->29684 29767 7ff759951c10 86 API calls 29752->29767 29755 7ff75995111b 29753->29755 29763 7ff759951137 memcpy_s 29753->29763 29768 7ff759951c10 86 API calls 29755->29768 29757 7ff75995e95c _fread_nolock 53 API calls 29757->29763 29758 7ff75995e6d0 37 API calls 29758->29763 29759 7ff759951104 __vcrt_freefls 29759->29684 29760 7ff7599511fe 29761 7ff759951c50 86 API calls 29760->29761 29761->29759 29763->29757 29763->29758 29763->29759 29763->29760 29769 7ff75995f09c 76 API calls 29763->29769 29764->29672 29765->29684 29766->29684 29767->29759 29768->29759 29769->29763 29771 7ff759951dd6 29770->29771 29772 7ff759951b30 49 API calls 29771->29772 29773 7ff759951e0b 29772->29773 29774 7ff759952c50 49 API calls 29773->29774 29803 7ff759952211 29773->29803 29775 7ff759951e7f 29774->29775 29828 7ff759952230 29775->29828 29778 7ff759951efa 29780 7ff759952230 75 API calls 29778->29780 29779 7ff759951ec1 29836 7ff759955880 127 API calls 29779->29836 29782 7ff759951f4c 29780->29782 29784 7ff759951fb6 29782->29784 29785 7ff759951f50 29782->29785 29783 7ff759951ec9 29786 7ff759951eea 29783->29786 29837 7ff759955760 138 API calls 2 library calls 29783->29837 29788 7ff759952230 75 API calls 29784->29788 29838 7ff759955880 127 API calls 29785->29838 29790 7ff759951c50 86 API calls 29786->29790 29793 7ff759951ef3 29786->29793 29791 7ff759951fe2 29788->29791 29790->29793 29794 7ff759952042 29791->29794 29796 7ff759952230 75 API calls 29791->29796 29792 7ff759951f58 29792->29786 29839 7ff759955760 138 API calls 2 library calls 29792->29839 29795 7ff75995a100 _wfindfirst32i64 8 API calls 29793->29795 29794->29803 29840 7ff759955880 127 API calls 29794->29840 29799 7ff759951fab 29795->29799 29800 7ff759952012 29796->29800 29799->29438 29800->29794 29804 7ff759952230 75 API calls 29800->29804 29801 7ff759951f75 29801->29786 29802 7ff7599521f6 29801->29802 29808 7ff759951c50 86 API calls 29802->29808 29804->29794 29805 7ff759952052 29805->29803 29806 7ff759951af0 86 API calls 29805->29806 29817 7ff75995216f 29805->29817 29807 7ff7599520af 29806->29807 29807->29803 29810 7ff759951b30 49 API calls 29807->29810 29809 7ff75995216a 29808->29809 29843 7ff759951ab0 74 API calls __vcrt_freefls 29809->29843 29812 7ff7599520d7 29810->29812 29812->29802 29814 7ff759951b30 49 API calls 29812->29814 29813 7ff7599521db 29813->29802 29842 7ff759951440 158 API calls 2 library calls 29813->29842 29815 7ff759952104 29814->29815 29815->29802 29818 7ff759951b30 49 API calls 29815->29818 29817->29813 29841 7ff759951780 86 API calls 29817->29841 29819 7ff759952131 29818->29819 29819->29802 29821 7ff7599517b0 121 API calls 29819->29821 29822 7ff759952153 29821->29822 29822->29817 29823 7ff759952157 29822->29823 29824 7ff759951c50 86 API calls 29823->29824 29824->29809 29825->29438 29826->29439 29827->29438 29829 7ff759952264 29828->29829 29844 7ff759963c80 29829->29844 29832 7ff75995229b 29834 7ff75995a100 _wfindfirst32i64 8 API calls 29832->29834 29835 7ff759951ebd 29834->29835 29835->29778 29835->29779 29836->29783 29837->29786 29838->29792 29839->29801 29840->29805 29841->29817 29842->29813 29843->29803 29846 7ff759963cda 29844->29846 29845 7ff759963cff 29879 7ff759969e44 37 API calls 2 library calls 29845->29879 29846->29845 29848 7ff759963d3b 29846->29848 29880 7ff7599616c4 49 API calls _invalid_parameter_noinfo 29848->29880 29850 7ff759963d29 29853 7ff75995a100 _wfindfirst32i64 8 API calls 29850->29853 29851 7ff759963e18 29883 7ff759969f78 11 API calls 2 library calls 29851->29883 29854 7ff75995228a 29853->29854 29854->29832 29862 7ff759964e70 29854->29862 29855 7ff759963dd2 29855->29851 29856 7ff759963e3c 29855->29856 29857 7ff759963ded 29855->29857 29859 7ff759963de4 29855->29859 29856->29851 29860 7ff759963e46 29856->29860 29881 7ff759969f78 11 API calls 2 library calls 29857->29881 29859->29851 29859->29857 29882 7ff759969f78 11 API calls 2 library calls 29860->29882 29863 7ff759964e8d 29862->29863 29864 7ff759964e99 29862->29864 29884 7ff7599646e8 29863->29884 29909 7ff759964a84 45 API calls _CallSETranslator 29864->29909 29867 7ff759964e92 29867->29832 29868 7ff759964ec1 29871 7ff759964ed1 29868->29871 29910 7ff75996e144 5 API calls __crtLCMapStringW 29868->29910 29911 7ff75996456c 14 API calls 3 library calls 29871->29911 29872 7ff759964f29 29873 7ff759964f2d 29872->29873 29874 7ff759964f41 29872->29874 29873->29867 29912 7ff759969f78 11 API calls 2 library calls 29873->29912 29875 7ff7599646e8 69 API calls 29874->29875 29877 7ff759964f4d 29875->29877 29877->29867 29913 7ff759969f78 11 API calls 2 library calls 29877->29913 29879->29850 29880->29855 29881->29850 29882->29850 29883->29850 29885 7ff75996471f 29884->29885 29886 7ff759964702 29884->29886 29885->29886 29887 7ff759964732 CreateFileW 29885->29887 29914 7ff759966068 11 API calls _get_daylight 29886->29914 29889 7ff75996479c 29887->29889 29890 7ff759964766 29887->29890 29918 7ff759964d60 46 API calls 3 library calls 29889->29918 29917 7ff75996483c 59 API calls 3 library calls 29890->29917 29891 7ff759964707 29915 7ff759966088 11 API calls _get_daylight 29891->29915 29895 7ff759964774 29898 7ff75996477b CloseHandle 29895->29898 29899 7ff759964791 CloseHandle 29895->29899 29896 7ff7599647a1 29900 7ff7599647a5 29896->29900 29901 7ff7599647d0 29896->29901 29897 7ff75996470f 29916 7ff759969f10 37 API calls _invalid_parameter_noinfo 29897->29916 29903 7ff75996471a 29898->29903 29899->29903 29919 7ff759965ffc 11 API calls 2 library calls 29900->29919 29920 7ff759964b20 51 API calls 29901->29920 29903->29867 29906 7ff7599647dd 29921 7ff759964c5c 21 API calls _fread_nolock 29906->29921 29908 7ff7599647af 29908->29903 29909->29868 29910->29871 29911->29872 29912->29867 29913->29867 29914->29891 29915->29897 29917->29895 29918->29896 29919->29908 29920->29906 29921->29908 29923 7ff759951bb6 29922->29923 29936 7ff759963b5c 29923->29936 29925 7ff759951bcc 29926 7ff759951d00 29925->29926 29927 7ff759951d10 29926->29927 29928 7ff759963c80 49 API calls 29927->29928 29929 7ff759951d58 29928->29929 29952 7ff759956bf0 MultiByteToWideChar 29929->29952 29931 7ff759951d70 29932 7ff759951b90 78 API calls 29931->29932 29933 7ff759951d9e 29932->29933 29934 7ff75995a100 _wfindfirst32i64 8 API calls 29933->29934 29935 7ff759951c9b 29934->29935 29935->29286 29937 7ff759963b86 29936->29937 29938 7ff759963bbe 29937->29938 29940 7ff759963bf1 29937->29940 29950 7ff759969e44 37 API calls 2 library calls 29938->29950 29943 7ff75995f140 29940->29943 29942 7ff759963be7 29942->29925 29951 7ff75996438c EnterCriticalSection 29943->29951 29945 7ff75995f15d 29946 7ff759961084 76 API calls 29945->29946 29947 7ff75995f166 29946->29947 29948 7ff759964398 _fread_nolock LeaveCriticalSection 29947->29948 29949 7ff75995f170 29948->29949 29949->29942 29950->29942 29953 7ff759956c39 29952->29953 29954 7ff759956c53 29952->29954 29967 7ff759951cb0 86 API calls 29953->29967 29956 7ff759956c69 29954->29956 29957 7ff759956c83 MultiByteToWideChar 29954->29957 29968 7ff759951cb0 86 API calls 29956->29968 29959 7ff759956ca6 29957->29959 29960 7ff759956cc0 WideCharToMultiByte 29957->29960 29969 7ff759951cb0 86 API calls 29959->29969 29962 7ff759956cf6 29960->29962 29964 7ff759956ced 29960->29964 29963 7ff759956d1b WideCharToMultiByte 29962->29963 29962->29964 29963->29964 29966 7ff759956c4c __vcrt_freefls 29963->29966 29970 7ff759951cb0 86 API calls 29964->29970 29966->29931 29967->29966 29968->29966 29969->29966 29970->29966 29971->29452 29974 7ff75996546c 29973->29974 29975 7ff759965492 29974->29975 29978 7ff7599654c5 29974->29978 30004 7ff759966088 11 API calls _get_daylight 29975->30004 29977 7ff759965497 30005 7ff759969f10 37 API calls _invalid_parameter_noinfo 29977->30005 29980 7ff7599654cb 29978->29980 29981 7ff7599654d8 29978->29981 30006 7ff759966088 11 API calls _get_daylight 29980->30006 29992 7ff75996a258 29981->29992 29984 7ff759952e39 29984->29463 29986 7ff7599654ec 30007 7ff759966088 11 API calls _get_daylight 29986->30007 29987 7ff7599654f9 29999 7ff75996f51c 29987->29999 29990 7ff75996550c 30008 7ff759964398 LeaveCriticalSection 29990->30008 30009 7ff75996f808 EnterCriticalSection 29992->30009 29994 7ff75996a26f 29995 7ff75996a2cc 19 API calls 29994->29995 29996 7ff75996a27a 29995->29996 29997 7ff75996f868 _isindst LeaveCriticalSection 29996->29997 29998 7ff7599654e2 29997->29998 29998->29986 29998->29987 30010 7ff75996f218 29999->30010 30002 7ff75996f576 30002->29990 30004->29977 30006->29984 30007->29984 30015 7ff75996f253 __vcrt_InitializeCriticalSectionEx 30010->30015 30012 7ff75996f4f1 30029 7ff759969f10 37 API calls _invalid_parameter_noinfo 30012->30029 30014 7ff75996f423 30014->30002 30022 7ff7599761dc 30014->30022 30020 7ff75996f41a 30015->30020 30025 7ff7599754f4 51 API calls 3 library calls 30015->30025 30017 7ff75996f485 30017->30020 30026 7ff7599754f4 51 API calls 3 library calls 30017->30026 30019 7ff75996f4a4 30019->30020 30027 7ff7599754f4 51 API calls 3 library calls 30019->30027 30020->30014 30028 7ff759966088 11 API calls _get_daylight 30020->30028 30030 7ff7599757dc 30022->30030 30025->30017 30026->30019 30027->30020 30028->30012 30031 7ff7599757f3 30030->30031 30032 7ff759975811 30030->30032 30084 7ff759966088 11 API calls _get_daylight 30031->30084 30032->30031 30035 7ff75997582d 30032->30035 30034 7ff7599757f8 30085 7ff759969f10 37 API calls _invalid_parameter_noinfo 30034->30085 30041 7ff759975dec 30035->30041 30039 7ff759975804 30039->30002 30087 7ff759975b20 30041->30087 30044 7ff759975e79 30107 7ff759966e60 30044->30107 30045 7ff759975e61 30119 7ff759966068 11 API calls _get_daylight 30045->30119 30048 7ff759975e66 30120 7ff759966088 11 API calls _get_daylight 30048->30120 30058 7ff759975858 30058->30039 30086 7ff759966e38 LeaveCriticalSection 30058->30086 30084->30034 30088 7ff759975b4c 30087->30088 30095 7ff759975b66 30087->30095 30088->30095 30132 7ff759966088 11 API calls _get_daylight 30088->30132 30090 7ff759975b5b 30133 7ff759969f10 37 API calls _invalid_parameter_noinfo 30090->30133 30092 7ff759975c35 30105 7ff759975c92 30092->30105 30138 7ff7599657dc 37 API calls 2 library calls 30092->30138 30093 7ff759975be4 30093->30092 30136 7ff759966088 11 API calls _get_daylight 30093->30136 30095->30093 30134 7ff759966088 11 API calls _get_daylight 30095->30134 30097 7ff759975c8e 30100 7ff759975d10 30097->30100 30097->30105 30099 7ff759975c2a 30137 7ff759969f10 37 API calls _invalid_parameter_noinfo 30099->30137 30139 7ff759969f30 17 API calls _wfindfirst32i64 30100->30139 30101 7ff759975bd9 30135 7ff759969f10 37 API calls _invalid_parameter_noinfo 30101->30135 30105->30044 30105->30045 30140 7ff75996f808 EnterCriticalSection 30107->30140 30119->30048 30120->30058 30132->30090 30134->30101 30136->30099 30138->30097 30142 7ff759967acc 30141->30142 30145 7ff7599675a8 30142->30145 30144 7ff759967ae5 30144->29473 30146 7ff7599675c3 30145->30146 30147 7ff7599675f2 30145->30147 30156 7ff759969e44 37 API calls 2 library calls 30146->30156 30155 7ff75996438c EnterCriticalSection 30147->30155 30150 7ff7599675f7 30151 7ff759967614 38 API calls 30150->30151 30152 7ff759967603 30151->30152 30153 7ff759964398 _fread_nolock LeaveCriticalSection 30152->30153 30154 7ff7599675e3 30153->30154 30154->30144 30156->30154 30158 7ff75995e403 30157->30158 30159 7ff75995e431 30157->30159 30168 7ff759969e44 37 API calls 2 library calls 30158->30168 30161 7ff75995e423 30159->30161 30167 7ff75996438c EnterCriticalSection 30159->30167 30161->29477 30163 7ff75995e448 30164 7ff75995e464 72 API calls 30163->30164 30165 7ff75995e454 30164->30165 30166 7ff759964398 _fread_nolock LeaveCriticalSection 30165->30166 30166->30161 30168->30161 30169 7ff759968919 30181 7ff759969238 30169->30181 30171 7ff75996891e 30172 7ff759968945 GetModuleHandleW 30171->30172 30173 7ff75996898f 30171->30173 30172->30173 30179 7ff759968952 30172->30179 30174 7ff75996881c 11 API calls 30173->30174 30175 7ff7599689cb 30174->30175 30176 7ff7599689d2 30175->30176 30177 7ff7599689e8 11 API calls 30175->30177 30178 7ff7599689e4 30177->30178 30179->30173 30180 7ff759968a40 GetModuleHandleExW GetProcAddress FreeLibrary 30179->30180 30180->30173 30186 7ff75996a780 45 API calls 3 library calls 30181->30186 30183 7ff759969241 30187 7ff75996936c 45 API calls 2 library calls 30183->30187 30186->30183 30188 7ff7599599a0 30189 7ff7599599df memcpy_s 30188->30189 30190 7ff7599599c3 30188->30190 30192 7ff75996cc2c 30190->30192 30193 7ff75996cc77 30192->30193 30197 7ff75996cc3b _get_daylight 30192->30197 30200 7ff759966088 11 API calls _get_daylight 30193->30200 30195 7ff75996cc5e RtlAllocateHeap 30196 7ff75996cc75 30195->30196 30195->30197 30196->30189 30197->30193 30197->30195 30199 7ff759972730 EnterCriticalSection LeaveCriticalSection _get_daylight 30197->30199 30199->30197 30200->30196 30201 7ff8b8f81060 WSAStartup 30202 7ff8b8f83108 30201->30202 30203 7ff8b8f810b0 Py_AtExit 30201->30203 30206 7ff8b8f8313c PyErr_SetString 30202->30206 30212 7ff8b8f8311c PyErr_Format 30202->30212 30204 7ff8b8f81159 PyModule_Create2 30203->30204 30205 7ff8b8f810d1 30203->30205 30207 7ff8b8f8216b 30204->30207 30208 7ff8b8f81185 PyModule_AddObject PyErr_NewException 30204->30208 30210 7ff8b8f810f0 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 30205->30210 30215 7ff8b8f83162 PyErr_NoMemory 30206->30215 30238 7ff8b8f82280 8 API calls 2 library calls 30207->30238 30208->30207 30211 7ff8b8f811cf PyModule_AddObject PyErr_NewException 30208->30211 30210->30204 30211->30207 30214 7ff8b8f8120f PyModule_AddObject PyModule_AddObjectRef PyModule_AddObject 30211->30214 30212->30206 30214->30207 30217 7ff8b8f81268 PyModule_AddObject 30214->30217 30215->30207 30228 7ff8b8f83171 30215->30228 30216 7ff8b8f8217d 30217->30207 30219 7ff8b8f8128a PyModule_AddObject PyMem_Malloc 30217->30219 30218 7ff8b8f8322a _Py_Dealloc 30218->30207 30219->30215 30220 7ff8b8f812bb PyCapsule_New 30219->30220 30221 7ff8b8f8130a PyModule_AddObject 30220->30221 30222 7ff8b8f83176 30220->30222 30224 7ff8b8f8318c 30221->30224 30225 7ff8b8f81325 150 API calls 30221->30225 30239 7ff8b8f84b80 _Py_Dealloc _Py_Dealloc _Py_Dealloc PyMem_Free 30222->30239 30226 7ff8b8f83191 _Py_Dealloc 30224->30226 30224->30228 30227 7ff8b8f82037 PyLong_FromUnsignedLong 30225->30227 30226->30228 30227->30207 30229 7ff8b8f82048 PyModule_AddObject 30227->30229 30228->30207 30228->30218 30229->30227 30230 7ff8b8f82066 PyModule_AddIntConstant PyModule_AddIntConstant PyModule_AddIntConstant PyModule_AddIntConstant PyModule_GetDict 30229->30230 30230->30228 30231 7ff8b8f820cd VerSetConditionMask VerSetConditionMask VerSetConditionMask 30230->30231 30232 7ff8b8f8214a VerifyVersionInfoA 30231->30232 30232->30207 30233 7ff8b8f831a8 PyUnicode_FromString 30232->30233 30233->30228 30234 7ff8b8f831c8 _PyDict_Pop 30233->30234 30235 7ff8b8f831ee 30234->30235 30236 7ff8b8f831e5 _Py_Dealloc 30234->30236 30235->30228 30235->30232 30237 7ff8b8f831fa _Py_Dealloc 30235->30237 30236->30235 30237->30235 30238->30216

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 7ff8b8f81060-7ff8b8f810aa WSAStartup 1 7ff8b8f83108-7ff8b8f83110 0->1 2 7ff8b8f810b0-7ff8b8f810cb Py_AtExit 0->2 5 7ff8b8f83145 1->5 6 7ff8b8f83112-7ff8b8f83115 1->6 3 7ff8b8f81159-7ff8b8f8117f PyModule_Create2 2->3 4 7ff8b8f810d1-7ff8b8f81153 call 7ff8b8f82f5c VerSetConditionMask * 3 VerifyVersionInfoW 2->4 8 7ff8b8f8219e-7ff8b8f821a0 3->8 9 7ff8b8f81185-7ff8b8f811c9 PyModule_AddObject PyErr_NewException 3->9 4->3 12 7ff8b8f8314c-7ff8b8f8315c PyErr_SetString 5->12 10 7ff8b8f8313c-7ff8b8f83143 6->10 11 7ff8b8f83117-7ff8b8f8311a 6->11 15 7ff8b8f8216e-7ff8b8f8219d call 7ff8b8f82280 8->15 9->8 14 7ff8b8f811cf-7ff8b8f81209 PyModule_AddObject PyErr_NewException 9->14 10->12 11->5 16 7ff8b8f8311c-7ff8b8f83136 PyErr_Format 11->16 19 7ff8b8f83162-7ff8b8f8316b PyErr_NoMemory 12->19 14->8 18 7ff8b8f8120f-7ff8b8f81262 PyModule_AddObject PyModule_AddObjectRef PyModule_AddObject 14->18 16->10 18->8 22 7ff8b8f81268-7ff8b8f81284 PyModule_AddObject 18->22 19->8 20 7ff8b8f83171 19->20 23 7ff8b8f8322a-7ff8b8f83234 _Py_Dealloc 20->23 22->8 24 7ff8b8f8128a-7ff8b8f812b5 PyModule_AddObject PyMem_Malloc 22->24 23->8 24->19 25 7ff8b8f812bb-7ff8b8f81304 PyCapsule_New 24->25 26 7ff8b8f8130a-7ff8b8f8131f PyModule_AddObject 25->26 27 7ff8b8f83176-7ff8b8f83181 call 7ff8b8f84b80 25->27 29 7ff8b8f8318c-7ff8b8f8318f 26->29 30 7ff8b8f81325-7ff8b8f82034 PyModule_AddIntConstant * 11 PyModule_AddStringConstant * 2 PyModule_AddIntConstant * 137 26->30 27->8 35 7ff8b8f83187 27->35 32 7ff8b8f8319a-7ff8b8f8319d 29->32 33 7ff8b8f83191-7ff8b8f83194 _Py_Dealloc 29->33 34 7ff8b8f82037-7ff8b8f82042 PyLong_FromUnsignedLong 30->34 32->8 36 7ff8b8f831a3 32->36 33->32 34->8 37 7ff8b8f82048-7ff8b8f82064 PyModule_AddObject 34->37 35->23 36->23 37->34 38 7ff8b8f82066-7ff8b8f820c7 PyModule_AddIntConstant * 4 PyModule_GetDict 37->38 39 7ff8b8f820cd-7ff8b8f82147 VerSetConditionMask * 3 38->39 40 7ff8b8f83220-7ff8b8f83224 38->40 41 7ff8b8f8214a-7ff8b8f82165 VerifyVersionInfoA 39->41 40->8 40->23 42 7ff8b8f8216b 41->42 43 7ff8b8f831a8-7ff8b8f831c6 PyUnicode_FromString 41->43 42->15 43->40 44 7ff8b8f831c8-7ff8b8f831e3 _PyDict_Pop 43->44 45 7ff8b8f831ee-7ff8b8f831f1 44->45 46 7ff8b8f831e5-7ff8b8f831e8 _Py_Dealloc 44->46 45->40 47 7ff8b8f831f3-7ff8b8f831f8 45->47 46->45 48 7ff8b8f831fa-7ff8b8f831fd _Py_Dealloc 47->48 49 7ff8b8f83203-7ff8b8f83215 47->49 48->49 49->41 50 7ff8b8f8321b 49->50 50->40
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2087709938.00007FF8B8F81000.00000020.00000001.01000000.00000011.sdmp, Offset: 00007FF8B8F80000, based on PE: true
                                                        • Associated: 00000007.00000002.2087650117.00007FF8B8F80000.00000002.00000001.01000000.00000011.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087738939.00007FF8B8F88000.00000002.00000001.01000000.00000011.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087768763.00007FF8B8F90000.00000004.00000001.01000000.00000011.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087824889.00007FF8B8F92000.00000002.00000001.01000000.00000011.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b8f80000_lib.jbxd
                                                        Similarity
                                                        • API ID: Module_$Constant$Object$ConditionMask$Err_$ExceptionInfoStringVerifyVersion$Capsule_Create2DictExitFormatFromLongLong_MallocMem_StartupUnsigned
                                                        • String ID: 00:00:00:00:00:00$00:00:00:FF:FF:FF$AF_APPLETALK$AF_BLUETOOTH$AF_DECnet$AF_INET$AF_INET6$AF_IPX$AF_IRDA$AF_LINK$AF_SNA$AF_UNSPEC$AI_ADDRCONFIG$AI_ALL$AI_CANONNAME$AI_NUMERICHOST$AI_NUMERICSERV$AI_PASSIVE$AI_V4MAPPED$BDADDR_ANY$BDADDR_LOCAL$BTPROTO_RFCOMM$CAPI$EAI_AGAIN$EAI_BADFLAGS$EAI_FAIL$EAI_FAMILY$EAI_MEMORY$EAI_NODATA$EAI_NONAME$EAI_SERVICE$EAI_SOCKTYPE$INADDR_ALLHOSTS_GROUP$INADDR_ANY$INADDR_BROADCAST$INADDR_LOOPBACK$INADDR_MAX_LOCAL_GROUP$INADDR_NONE$INADDR_UNSPEC_GROUP$IPPORT_RESERVED$IPPORT_USERRESERVED$IPPROTO_AH$IPPROTO_CBT$IPPROTO_DSTOPTS$IPPROTO_EGP$IPPROTO_ESP$IPPROTO_FRAGMENT$IPPROTO_GGP$IPPROTO_HOPOPTS$IPPROTO_ICLFXBM$IPPROTO_ICMP$IPPROTO_ICMPV6$IPPROTO_IDP$IPPROTO_IGMP$IPPROTO_IGP$IPPROTO_IP$IPPROTO_IPV4$IPPROTO_IPV6$IPPROTO_L2TP$IPPROTO_MAX$IPPROTO_ND$IPPROTO_NONE$IPPROTO_PGM$IPPROTO_PIM$IPPROTO_PUP$IPPROTO_RAW$IPPROTO_RDP$IPPROTO_ROUTING$IPPROTO_SCTP$IPPROTO_ST$IPPROTO_TCP$IPPROTO_UDP$IPV6_CHECKSUM$IPV6_DONTFRAG$IPV6_HOPLIMIT$IPV6_HOPOPTS$IPV6_JOIN_GROUP$IPV6_LEAVE_GROUP$IPV6_MULTICAST_HOPS$IPV6_MULTICAST_IF$IPV6_MULTICAST_LOOP$IPV6_PKTINFO$IPV6_RECVRTHDR$IPV6_RECVTCLASS$IPV6_RTHDR$IPV6_TCLASS$IPV6_UNICAST_HOPS$IPV6_V6ONLY$IP_ADD_MEMBERSHIP$IP_DROP_MEMBERSHIP$IP_HDRINCL$IP_MULTICAST_IF$IP_MULTICAST_LOOP$IP_MULTICAST_TTL$IP_OPTIONS$IP_RECVDSTADDR$IP_RECVTOS$IP_TOS$IP_TTL$MSG_BCAST$MSG_CTRUNC$MSG_DONTROUTE$MSG_ERRQUEUE$MSG_MCAST$MSG_OOB$MSG_PEEK$MSG_TRUNC$MSG_WAITALL$NI_DGRAM$NI_MAXHOST$NI_MAXSERV$NI_NAMEREQD$NI_NOFQDN$NI_NUMERICHOST$NI_NUMERICSERV$RCVALL_MAX$RCVALL_OFF$RCVALL_ON$RCVALL_SOCKETLEVELONLY$SHUT_RD$SHUT_RDWR$SHUT_WR$SIO_KEEPALIVE_VALS$SIO_LOOPBACK_FAST_PATH$SIO_RCVALL$SOCK_DGRAM$SOCK_RAW$SOCK_RDM$SOCK_SEQPACKET$SOCK_STREAM$SOL_IP$SOL_SOCKET$SOL_TCP$SOL_UDP$SOMAXCONN$SO_ACCEPTCONN$SO_BROADCAST$SO_DEBUG$SO_DONTROUTE$SO_ERROR$SO_EXCLUSIVEADDRUSE$SO_KEEPALIVE$SO_LINGER$SO_OOBINLINE$SO_RCVBUF$SO_RCVLOWAT$SO_RCVTIMEO$SO_REUSEADDR$SO_SNDBUF$SO_SNDLOWAT$SO_SNDTIMEO$SO_TYPE$SO_USELOOPBACK$SocketType$TCP_FASTOPEN$TCP_KEEPCNT$TCP_KEEPIDLE$TCP_KEEPINTVL$TCP_MAXSEG$TCP_NODELAY$WSAStartup failed: error code %d$WSAStartup failed: network not ready$WSAStartup failed: requested version not supported$_socket.CAPI$error$gaierror$has_ipv6$herror$socket$socket.gaierror$socket.herror$timeout
                                                        • API String ID: 2280847565-1299366327
                                                        • Opcode ID: de31a07a70c23239d4b04c80589f0f0a269b501d95a9cdd44f27bf4122d5a2ac
                                                        • Instruction ID: 82c3ee16806cd76376e876881f763aea6a6a623a5d46e839538f4238c70133e8
                                                        • Opcode Fuzzy Hash: de31a07a70c23239d4b04c80589f0f0a269b501d95a9cdd44f27bf4122d5a2ac
                                                        • Instruction Fuzzy Hash: C8A2A674B38B12D5EB24DB19EC54A642721BB4ABD2F846035CE0E06766EF7DE14BC708

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 203 7ff759975dec-7ff759975e5f call 7ff759975b20 206 7ff759975e79-7ff759975e83 call 7ff759966e60 203->206 207 7ff759975e61-7ff759975e6a call 7ff759966068 203->207 212 7ff759975e9e-7ff759975f07 CreateFileW 206->212 213 7ff759975e85-7ff759975e9c call 7ff759966068 call 7ff759966088 206->213 214 7ff759975e6d-7ff759975e74 call 7ff759966088 207->214 216 7ff759975f09-7ff759975f0f 212->216 217 7ff759975f84-7ff759975f8f GetFileType 212->217 213->214 230 7ff7599761ba-7ff7599761da 214->230 220 7ff759975f51-7ff759975f7f GetLastError call 7ff759965ffc 216->220 221 7ff759975f11-7ff759975f15 216->221 223 7ff759975f91-7ff759975fcc GetLastError call 7ff759965ffc CloseHandle 217->223 224 7ff759975fe2-7ff759975fe9 217->224 220->214 221->220 228 7ff759975f17-7ff759975f4f CreateFileW 221->228 223->214 237 7ff759975fd2-7ff759975fdd call 7ff759966088 223->237 226 7ff759975feb-7ff759975fef 224->226 227 7ff759975ff1-7ff759975ff4 224->227 233 7ff759975ffa-7ff75997604f call 7ff759966d78 226->233 227->233 234 7ff759975ff6 227->234 228->217 228->220 242 7ff75997606e-7ff75997609f call 7ff7599758a0 233->242 243 7ff759976051-7ff75997605d call 7ff759975d28 233->243 234->233 237->214 248 7ff7599760a5-7ff7599760e7 242->248 249 7ff7599760a1-7ff7599760a3 242->249 243->242 250 7ff75997605f 243->250 252 7ff759976109-7ff759976114 248->252 253 7ff7599760e9-7ff7599760ed 248->253 251 7ff759976061-7ff759976069 call 7ff75996a0f0 249->251 250->251 251->230 255 7ff75997611a-7ff75997611e 252->255 256 7ff7599761b8 252->256 253->252 254 7ff7599760ef-7ff759976104 253->254 254->252 255->256 259 7ff759976124-7ff759976169 CloseHandle CreateFileW 255->259 256->230 260 7ff75997619e-7ff7599761b3 259->260 261 7ff75997616b-7ff759976199 GetLastError call 7ff759965ffc call 7ff759966fa0 259->261 260->256 261->260
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                        • String ID:
                                                        • API String ID: 1617910340-0
                                                        • Opcode ID: 52a4378cdb78c32285671ba8c66096e739a338fe2dbd84037285ee5c330aca07
                                                        • Instruction ID: 33bf0895a9f886bd93a0cd8c299c3f1e286768b4eaffff7a83aa6c252b17aafe
                                                        • Opcode Fuzzy Hash: 52a4378cdb78c32285671ba8c66096e739a338fe2dbd84037285ee5c330aca07
                                                        • Instruction Fuzzy Hash: AFC1E332B28A8285EB50EF65C4902AC7771FB8AB98F890235DE1E577D5DF38D055C350

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _fread_nolock$_invalid_parameter_noinfo
                                                        • String ID: Cannot read Table of Contents.$Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                        • API String ID: 3405171723-4158440160
                                                        • Opcode ID: 736129cd9be44a1661b95b2ba33e5867236fc23d91738a4fb4e31e423767e709
                                                        • Instruction ID: 7e04b00b44234568771d1c16493688f22dfe73a36bf073d75e4b116391836054
                                                        • Opcode Fuzzy Hash: 736129cd9be44a1661b95b2ba33e5867236fc23d91738a4fb4e31e423767e709
                                                        • Instruction Fuzzy Hash: 46518471A0960296EB64EF24E55017DB3B0FFC8B48B994535DA0D87399EF3CE440C750

                                                        Control-flow Graph

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                        • API String ID: 0-3659356012
                                                        • Opcode ID: 4918d2128a8ecda01d9acef525f1e0412807303ad2fd783619b67edb74489764
                                                        • Instruction ID: 051823fea10bd3e4a084e13e875771eadda11b5dc424cebd1252aa4048aafb8b
                                                        • Opcode Fuzzy Hash: 4918d2128a8ecda01d9acef525f1e0412807303ad2fd783619b67edb74489764
                                                        • Instruction Fuzzy Hash: BC416D21A49642A2EA24FF11E9502BAE3B0EF857D4FC84432DE4D47A55FF3DE582C320

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 329 7ff759951000-7ff7599527b6 call 7ff75995e3e0 call 7ff75995e3d8 call 7ff7599567c0 call 7ff75995a130 call 7ff759964310 call 7ff759964f7c call 7ff759951af0 345 7ff7599527bc-7ff7599527cb call 7ff759952cd0 329->345 346 7ff7599528ca 329->346 345->346 351 7ff7599527d1-7ff7599527e4 call 7ff759952ba0 345->351 348 7ff7599528cf-7ff7599528ef call 7ff75995a100 346->348 351->346 355 7ff7599527ea-7ff7599527fd call 7ff759952c50 351->355 355->346 358 7ff759952803-7ff75995282a call 7ff759955af0 355->358 361 7ff75995286c-7ff759952894 call 7ff7599560f0 call 7ff7599519d0 358->361 362 7ff75995282c-7ff75995283b call 7ff759955af0 358->362 372 7ff75995297d-7ff75995298e 361->372 373 7ff75995289a-7ff7599528b0 call 7ff7599519d0 361->373 362->361 368 7ff75995283d-7ff759952843 362->368 370 7ff759952845-7ff75995284d 368->370 371 7ff75995284f-7ff759952869 call 7ff759964138 call 7ff7599560f0 368->371 370->371 371->361 377 7ff7599529a3-7ff7599529bb call 7ff759956db0 372->377 378 7ff759952990-7ff75995299a call 7ff7599524a0 372->378 384 7ff7599528f0-7ff7599528f3 373->384 385 7ff7599528b2-7ff7599528c5 call 7ff759951c50 373->385 390 7ff7599529bd-7ff7599529c9 call 7ff759951c50 377->390 391 7ff7599529ce-7ff7599529d5 SetDllDirectoryW 377->391 388 7ff7599529db-7ff7599529e8 call 7ff759954fa0 378->388 389 7ff75995299c 378->389 384->372 393 7ff7599528f9-7ff759952910 call 7ff759952de0 384->393 385->346 402 7ff7599529ea-7ff7599529fa call 7ff759954c40 388->402 403 7ff759952a36-7ff759952a3b call 7ff759954f20 388->403 389->377 390->346 391->388 400 7ff759952917-7ff759952943 call 7ff759956360 393->400 401 7ff759952912-7ff759952915 393->401 412 7ff75995296d-7ff75995297b 400->412 413 7ff759952945-7ff75995294d call 7ff75995e60c 400->413 404 7ff759952952-7ff759952968 call 7ff759951c50 401->404 402->403 417 7ff7599529fc-7ff759952a0b call 7ff7599547a0 402->417 410 7ff759952a40-7ff759952a43 403->410 404->346 415 7ff759952a49-7ff759952a56 410->415 416 7ff759952af6-7ff759952afe call 7ff759952330 410->416 412->378 413->404 420 7ff759952a60-7ff759952a6a 415->420 423 7ff759952b03-7ff759952b05 416->423 429 7ff759952a2c-7ff759952a31 call 7ff7599549f0 417->429 430 7ff759952a0d-7ff759952a19 call 7ff759954730 417->430 425 7ff759952a6c-7ff759952a71 420->425 426 7ff759952a73-7ff759952a75 420->426 423->346 431 7ff759952b0b-7ff759952b42 call 7ff759956080 call 7ff759955af0 call 7ff759954540 423->431 425->420 425->426 427 7ff759952a77-7ff759952a9a call 7ff759951b30 426->427 428 7ff759952ac1-7ff759952ad6 call 7ff759952490 call 7ff7599522d0 call 7ff759952480 426->428 427->346 441 7ff759952aa0-7ff759952aab 427->441 453 7ff759952adb-7ff759952af1 call 7ff7599549f0 call 7ff759954f20 428->453 429->403 430->429 442 7ff759952a1b-7ff759952a2a call 7ff759954df0 430->442 431->346 454 7ff759952b48-7ff759952b7d call 7ff759952490 call 7ff759956130 call 7ff7599549f0 call 7ff759954f20 431->454 445 7ff759952ab0-7ff759952abf 441->445 442->410 445->428 445->445 453->348 467 7ff759952b87-7ff759952b91 call 7ff759951ab0 454->467 468 7ff759952b7f-7ff759952b82 call 7ff759955df0 454->468 467->348 468->467
                                                        APIs
                                                          • Part of subcall function 00007FF759952CD0: GetModuleFileNameW.KERNEL32(?,00007FF7599527C9,?,?,?,?,?,?), ref: 00007FF759952D01
                                                        • SetDllDirectoryW.KERNEL32 ref: 00007FF7599529D5
                                                          • Part of subcall function 00007FF759955AF0: GetEnvironmentVariableW.KERNEL32(00007FF759952817,?,?,?,?,?,?), ref: 00007FF759955B2A
                                                          • Part of subcall function 00007FF759955AF0: ExpandEnvironmentStringsW.KERNEL32(?,?,?,?,?,?), ref: 00007FF759955B47
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Environment$DirectoryExpandFileModuleNameStringsVariable
                                                        • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                        • API String ID: 2344891160-3602715111
                                                        • Opcode ID: 67bc1566bc9cc6a33af69393369d413ea151452bcbd73ad5ab79c7a03e38c932
                                                        • Instruction ID: dd7068710be220c1abbc3ea07a3d919f340b274f3f28caf2709f595dbbd5e807
                                                        • Opcode Fuzzy Hash: 67bc1566bc9cc6a33af69393369d413ea151452bcbd73ad5ab79c7a03e38c932
                                                        • Instruction Fuzzy Hash: 27C16021A2C68265FA64BF2195512FFE3B1BFD4784FC85032EA4D4769AEF2CE505C720

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 472 7ff759951050-7ff7599510ab call 7ff759959990 475 7ff7599510ad-7ff7599510d2 call 7ff759951c50 472->475 476 7ff7599510d3-7ff7599510eb call 7ff75996414c 472->476 481 7ff7599510ed-7ff759951104 call 7ff759951c10 476->481 482 7ff759951109-7ff759951119 call 7ff75996414c 476->482 487 7ff75995126c-7ff7599512a0 call 7ff759959670 call 7ff759964138 * 2 481->487 488 7ff75995111b-7ff759951132 call 7ff759951c10 482->488 489 7ff759951137-7ff759951147 482->489 488->487 491 7ff759951150-7ff759951175 call 7ff75995e95c 489->491 498 7ff75995117b-7ff759951185 call 7ff75995e6d0 491->498 499 7ff75995125e 491->499 498->499 506 7ff75995118b-7ff759951197 498->506 501 7ff759951264 499->501 501->487 507 7ff7599511a0-7ff7599511b5 call 7ff759957de0 506->507 509 7ff7599511ba-7ff7599511c8 507->509 510 7ff7599511ca-7ff7599511cd 509->510 511 7ff759951241-7ff75995125c call 7ff759951c50 509->511 513 7ff75995123c 510->513 514 7ff7599511cf-7ff7599511d9 510->514 511->501 513->511 516 7ff7599511db-7ff7599511f0 call 7ff75995f09c 514->516 517 7ff759951203-7ff759951206 514->517 524 7ff7599511fe-7ff759951201 516->524 525 7ff7599511f2-7ff7599511fc call 7ff75995e6d0 516->525 519 7ff759951208-7ff759951216 call 7ff75995aec0 517->519 520 7ff759951219-7ff75995121e 517->520 519->520 520->507 523 7ff759951220-7ff759951223 520->523 527 7ff759951237-7ff75995123a 523->527 528 7ff759951225-7ff759951228 523->528 524->511 525->520 525->524 527->501 528->511 530 7ff75995122a-7ff759951232 528->530 530->491
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 1.2.13$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                        • API String ID: 0-1655038675
                                                        • Opcode ID: 4cdabe7c4b542fcbeb55cc849069b6767c06bae466cdcbdf6bf18b53adaadb6a
                                                        • Instruction ID: ea4f4e5a340953bacaff18066637a777c68a5da6ece31f09c28e573c86133112
                                                        • Opcode Fuzzy Hash: 4cdabe7c4b542fcbeb55cc849069b6767c06bae466cdcbdf6bf18b53adaadb6a
                                                        • Instruction Fuzzy Hash: 1F519C22A09682A1EA70BF51E5403BAA2A0BFC5798FCC4135DE4E87795FF3CE545C720

                                                        Control-flow Graph

                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,00000000,?,00007FF75996E2CA,?,?,-00000018,00007FF75996A383,?,?,?,00007FF75996A27A,?,?,?,00007FF7599654E2), ref: 00007FF75996E0AC
                                                        • GetProcAddress.KERNEL32(?,00000000,?,00007FF75996E2CA,?,?,-00000018,00007FF75996A383,?,?,?,00007FF75996A27A,?,?,?,00007FF7599654E2), ref: 00007FF75996E0B8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeLibraryProc
                                                        • String ID: api-ms-$ext-ms-
                                                        • API String ID: 3013587201-537541572
                                                        • Opcode ID: 5d4014bca18f9f9ee9ee76f308e7221266f6712ab36b1d3e30b229e2872ef72f
                                                        • Instruction ID: 07998a99c4e0b97ae75273e9face9fd3f230911a098c111fbe83e17da6126c37
                                                        • Opcode Fuzzy Hash: 5d4014bca18f9f9ee9ee76f308e7221266f6712ab36b1d3e30b229e2872ef72f
                                                        • Instruction Fuzzy Hash: 4F410161B1AA5281FA12AF56D800675A3B1BFC5BA0FCC4539DD1D8B384EF3CE445C324

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 558 7ff75996b08c-7ff75996b0b2 559 7ff75996b0cd-7ff75996b0d1 558->559 560 7ff75996b0b4-7ff75996b0c8 call 7ff759966068 call 7ff759966088 558->560 562 7ff75996b4a7-7ff75996b4b3 call 7ff759966068 call 7ff759966088 559->562 563 7ff75996b0d7-7ff75996b0de 559->563 577 7ff75996b4be 560->577 580 7ff75996b4b9 call 7ff759969f10 562->580 563->562 565 7ff75996b0e4-7ff75996b112 563->565 565->562 568 7ff75996b118-7ff75996b11f 565->568 571 7ff75996b138-7ff75996b13b 568->571 572 7ff75996b121-7ff75996b133 call 7ff759966068 call 7ff759966088 568->572 575 7ff75996b4a3-7ff75996b4a5 571->575 576 7ff75996b141-7ff75996b147 571->576 572->580 581 7ff75996b4c1-7ff75996b4d8 575->581 576->575 582 7ff75996b14d-7ff75996b150 576->582 577->581 580->577 582->572 585 7ff75996b152-7ff75996b177 582->585 587 7ff75996b179-7ff75996b17b 585->587 588 7ff75996b1aa-7ff75996b1b1 585->588 591 7ff75996b17d-7ff75996b184 587->591 592 7ff75996b1a2-7ff75996b1a8 587->592 589 7ff75996b186-7ff75996b19d call 7ff759966068 call 7ff759966088 call 7ff759969f10 588->589 590 7ff75996b1b3-7ff75996b1db call 7ff75996cc2c call 7ff759969f78 * 2 588->590 619 7ff75996b330 589->619 621 7ff75996b1dd-7ff75996b1f3 call 7ff759966088 call 7ff759966068 590->621 622 7ff75996b1f8-7ff75996b223 call 7ff75996b8b4 590->622 591->589 591->592 593 7ff75996b228-7ff75996b23f 592->593 596 7ff75996b2ba-7ff75996b2c4 call 7ff759972abc 593->596 597 7ff75996b241-7ff75996b249 593->597 610 7ff75996b34e 596->610 611 7ff75996b2ca-7ff75996b2df 596->611 597->596 600 7ff75996b24b-7ff75996b24d 597->600 600->596 604 7ff75996b24f-7ff75996b265 600->604 604->596 608 7ff75996b267-7ff75996b273 604->608 608->596 613 7ff75996b275-7ff75996b277 608->613 615 7ff75996b353-7ff75996b373 ReadFile 610->615 611->610 616 7ff75996b2e1-7ff75996b2f3 GetConsoleMode 611->616 613->596 620 7ff75996b279-7ff75996b291 613->620 623 7ff75996b46d-7ff75996b476 GetLastError 615->623 624 7ff75996b379-7ff75996b381 615->624 616->610 618 7ff75996b2f5-7ff75996b2fd 616->618 618->615 625 7ff75996b2ff-7ff75996b321 ReadConsoleW 618->625 628 7ff75996b333-7ff75996b33d call 7ff759969f78 619->628 620->596 629 7ff75996b293-7ff75996b29f 620->629 621->619 622->593 626 7ff75996b478-7ff75996b48e call 7ff759966088 call 7ff759966068 623->626 627 7ff75996b493-7ff75996b496 623->627 624->623 631 7ff75996b387 624->631 634 7ff75996b323 GetLastError 625->634 635 7ff75996b342-7ff75996b34c 625->635 626->619 639 7ff75996b49c-7ff75996b49e 627->639 640 7ff75996b329-7ff75996b32b call 7ff759965ffc 627->640 628->581 629->596 638 7ff75996b2a1-7ff75996b2a3 629->638 642 7ff75996b38e-7ff75996b3a3 631->642 634->640 635->642 638->596 646 7ff75996b2a5-7ff75996b2b5 638->646 639->628 640->619 642->628 648 7ff75996b3a5-7ff75996b3b0 642->648 646->596 649 7ff75996b3d7-7ff75996b3df 648->649 650 7ff75996b3b2-7ff75996b3cb call 7ff75996aca4 648->650 654 7ff75996b45b-7ff75996b468 call 7ff75996aae4 649->654 655 7ff75996b3e1-7ff75996b3f3 649->655 658 7ff75996b3d0-7ff75996b3d2 650->658 654->658 659 7ff75996b44e-7ff75996b456 655->659 660 7ff75996b3f5 655->660 658->628 659->628 662 7ff75996b3fa-7ff75996b401 660->662 663 7ff75996b43d-7ff75996b448 662->663 664 7ff75996b403-7ff75996b407 662->664 663->659 665 7ff75996b409-7ff75996b410 664->665 666 7ff75996b423 664->666 665->666 667 7ff75996b412-7ff75996b416 665->667 668 7ff75996b429-7ff75996b439 666->668 667->666 669 7ff75996b418-7ff75996b421 667->669 668->662 670 7ff75996b43b 668->670 669->668 670->659
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 6ace3fbad8ddd1cd05ed41dddf3a6c6a2c6962649ba5052cc4813f441b9b9292
                                                        • Instruction ID: 956f924bc8cd71f1dccfd23491324f7b0afe9ca7069b14b4bda2196306e369c2
                                                        • Opcode Fuzzy Hash: 6ace3fbad8ddd1cd05ed41dddf3a6c6a2c6962649ba5052cc4813f441b9b9292
                                                        • Instruction Fuzzy Hash: 2AC1BD22A0C6C691E720AF15D4402BEABB9EBC5B80FDD4135DA4E07795EF7DE8498360

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 736 7ff75996c590-7ff75996c5b5 737 7ff75996c5bb-7ff75996c5be 736->737 738 7ff75996c883 736->738 739 7ff75996c5f7-7ff75996c623 737->739 740 7ff75996c5c0-7ff75996c5f2 call 7ff759969e44 737->740 741 7ff75996c885-7ff75996c895 738->741 743 7ff75996c62e-7ff75996c634 739->743 744 7ff75996c625-7ff75996c62c 739->744 740->741 746 7ff75996c636-7ff75996c63f call 7ff75996b950 743->746 747 7ff75996c644-7ff75996c659 call 7ff759972abc 743->747 744->740 744->743 746->747 751 7ff75996c773-7ff75996c77c 747->751 752 7ff75996c65f-7ff75996c668 747->752 754 7ff75996c77e-7ff75996c784 751->754 755 7ff75996c7d0-7ff75996c7f5 WriteFile 751->755 752->751 753 7ff75996c66e-7ff75996c672 752->753 756 7ff75996c683-7ff75996c68e 753->756 757 7ff75996c674-7ff75996c67c call 7ff759963830 753->757 760 7ff75996c7bc-7ff75996c7c9 call 7ff75996c048 754->760 761 7ff75996c786-7ff75996c789 754->761 758 7ff75996c7f7-7ff75996c7fd GetLastError 755->758 759 7ff75996c800 755->759 765 7ff75996c69f-7ff75996c6b4 GetConsoleMode 756->765 766 7ff75996c690-7ff75996c699 756->766 757->756 758->759 768 7ff75996c803 759->768 775 7ff75996c7ce 760->775 762 7ff75996c78b-7ff75996c78e 761->762 763 7ff75996c7a8-7ff75996c7ba call 7ff75996c268 761->763 769 7ff75996c814-7ff75996c81e 762->769 770 7ff75996c794-7ff75996c7a6 call 7ff75996c14c 762->770 783 7ff75996c760-7ff75996c767 763->783 773 7ff75996c76c 765->773 774 7ff75996c6ba-7ff75996c6c0 765->774 766->751 766->765 776 7ff75996c808 768->776 777 7ff75996c87c-7ff75996c881 769->777 778 7ff75996c820-7ff75996c825 769->778 770->783 773->751 781 7ff75996c749-7ff75996c75b call 7ff75996bbd0 774->781 782 7ff75996c6c6-7ff75996c6c9 774->782 775->783 784 7ff75996c80d 776->784 777->741 785 7ff75996c827-7ff75996c82a 778->785 786 7ff75996c853-7ff75996c85d 778->786 781->783 789 7ff75996c6cb-7ff75996c6ce 782->789 790 7ff75996c6d4-7ff75996c6e2 782->790 783->776 784->769 791 7ff75996c82c-7ff75996c83b 785->791 792 7ff75996c843-7ff75996c84e call 7ff759966044 785->792 793 7ff75996c864-7ff75996c873 786->793 794 7ff75996c85f-7ff75996c862 786->794 789->784 789->790 795 7ff75996c6e4 790->795 796 7ff75996c740-7ff75996c744 790->796 791->792 792->786 793->777 794->738 794->793 798 7ff75996c6e8-7ff75996c6ff call 7ff759972b88 795->798 796->768 802 7ff75996c737-7ff75996c73d GetLastError 798->802 803 7ff75996c701-7ff75996c70d 798->803 802->796 804 7ff75996c72c-7ff75996c733 803->804 805 7ff75996c70f-7ff75996c721 call 7ff759972b88 803->805 804->796 807 7ff75996c735 804->807 805->802 809 7ff75996c723-7ff75996c72a 805->809 807->798 809->804
                                                        APIs
                                                        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF75996C57B), ref: 00007FF75996C6AC
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF75996C57B), ref: 00007FF75996C737
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ConsoleErrorLastMode
                                                        • String ID:
                                                        • API String ID: 953036326-0
                                                        • Opcode ID: 1ee269c4fb3492fdab786e16ea0be33da994e1b3a3006f3c14cd8905a42bf150
                                                        • Instruction ID: 07e63ef3d95689bfaaca90cfc714a77399111b4c0e1fd7e448602c3b125c1626
                                                        • Opcode Fuzzy Hash: 1ee269c4fb3492fdab786e16ea0be33da994e1b3a3006f3c14cd8905a42bf150
                                                        • Instruction Fuzzy Hash: C691B532F1869285F760AF65D4402BDABB4BB95B88F984139EF0E57A84EF3CD441C760

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 1279662727-0
                                                        • Opcode ID: 6f171c56c4af514848e95b4e04b562bbb562cc25ad397f2cc98f1fee1aaa5281
                                                        • Instruction ID: 95ec346940dc3767e1493005dca74e8fe40ba9d1442f7146d28e4dff3abd19ab
                                                        • Opcode Fuzzy Hash: 6f171c56c4af514848e95b4e04b562bbb562cc25ad397f2cc98f1fee1aaa5281
                                                        • Instruction Fuzzy Hash: EE41B062D187C283E710AFA0D510369B371FBD67A4F58A334EA9D03AD5DF6CA4A08720

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                        • String ID:
                                                        • API String ID: 3058843127-0
                                                        • Opcode ID: 0a8c62a57e2cf59f1561fe537eeb51f2220189f8d74725526a3d26dbeb988a7e
                                                        • Instruction ID: 596d97b3385904de774f6d0197ec6386e2ce4a59491fa5d8e77f420c4ba02044
                                                        • Opcode Fuzzy Hash: 0a8c62a57e2cf59f1561fe537eeb51f2220189f8d74725526a3d26dbeb988a7e
                                                        • Instruction Fuzzy Hash: 56311821E0E14262FA14BF21D5113BAA2F1AFC1784FCC4435EA0D4B297DF2DE845827A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: fc68bfbf785dc4e8d02d30f22ac316467e06faf73d836825e3014864920bd8dd
                                                        • Instruction ID: 44383caa55dea4aebb1f83e2423ce828fbc50a4e94be81262cc1415ed2fecc7e
                                                        • Opcode Fuzzy Hash: fc68bfbf785dc4e8d02d30f22ac316467e06faf73d836825e3014864920bd8dd
                                                        • Instruction Fuzzy Hash: A3D09E10B1968246EA543F719C551B992715FD9756F881438CC4F56393CF3DE44D8261
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: a3600ff4682811ddeb36fb761298261c2e9791cf1ca8f4758584451e9995ac85
                                                        • Instruction ID: 4693d371c40f99f0e87e07388762a956681c2d9f0a6e38438a0bdbecb70ea885
                                                        • Opcode Fuzzy Hash: a3600ff4682811ddeb36fb761298261c2e9791cf1ca8f4758584451e9995ac85
                                                        • Instruction Fuzzy Hash: F451E661B0968176FB78BEA5940067BA2A5BFC4BA4F9C4638DE7C077D9CF3DD4018620
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastWrite
                                                        • String ID:
                                                        • API String ID: 442123175-0
                                                        • Opcode ID: 48497a76b3055afe52661005fd715ce1d46b06a16acad2e21dfde3d81f02aed8
                                                        • Instruction ID: 881100bd78271f20c260ec88721a39cf503d334ac130ebe56be376e63ed7c63f
                                                        • Opcode Fuzzy Hash: 48497a76b3055afe52661005fd715ce1d46b06a16acad2e21dfde3d81f02aed8
                                                        • Instruction Fuzzy Hash: C431D532619AC19ADB10AF25E8402E9B7B0FB98780F894032EB4D83B55EF3CD555C761
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: FileHandleType
                                                        • String ID:
                                                        • API String ID: 3000768030-0
                                                        • Opcode ID: 51d66a3ea3a1e5720d3031fa8d01ef1f6d3b4a26eee4bfd04239a76c9c1293a5
                                                        • Instruction ID: 3f6d6d14e40b9dac3be02c67f35518ae7a2f9a2d3096968201de7115f04ad278
                                                        • Opcode Fuzzy Hash: 51d66a3ea3a1e5720d3031fa8d01ef1f6d3b4a26eee4bfd04239a76c9c1293a5
                                                        • Instruction Fuzzy Hash: 76318431A1CB9641E7609F25D590178AAA8FB85BB4FAC1339DB6E073E4DF38E491D310
                                                        APIs
                                                        • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF75996A005,?,?,00000000,00007FF75996A0BA), ref: 00007FF75996A1F6
                                                        • GetLastError.KERNEL32(?,?,?,00007FF75996A005,?,?,00000000,00007FF75996A0BA), ref: 00007FF75996A200
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseErrorFindLastNotification
                                                        • String ID:
                                                        • API String ID: 1687624791-0
                                                        • Opcode ID: 6fe57093fbbb00cdf8389479e1e18e52ea82cce6ea34632ee61e1d7ac301845a
                                                        • Instruction ID: 028d487cf2a9a71ebec6d1b60a313ce96698d4501bcd7d7892f99d9c2d9853b9
                                                        • Opcode Fuzzy Hash: 6fe57093fbbb00cdf8389479e1e18e52ea82cce6ea34632ee61e1d7ac301845a
                                                        • Instruction Fuzzy Hash: BA21CF21B196C241FE50BF61D990279A2B1AFC47A0FAC4235DA2E472C5CF6CA4848322
                                                        APIs
                                                        • SetFilePointerEx.KERNELBASE(?,?,?,?,?,00007FF75996B750,00000000,?,?,?,00007FF759951023,00007FF75996B859), ref: 00007FF75996B7B0
                                                        • GetLastError.KERNEL32(?,?,?,?,?,00007FF75996B750,00000000,?,?,?,00007FF759951023,00007FF75996B859), ref: 00007FF75996B7BA
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastPointer
                                                        • String ID:
                                                        • API String ID: 2976181284-0
                                                        • Opcode ID: 7196098b30ecd42809471233c9619b7315c9fb41ce716e28bdee8d0b35162eb6
                                                        • Instruction ID: e8de3b58843ac5999db32ea75bdb50c2267dd31c86084eb2f236635d73a82786
                                                        • Opcode Fuzzy Hash: 7196098b30ecd42809471233c9619b7315c9fb41ce716e28bdee8d0b35162eb6
                                                        • Instruction Fuzzy Hash: C311C16261CA8281DA10AF26E804169A379AB85BF4F984331EE7D0BBD9DF3CD0548750
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 3cb10c43647639a768565940e1ce5c449de1869fbc1a92892aa118bde093882e
                                                        • Instruction ID: 0b736469cc200fad9cc83790cb14e96d26c54d52c02c6c295d590a6d1686b49b
                                                        • Opcode Fuzzy Hash: 3cb10c43647639a768565940e1ce5c449de1869fbc1a92892aa118bde093882e
                                                        • Instruction Fuzzy Hash: 2641B43290C28187EA24EF19E5402BDF7B4EB96B94F981131D78E876D5EF2CE402C761
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _fread_nolock
                                                        • String ID:
                                                        • API String ID: 840049012-0
                                                        • Opcode ID: 371dc62f6a8d9f982387afa1ff5e907b60a7ec077156d3d6faccab25bfbe9410
                                                        • Instruction ID: a232cfc140b280c8510719af32b4a1875bfc8e574529bb028c6ca10717ca6435
                                                        • Opcode Fuzzy Hash: 371dc62f6a8d9f982387afa1ff5e907b60a7ec077156d3d6faccab25bfbe9410
                                                        • Instruction Fuzzy Hash: 41215E21B086D266EA14BF52A9043BBEA61BF89BD4FCC5430EE0D07786CF7DE4458614
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: ff4bd6b019ced27284b6fa2760217448de45b7808968d4935831090a049e7df0
                                                        • Instruction ID: fb401fb57efb72a37fb132568b7045aba853e9c549946c266819940720ebb746
                                                        • Opcode Fuzzy Hash: ff4bd6b019ced27284b6fa2760217448de45b7808968d4935831090a049e7df0
                                                        • Instruction Fuzzy Hash: 5B31A162A196C281E711BF5AC84037CAA70AFC0B94FD90139EA1D437D2DF7DE8418772
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: HandleModule$AddressFreeLibraryProc
                                                        • String ID:
                                                        • API String ID: 3947729631-0
                                                        • Opcode ID: 7474e071a48ef7130f5acd4d7b35ddfbaeb0d66e7037ac086cf5d56d8c80b409
                                                        • Instruction ID: b43c1a5454fb0e5ae53c914eed97756fe2728c914b9fa2e00d006c3e564dd977
                                                        • Opcode Fuzzy Hash: 7474e071a48ef7130f5acd4d7b35ddfbaeb0d66e7037ac086cf5d56d8c80b409
                                                        • Instruction Fuzzy Hash: 4721AE72A047828AEB24AF65C4402FC73B0EB8531DF881A36D76D06AC5DF7CD485CBA1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 25f020cec256df429067bb606d051891f0f83e0bb8faa834007163ccabd97c9c
                                                        • Instruction ID: 0ba916d216a2e2ee853e3152d67453413698e37af0b3663d8f2c70c608de945b
                                                        • Opcode Fuzzy Hash: 25f020cec256df429067bb606d051891f0f83e0bb8faa834007163ccabd97c9c
                                                        • Instruction Fuzzy Hash: 4E118122A1D6C181EB60BF52D50027DE270BFC9B80FDC4475EA8C57A8ACF7DD8018761
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: e860bb9bc84c29a06dccfc010b7eb52daf61d2c250f48aeb7393b4a8ace16f10
                                                        • Instruction ID: f613bd151718bc589ec232705eab40597d4358b4816272117225c49d3098ad1b
                                                        • Opcode Fuzzy Hash: e860bb9bc84c29a06dccfc010b7eb52daf61d2c250f48aeb7393b4a8ace16f10
                                                        • Instruction Fuzzy Hash: AF21C632A18A8287EBA1AF18D4403B9B6B0FBC5B54F9C4234E75D876D9DF3CD8018B51
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 298f7b2a666c55937c0a4044f00fb88544ba948c427ceaa5fd6043e577695ec0
                                                        • Instruction ID: 339c320daa26776ef5ae310a71d9e68f57eb667f870d1cefe233299ec8106c52
                                                        • Opcode Fuzzy Hash: 298f7b2a666c55937c0a4044f00fb88544ba948c427ceaa5fd6043e577695ec0
                                                        • Instruction Fuzzy Hash: 1401A161A0879151EA54FF92990016EE7A5AFC6FE0F8C4639EEAC17BDACF3DD4118310
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF75996AA16,?,?,?,00007FF759969BD3,?,?,00000000,00007FF759969E6E), ref: 00007FF75996DF0D
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 69550027ed8e3bf035e7bef6798a6f7658c1153be72ca181ca789a5114add420
                                                        • Instruction ID: 730741dcb377e6093eaa951a5438e93d23d1781eab007d3a339ba8b96ccb2296
                                                        • Opcode Fuzzy Hash: 69550027ed8e3bf035e7bef6798a6f7658c1153be72ca181ca789a5114add420
                                                        • Instruction Fuzzy Hash: 56F06D60F1A29340FE597F66DD502B8D2B45FE5B40FCC4434C91E862D2DF2CE4868230
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(?,?,?,00007FF75995F1E4,?,?,?,00007FF7599606F6,?,?,?,?,?,00007FF75996275D), ref: 00007FF75996CC6A
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: b827a7ab023d1767f95784f6f7fefaf86c66ee15463514ccfd07e797832e7771
                                                        • Instruction ID: e4ad492af0a936d4f440466a2c38f7ff54cc9ef012ce539e7ff797dd588fcd48
                                                        • Opcode Fuzzy Hash: b827a7ab023d1767f95784f6f7fefaf86c66ee15463514ccfd07e797832e7771
                                                        • Instruction Fuzzy Hash: FEF05E50B192C640FE157F72994027991B48FC57A0FCC4A34EA2E452D1EF2EE44092B0
                                                        APIs
                                                          • Part of subcall function 00007FF759956DB0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?), ref: 00007FF759956DEA
                                                        • LoadLibraryW.KERNELBASE(?,?,00000000,00007FF7599522DE,?,?,?,?), ref: 00007FF759956333
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2084219724.00007FF759951000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00007FF759950000, based on PE: true
                                                        • Associated: 00000007.00000002.2084199609.00007FF759950000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084249765.00007FF75997A000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75998D000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF759990000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084289155.00007FF75999C000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                        • Associated: 00000007.00000002.2084413235.00007FF75999E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff759950000_lib.jbxd
                                                        Similarity
                                                        • API ID: ByteCharLibraryLoadMultiWide
                                                        • String ID:
                                                        • API String ID: 2592636585-0
                                                        • Opcode ID: 4f2292e1e78b6b04c2ade65416a023b90951e6264d27b8cd69ba397aaf3470f3
                                                        • Instruction ID: fdd8ef6695e122996233f56625cfa12e87bb29eb91dc4b5d157b1d47f5b11dd6
                                                        • Opcode Fuzzy Hash: 4f2292e1e78b6b04c2ade65416a023b90951e6264d27b8cd69ba397aaf3470f3
                                                        • Instruction Fuzzy Hash: 7DE08611B1958142DA18AB67E90546AE261EFC9BC0B8C9035DE0D47755DF2CD4914B04
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2087887642.00007FF8B9061000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                        • Associated: 00000007.00000002.2087851325.00007FF8B9060000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087957246.00007FF8B9063000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087988693.00007FF8B9065000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088065900.00007FF8B9066000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9060000_lib.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                        • String ID:
                                                        • API String ID: 313767242-0
                                                        • Opcode ID: 491c6c3a996b181e7d4f6ff731a66c8976c72585f48119a1a83f76a26148e78e
                                                        • Instruction ID: e3c7f479d2ee59657f484c24d81d5512c9c28a4f189aea44ec63ac2a5c455639
                                                        • Opcode Fuzzy Hash: 491c6c3a996b181e7d4f6ff731a66c8976c72585f48119a1a83f76a26148e78e
                                                        • Instruction Fuzzy Hash: A5313E72609AC28AEB60DF68E8903ED7360FB84784F444439DB4D47A98DF38D649C710
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                        • String ID:
                                                        • API String ID: 313767242-0
                                                        • Opcode ID: ea38b9b02c827df44fb5011cb61d735aee822b3a281d6ad786fd76dbeb1e9228
                                                        • Instruction ID: d16495dfe05cde151b2e865321553bb3bc953bb0bbdc5816b64a47415e90d419
                                                        • Opcode Fuzzy Hash: ea38b9b02c827df44fb5011cb61d735aee822b3a281d6ad786fd76dbeb1e9228
                                                        • Instruction Fuzzy Hash: 71314972609B8296EB608F68E8503EE3374FB88788F44503ADB4E47A98DF3CD548C700
                                                        APIs
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C532F
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5366
                                                        • PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C538B
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C53AA
                                                        • PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C53CC
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C53EB
                                                        • PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C540D
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C542C
                                                        • PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5451
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5470
                                                        • PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5495
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C54B4
                                                        • PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C54D9
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C54F8
                                                        • PyUnicode_FromString.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C551F
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C553E
                                                        • PyLong_FromVoidPtr.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5565
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5584
                                                        • PyLong_FromVoidPtr.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C55AB
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C55CA
                                                        • PyLong_FromVoidPtr.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C55F1
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5610
                                                        • PyLong_FromVoidPtr.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5637
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5656
                                                        • PyLong_FromVoidPtr.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C567D
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C569C
                                                        • PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C56BE
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C56DD
                                                        • PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C56FF
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C571E
                                                        • PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5743
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C575E
                                                        • PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5795
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C921F
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C922E
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C923D
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C924C
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C925B
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C926A
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C9279
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C9288
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C9297
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C92A6
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C92B5
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C92C4
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C92D3
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C92E2
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C92F1
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C9300
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C9318
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C9327
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C9336
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Module_Object$From$Long_$Long$Void$StringUnicode_
                                                        • String ID: 1.1.0$ArgumentError$COMError$CTYPES_MAX_ARGCOUNT$FUNCFLAG_CDECL$FUNCFLAG_HRESULT$FUNCFLAG_PYTHONAPI$FUNCFLAG_STDCALL$FUNCFLAG_USE_ERRNO$FUNCFLAG_USE_LASTERROR$RTLD_GLOBAL$RTLD_LOCAL$__version__$_cast_addr$_memmove_addr$_memset_addr$_pointer_type_cache$_string_at_addr$_wstring_at_addr
                                                        • API String ID: 2895207140-772522829
                                                        • Opcode ID: b7dbbcc8b36d8762ecc7955ef4353bb7629bcf7eedf864b22fa349bc15453bc1
                                                        • Instruction ID: a0241bd020381653211fc59ecd479c91750306bb1f14e9d9d446e1275299dad3
                                                        • Opcode Fuzzy Hash: b7dbbcc8b36d8762ecc7955ef4353bb7629bcf7eedf864b22fa349bc15453bc1
                                                        • Instruction Fuzzy Hash: 29E1B924A0EBC681FE698F69D8742792368AF8FFD5B057535CF4E46695DF2CE0488301
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$Dealloc$Arg_FormatParseSizeStringTuple_$Eval_Thread$AddressAttrAuditLong_Object_OccurredProcRestoreSaveSequence_Sys_TupleVoid
                                                        • String ID: O&O;illegal func_spec argument$O|O$_handle$abstract class$could not convert the _handle attribute to a pointer$ctypes.dlsym$function '%s' not found$function ordinal %d not found$i|OO$paramflag value %d not supported$paramflags must be a sequence of (int [,string [,value]]) tuples$paramflags must be a tuple or None$paramflags must have the same length as argtypes$the _handle attribute of the second argument must be an integer
                                                        • API String ID: 1081342661-1557499450
                                                        • Opcode ID: 81bf86f915efca78798dbd81cfc19dde70ba7face78de59bde1888ce70c5e139
                                                        • Instruction ID: 46875440f4922d8ed6842803672bdf09f0dbb59f7c2d7486e945eea6fac2cde8
                                                        • Opcode Fuzzy Hash: 81bf86f915efca78798dbd81cfc19dde70ba7face78de59bde1888ce70c5e139
                                                        • Instruction Fuzzy Hash: 43C10926A09F8695EB658F69D8941BA27B4FF49BC8F546036DB0E07768DF3CE449C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Err_ErrorLast_errno$State_UnraisableWrite$CheckContainsDict_EnsureFunctionObject_ReleaseResultStringSubtypeType_VectorcallWarnmemcpy
                                                        • String ID: Parsing argument %zd$cannot build parameter$create argument %zd:$getting _needs_com_addref_$memory leak in callback function.$on calling ctypes callback function$on converting result of ctypes callback function$unexpected result of create argument %zd:
                                                        • API String ID: 1331253392-2697724128
                                                        • Opcode ID: 662eda2fa9ad5fa4c0407cff36c88571a43e939dd8943eeb715751b67e50d2ce
                                                        • Instruction ID: 0aceae93913d52669a29788e7f8ce90441857874e46f477239e60d3e6347c21e
                                                        • Opcode Fuzzy Hash: 662eda2fa9ad5fa4c0407cff36c88571a43e939dd8943eeb715751b67e50d2ce
                                                        • Instruction Fuzzy Hash: 69B13836A09F8686EB609F29D8541A927B4FF49BD8F48A931DB0D477A4DF3CE449C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$_errno$Eval_FromOccurredSaveStringThreadWindowsffi_callffi_prep_cif
                                                        • String ID: No ffi_type for result$ctypes.seh_exception$exception: access violation reading %p$exception: access violation writing %p$exception: breakpoint encountered$exception: datatype misalignment$exception: single step$ffi_prep_cif failed
                                                        • API String ID: 1937973484-2749438402
                                                        • Opcode ID: 430c0edaa122ef19808d40242a936452debd4f228559f93505334d9254383600
                                                        • Instruction ID: 0c548978a48bfad698b8aa7f93f2447b41e021593b84329f6ccc351a51e54350
                                                        • Opcode Fuzzy Hash: 430c0edaa122ef19808d40242a936452debd4f228559f93505334d9254383600
                                                        • Instruction Fuzzy Hash: 90812976A0CBC696E6618F19E85427A67B9FF8DBC4F506035DB4E036A4DF3CE9488700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Object_$AttrDeallocString$Err_$Format$CallDict_LookupMakeMallocMem_OccurredSizeUnicode_Updatestrchr
                                                        • String ID: __ctype_be__$__ctype_le__$_type_ '%s' not supported$cbBhHiIlLdfuzZqQPXOv?g$class must define a '_type_' attribute$class must define a '_type_' attribute which must bea single character string containing one of '%s'.$class must define a '_type_' attribute which must be a string of length 1$class must define a '_type_' string attribute
                                                        • API String ID: 692835343-917751260
                                                        • Opcode ID: 1cbc2b4066554eb2cebf210fbf6479008959c66222fb09b3e1ad465d8608973f
                                                        • Instruction ID: 49ba22209e2f93b3723aa8d9e7de806be2de04989f7531dce7ee685cfa4e9fda
                                                        • Opcode Fuzzy Hash: 1cbc2b4066554eb2cebf210fbf6479008959c66222fb09b3e1ad465d8608973f
                                                        • Instruction Fuzzy Hash: 9CA12D21A09FC691EA658F29E8642BA23B4EF8EFD4F446535DB4E46764DF3CE548C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Err_$Object_$AttrLong_LookupMallocMem_String$CallDict_ExceptionMakeMatchesMemoryOccurredSignSsize_tUpdate
                                                        • String ID: The '_length_' attribute is too large$The '_length_' attribute must be an integer$The '_length_' attribute must not be negative$_type_ must have storage info$array too large$class must define a '_length_' attribute$class must define a '_type_' attribute
                                                        • API String ID: 4019195241-504660705
                                                        • Opcode ID: 055b8fc62c60c1bd71026e2f714f2505c56a84889395af57f89967a2e91b601f
                                                        • Instruction ID: 9d35329ab1a95dc46135c93818769c9391690f47545421096618e59438a6116e
                                                        • Opcode Fuzzy Hash: 055b8fc62c60c1bd71026e2f714f2505c56a84889395af57f89967a2e91b601f
                                                        • Instruction Fuzzy Hash: 6FA10D31A09F8691EBA48F2DE8A427A23B5FF49BD4F546135DB1E462A4DF3CE549C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$Number_OccurredSsize_t$FromString$Bytes_Mem_SizeUnicode_$CharCheckFreeIndex_List_MallocMemoryWide
                                                        • String ID: Pointer indices must be integer$slice start is required for step < 0$slice step cannot be zero$slice stop is required
                                                        • API String ID: 3053630023-3059441807
                                                        • Opcode ID: 6979928dfef85d8a828cd9ee037a140b3c1fa3fa22f5c964d232601827984960
                                                        • Instruction ID: ab8707b7f21bdd7a062018c9d1666010ac69fb03fe42b28e819cf7e731c73db9
                                                        • Opcode Fuzzy Hash: 6979928dfef85d8a828cd9ee037a140b3c1fa3fa22f5c964d232601827984960
                                                        • Instruction Fuzzy Hash: 04916D21A09F8686EA609F1DE55407923B5FF49FE0F466631DB2E877E4DF2CE4598300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$FromLong_$Err_Void$Object_StringUnraisableWrite$ArgsAttrCallFunctionImportImport_InternLongModuleOccurredUnicode_
                                                        • String ID: DllGetClassObject$_ctypes.DllGetClassObject$ctypes
                                                        • API String ID: 375360433-177550262
                                                        • Opcode ID: b5513430baef804698b72f87c032f2232b88aa434da5969d4ce7dec095e12011
                                                        • Instruction ID: 8c12b4bf4818c066dd222f47b67f7259e628269af88a94fd6c2c40c9cd0552ca
                                                        • Opcode Fuzzy Hash: b5513430baef804698b72f87c032f2232b88aa434da5969d4ce7dec095e12011
                                                        • Instruction Fuzzy Hash: 2451DF35E09B8685FA649F29A96423A63B4FF8EFD1F4C6534CB4E16760DF3CA8458300
                                                        APIs
                                                        • _PyTime_FromSecondsObject.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B90622BF
                                                        • PyErr_ExceptionMatches.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B90622D3
                                                        • PyErr_SetString.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B906231F
                                                          • Part of subcall function 00007FF8B90625C8: PySequence_Fast.PYTHON311(00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B90625F0
                                                        • _PyDeadline_Init.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B90623DA
                                                        • PyEval_SaveThread.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B906241A
                                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B9062423
                                                        • select.WS2_32 ref: 00007FF8B906243D
                                                        • PyEval_RestoreThread.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B9062449
                                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B906244F
                                                        • PyErr_CheckSignals.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B906245E
                                                        • _PyDeadline_Get.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B9062479
                                                        • _PyTime_AsTimeval_clamp.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B9062497
                                                        • PyErr_Occurred.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B90624F2
                                                        • PyTuple_Pack.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B9062509
                                                        • _Py_Dealloc.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B9062520
                                                        • _Py_Dealloc.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B9062534
                                                        • _Py_Dealloc.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B9062548
                                                        • WSAGetLastError.WS2_32(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B90625AE
                                                        • PyErr_SetExcFromWindowsErr.PYTHON311(?,?,?,00007FF8A8966CC8,?,?,00007FF8B906224F), ref: 00007FF8B90625C0
                                                          • Part of subcall function 00007FF8B90625C8: PyObject_AsFileDescriptor.PYTHON311(?,?,00007FF8B906224F), ref: 00007FF8B906265C
                                                          • Part of subcall function 00007FF8B90625C8: PyErr_SetString.PYTHON311(?,?,00007FF8B906224F), ref: 00007FF8B90626CA
                                                          • Part of subcall function 00007FF8B90625C8: _Py_Dealloc.PYTHON311(?,?,00007FF8B906224F), ref: 00007FF8B90626D9
                                                          • Part of subcall function 00007FF8B90625C8: _Py_Dealloc.PYTHON311(?,?,00007FF8B906224F), ref: 00007FF8B90626E8
                                                          • Part of subcall function 00007FF8B90625C8: _Py_Dealloc.PYTHON311(?,?,00007FF8B906224F), ref: 00007FF8B90626FE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2087887642.00007FF8B9061000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                        • Associated: 00000007.00000002.2087851325.00007FF8B9060000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087957246.00007FF8B9063000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087988693.00007FF8B9065000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088065900.00007FF8B9066000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9060000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocErr_$Deadline_Eval_FromStringThreadTime__errno$CheckDescriptorErrorExceptionFastFileInitLastMatchesObjectObject_OccurredPackRestoreSaveSecondsSequence_SignalsTimeval_clampTuple_Windowsselect
                                                        • String ID: timeout must be a float or None$timeout must be non-negative
                                                        • API String ID: 1581318368-2150404077
                                                        • Opcode ID: af26c906d80cdcaef9b1c7707cf0177dbe53b8e671061a6009a46fe445b3fcbf
                                                        • Instruction ID: f171c764be8f5400dcb6dc5e8991077b9fbab6d155eb4fbc7f9741eb80b87944
                                                        • Opcode Fuzzy Hash: af26c906d80cdcaef9b1c7707cf0177dbe53b8e671061a6009a46fe445b3fcbf
                                                        • Instruction Fuzzy Hash: 49910E62A08AC396EE21DF2DE8541B963A4FF45BD4F404135DB4E8BA98DF3CD54AC740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Mem_$CallDict_Err_FreeFunctionItemMallocObject_$DeallocErrorFromLong_OccurredStringUnicode_VoidWith
                                                        • String ID: LP_%s$_type_$must be a ctypes type$s(O){sO}$s(O){}
                                                        • API String ID: 2461613936-2311978994
                                                        • Opcode ID: dac97228159b1c0431957491c5f87e729db2124b065f25bc7d08890040e0cdb2
                                                        • Instruction ID: 04fca8f04d9b86f18042084b0c43adc149a912822a4f276b955949d426976663
                                                        • Opcode Fuzzy Hash: dac97228159b1c0431957491c5f87e729db2124b065f25bc7d08890040e0cdb2
                                                        • Instruction Fuzzy Hash: F3510025A09BCB81EA659F2DA96417923B8EF4EFD1F442231DB1E167A4DE3CE4498300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: From$Bytes_Err_Mem_SizeSlice_StringUnicode_$AdjustCharCheckFreeIndex_IndicesList_MallocMemoryNumber_OccurredSsize_tUnpackWide
                                                        • String ID: indices must be integers
                                                        • API String ID: 4188490530-2024404580
                                                        • Opcode ID: e570ecff3f3fa346b7648cae94d04275b3108b85bd0816525fe5c5b16466f0b5
                                                        • Instruction ID: f66d52dee5a02e7edbd5f9b004f7c29900ce10d54b5158148481fd1948d8dae5
                                                        • Opcode Fuzzy Hash: e570ecff3f3fa346b7648cae94d04275b3108b85bd0816525fe5c5b16466f0b5
                                                        • Instruction Fuzzy Hash: 3F718025A09FC682EB249F2A99640792376FF4DFE4B062131DF1E57B95DE3CE8098300
                                                        APIs
                                                        • PyUnicode_FromFormatV.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD4C5
                                                        • PyErr_Fetch.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD4E4
                                                        • PyErr_NormalizeException.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD4F6
                                                        • PyType_GetName.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD50D
                                                        • PyObject_Str.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD515
                                                        • PyUnicode_AppendAndDel.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD527
                                                        • PyUnicode_FromString.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD534
                                                        • PyUnicode_AppendAndDel.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD541
                                                        • PyErr_Clear.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD550
                                                        • PyObject_Str.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD55A
                                                        • PyErr_Clear.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD565
                                                        • PyUnicode_FromString.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD572
                                                        • PyUnicode_AppendAndDel.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD57F
                                                        • PyErr_SetObject.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD594
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD5A9
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD5BE
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD5D3
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,?,00000000,?,00007FF8B93C7997), ref: 00007FF8B93CD5E8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Unicode_$Err_$Dealloc$AppendFrom$ClearObject_String$ExceptionFetchFormatNameNormalizeObjectType_
                                                        • String ID: ???
                                                        • API String ID: 979652146-1053719742
                                                        • Opcode ID: a0277b81e7bf4beead51eb80468770295d906e45afe09c37c0bcdcee4447fb49
                                                        • Instruction ID: c280616917d80ef6e9d721b5b1500d16e9bfe09182cef33cfa7d4b96c5b62913
                                                        • Opcode Fuzzy Hash: a0277b81e7bf4beead51eb80468770295d906e45afe09c37c0bcdcee4447fb49
                                                        • Instruction Fuzzy Hash: 2E412772E09E8685EF549F68D8641BD23B4EF4DB98F042435DB1E52664DF3CA449C320
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$String$DeallocEval_Thread$AddressArg_AttrAuditFormatLong_Object_OccurredParseProcRestoreSaveSizeSys_Tuple_Void
                                                        • String ID: Os:in_dll$_handle$could not convert the _handle attribute to a pointer$ctypes.dlsym$symbol '%s' not found$the _handle attribute of the second argument must be an integer
                                                        • API String ID: 1915345233-3856192562
                                                        • Opcode ID: 7ca03c74892ce7554a02cb8c30f6c35098380688a7c70d2a3342523bcc2a4215
                                                        • Instruction ID: 66282571583f9fe5ed9b855258fcc0371bc9065a3f4f914e687fb47f54325485
                                                        • Opcode Fuzzy Hash: 7ca03c74892ce7554a02cb8c30f6c35098380688a7c70d2a3342523bcc2a4215
                                                        • Instruction Fuzzy Hash: FC31ED21A09F8682EA659F6AE8641792378EF8EFC1F056035DB0E47765DF2CE549C300
                                                        APIs
                                                        • PyObject_GetAttrString.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF756
                                                        • PySequence_Fast.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF772
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF784
                                                        • PyArg_ParseTuple.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF7E8
                                                        • PyObject_GetAttr.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF802
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF854
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF8D0
                                                        • PyObject_SetAttr.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF8E4
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF8F8
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF917
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF931
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF940
                                                        • PyErr_SetString.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF972
                                                        • _Py_Dealloc.PYTHON311(?,?,?,?,?,00000018,00000000,00000018,00000000,?,?,00007FF8B93C8C2F), ref: 00007FF8B93CF983
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$AttrObject_$String$Arg_Err_FastParseSequence_Tuple
                                                        • String ID: OO|O$_fields_$_fields_ must be a sequence$unexpected type
                                                        • API String ID: 1182381414-2418103425
                                                        • Opcode ID: 9a21982e818a441de51ee13329167cb0591f09edfc229330b12a1e4341a6436c
                                                        • Instruction ID: 92f4132b923f13edbffaabb01e6c70fb6dbbdecd64f79a228d14ff92a316a070
                                                        • Opcode Fuzzy Hash: 9a21982e818a441de51ee13329167cb0591f09edfc229330b12a1e4341a6436c
                                                        • Instruction Fuzzy Hash: 19612672A09F8692EB648F2AE95417A63B5FF89BE4F146131CB4E03764DF3DE4598300
                                                        APIs
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C504E
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5065
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C507D
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C50A0
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C50C6
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C50EC
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5112
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5138
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C515E
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5181
                                                        • PyModule_AddType.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C51A7
                                                        • PyModule_AddType.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C51CD
                                                        • PyModule_AddType.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C51F3
                                                        • PyModule_AddType.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5219
                                                        • PyModule_AddType.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C523F
                                                        • PyModule_AddType.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C526C
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5281
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C52A0
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C52B1
                                                        • PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C52D3
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: ReadyType_$Module_Type
                                                        • String ID:
                                                        • API String ID: 2298540608-0
                                                        • Opcode ID: 54f91af859aac5329c47ad103bf883f4ecd078e41e036d01a27fff442e20b039
                                                        • Instruction ID: 212f811c720cf378387011fd6601d1e4ecc2743ca3fb7d04bfe3b03ade388fb6
                                                        • Opcode Fuzzy Hash: 54f91af859aac5329c47ad103bf883f4ecd078e41e036d01a27fff442e20b039
                                                        • Instruction Fuzzy Hash: 4B718164A0DB9792F6618F2DBD6412A23ACBF49BC4F806135DA5E93674DF3CF11A8310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: Name::operator+$Replicator::operator[]
                                                        • String ID: `anonymous namespace'
                                                        • API String ID: 3863519203-3062148218
                                                        • Opcode ID: 29843075ff213e4678463bd9e4c4852a4219599ce3764149382065ef125c3596
                                                        • Instruction ID: b173a94ebff06591c02058e3caed1e6d92a00e3fb1a14addc3ca50ac89333633
                                                        • Opcode Fuzzy Hash: 29843075ff213e4678463bd9e4c4852a4219599ce3764149382065ef125c3596
                                                        • Instruction Fuzzy Hash: 35E14772A08BC699EB10CF68E4801AC7BA0FB457A5F50A136EB9D17B69DF3CE554C700
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: COM method call without VTable$Expected a COM this pointer as first argument$NULL COM pointer access$native com method call without 'this' parameter$this function takes %d argument%s (%d given)$this function takes at least %d argument%s (%d given)
                                                        • API String ID: 0-1981512665
                                                        • Opcode ID: f07b7bceabcce526c4a62d906a5ec0dd6d9bc262e596e910abc21d3a49bdda52
                                                        • Instruction ID: e5bd62d8ef913eab0baa7413c6859bc645397c8487f3960d863ebe168e905198
                                                        • Opcode Fuzzy Hash: f07b7bceabcce526c4a62d906a5ec0dd6d9bc262e596e910abc21d3a49bdda52
                                                        • Instruction Fuzzy Hash: C3912526A09F8681EA60CF2AA49027A67B4FF8DBD4F446035DF4E077A4DF3DE4488700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$String$LongLong_Occurred$Bytes_Capsule_CharClearFreeMem_Unicode_UnsignedWide
                                                        • String ID: Don't know how to convert parameter %d$_ctypes pymem$int too long to convert
                                                        • API String ID: 3969321993-4137960972
                                                        • Opcode ID: 84a72b6a64f7e58ef7106ff91161727bef33725574b0370cedf856625ec34b12
                                                        • Instruction ID: 0d296ea9a8cb06b400bf603e47ca22f028d99b0ebac9c00de3ac95c8f8d3ac53
                                                        • Opcode Fuzzy Hash: 84a72b6a64f7e58ef7106ff91161727bef33725574b0370cedf856625ec34b12
                                                        • Instruction Fuzzy Hash: 8F510426A09F8682EB548F2DE8A412A23B4FF4DFD4B046535DB5E43764DF3CE4588350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocDict_$CallErr_ErrorFromFunction_ItemLong_Object_OccurredPackSizeSsize_tTuple_With
                                                        • String ID: %.200s_Array_%Id$Array length must be >= 0, not %zd$Expected a type object$_length_$_type_$s(O){s:n,s:O}
                                                        • API String ID: 2975079148-1488966637
                                                        • Opcode ID: 4b9e39d2e5c219fd7f77c84992df2d80c2fda8daf9d237960527683bdad92fae
                                                        • Instruction ID: cad5e35ce802fd158c8b2071f0f6731ea538e513ccf9b23d19f4fb829e391391
                                                        • Opcode Fuzzy Hash: 4b9e39d2e5c219fd7f77c84992df2d80c2fda8daf9d237960527683bdad92fae
                                                        • Instruction Fuzzy Hash: A3514125A09FC785FA609F59E9602BA63B4EF4EBD4F04A035CB0E46364DE3CE549C340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$String$Arg_AuditBuffer_ContiguousDeallocFormatFromMemoryObjectParseSizeSys_Tuple_View_
                                                        • String ID: Buffer size too small (%zd instead of at least %zd bytes)$O|n:from_buffer$abstract class$ctypes.cdata/buffer$nnn$offset cannot be negative$underlying buffer is not C contiguous$underlying buffer is not writable
                                                        • API String ID: 3947696715-3790261066
                                                        • Opcode ID: 6f91a64f5329831d1cdf7c4b25470fb5dbaa7ad2f9e3551f3ba25eea1f825ae0
                                                        • Instruction ID: 65c8b8c936e131fc3a1f501ef0df5ab1e44cd0cc5f0b22aae1940c9c54373d5c
                                                        • Opcode Fuzzy Hash: 6f91a64f5329831d1cdf7c4b25470fb5dbaa7ad2f9e3551f3ba25eea1f825ae0
                                                        • Instruction Fuzzy Hash: F4416C65A09FC692EA64CF6EE8601BA23B5EF8DBD0F046131DB1D476A5DF2CE508C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Capsule_$Dict_Err_ItemMem_String$CallocDeallocDictErrorFreeFromInternOccurredPointerState_ThreadUnicode_ValidWith
                                                        • String ID: _ctypes pymem$cannot get thread state$ctypes.error_object$ctypes.error_object is an invalid capsule
                                                        • API String ID: 2323834031-3474121714
                                                        • Opcode ID: accf9b440147d9a92cb32684a6abaa720b59604840fdd08eebf715022aa40aa7
                                                        • Instruction ID: 8aa40705e4e0a61177c5d84a80cba8e08fc3b1ba90f1ce941a0b801a12cf3c7f
                                                        • Opcode Fuzzy Hash: accf9b440147d9a92cb32684a6abaa720b59604840fdd08eebf715022aa40aa7
                                                        • Instruction Fuzzy Hash: 9F311C20A0AFC681EA648F19E86413A23B4EF4DFD5B846435EB2E43764EF3CE559C310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Err_$Format$AttrLookupObject_OccurredSequence_StringTupleTuple_
                                                        • String ID: _argtypes_ has too many arguments (%zi), maximum is %i$_argtypes_ must be a sequence of types$item %zd in _argtypes_ has no from_param method
                                                        • API String ID: 4102822968-1150265712
                                                        • Opcode ID: b465a1dad8b079f441bebe69d373bb45d8456e0132b52fc939e0217758a31e23
                                                        • Instruction ID: 7e41ff9d962894ac7f3702d2dc87b5b8e3902d4e984188fe9d98c1e81eaa6664
                                                        • Opcode Fuzzy Hash: b465a1dad8b079f441bebe69d373bb45d8456e0132b52fc939e0217758a31e23
                                                        • Instruction Fuzzy Hash: C141FA21A0DF8792EA659F29E85817A63B8EF9EFD5F046031DB0E46664DF3CE5498300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: From$FormatUnicode_$DeallocDoubleFloat_
                                                        • String ID: <cparam '%c' (%R)>$<cparam '%c' (%d)>$<cparam '%c' (%ld)>$<cparam '%c' (%lld)>$<cparam '%c' (%p)>$<cparam '%c' ('%c')>$<cparam '%c' ('\x%02x')>$<cparam '%c' at %p>$<cparam 0x%02x at %p>
                                                        • API String ID: 1798191970-1075073485
                                                        • Opcode ID: e630b7be73e712d3a37526d796ee4f4f39b16323d62473f23fa0d0fb00351437
                                                        • Instruction ID: 47a4736bc520874a596edc2971c357e2ea71694b7c9c74d3c4a10567fae4cd1e
                                                        • Opcode Fuzzy Hash: e630b7be73e712d3a37526d796ee4f4f39b16323d62473f23fa0d0fb00351437
                                                        • Instruction Fuzzy Hash: 2F418F2190CAC792E7799F2D946803F2A71EF5EBC4F182130E76E055A9DE2CF949C360
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$Buffer_ReleaseString$Arg_AuditFormatParseSizeSys_Tuple_memcpy
                                                        • String ID: Buffer size too small (%zd instead of at least %zd bytes)$abstract class$ctypes.cdata/buffer$nnn$offset cannot be negative$y*|n:from_buffer_copy
                                                        • API String ID: 2374319793-1742308441
                                                        • Opcode ID: 2d8fddc9779f14f0481d8ddfd406fb15762d92becc72ec0614fe25a827832394
                                                        • Instruction ID: 323f8fc57066ed483573ae2ccaf74e58443f3f4edac1690fae7676e9a26639bc
                                                        • Opcode Fuzzy Hash: 2d8fddc9779f14f0481d8ddfd406fb15762d92becc72ec0614fe25a827832394
                                                        • Instruction Fuzzy Hash: 71312965B19B8682EA648F5AE4646BA6374FF8DFC0F41A032DB4E53725DF2CE508C700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: AttrObject_String$Arg_Dealloc$KeywordsParseSequence_SizeSliceTuple_
                                                        • String ID: OOO:COMError$args$details$hresult$text
                                                        • API String ID: 4238450639-2065934886
                                                        • Opcode ID: 7b88bc987767ef29d30f6af4a34bd6ec754f27a2cd5e2595f319dc9faf46bccc
                                                        • Instruction ID: 9f3555692aaa84b4f217f58cdf70f0014c7a1680e413ff6c5e4afd0051cd211a
                                                        • Opcode Fuzzy Hash: 7b88bc987767ef29d30f6af4a34bd6ec754f27a2cd5e2595f319dc9faf46bccc
                                                        • Instruction Fuzzy Hash: 3E314A75A09B8692FA208F29F8501BA27B4FF8AFD4F486031DF0E47664DE2CE449C340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_Eval_FromThread$Arg_AuditCharErrorFormatFreeLastLibraryLoadLong_Mem_ParseRestoreSaveStringSys_TupleUnicode_VoidWideWindows
                                                        • String ID: Could not find module '%.500S' (or one of its dependencies). Try using the full path with constructor syntax.$U|i:LoadLibrary$ctypes.dlopen
                                                        • API String ID: 3805577924-808210370
                                                        • Opcode ID: 8085d2a71d9d3a5a76fe34bec048b7c14a2e952a150ea8cd1b327b92dda5160e
                                                        • Instruction ID: 7c7260b42869021c341fd4d19583bf870ed620e0e3d5490b516805ae82ba921b
                                                        • Opcode Fuzzy Hash: 8085d2a71d9d3a5a76fe34bec048b7c14a2e952a150ea8cd1b327b92dda5160e
                                                        • Instruction Fuzzy Hash: 3E212F61A0CBC691FAA49F6AE8641792765EF8EFD5F446035DB0E42264DE3CE549C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$Dealloc$StringUnraisableWrite$AttrClearFromImportImport_InternLongLong_ModuleObject_OccurredUnicode_
                                                        • String ID: DllCanUnloadNow$_ctypes.DllCanUnloadNow$ctypes
                                                        • API String ID: 3419117993-4136862661
                                                        • Opcode ID: 6480632f02bad077a56764e5c1bb2d947567b6f8de28b8c217792b4108e53cfe
                                                        • Instruction ID: 2d903168528f6e101999797e98f5b58851f792aa972478037479b8c855d02383
                                                        • Opcode Fuzzy Hash: 6480632f02bad077a56764e5c1bb2d947567b6f8de28b8c217792b4108e53cfe
                                                        • Instruction Fuzzy Hash: 7521AE31E09B8691FE649F29EA6423923B4AF5EFD5F483534DB0E46760DF2CA4599300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: NameName::$Name::operator+atolswprintf_s
                                                        • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-$lambda$nullptr
                                                        • API String ID: 2331677841-2441609178
                                                        • Opcode ID: 9797e925e62f8d7d60f646e305733279f9163504f8593401decf67f28b7cb35e
                                                        • Instruction ID: 4c55ef92c9dbcc719a790bb3bd4515925c42a3c976272473d887f5ac200c58c8
                                                        • Opcode Fuzzy Hash: 9797e925e62f8d7d60f646e305733279f9163504f8593401decf67f28b7cb35e
                                                        • Instruction Fuzzy Hash: 49F17F22E0C7C284FB149F7CC9951BC27A1AF467E6F052136CB4D26B95DE3CA944E361
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Mem_$DeallocErr_Free$AttrFormatMallocMemoryObject_StringUnicode_
                                                        • String ID: %s:%s:$bit fields not allowed for type %s$number of bits invalid for bit field
                                                        • API String ID: 2455365098-3576608231
                                                        • Opcode ID: 2c8a630497d9b26071984d54006c75933da3e15f2b28fdb68437a92c613d873a
                                                        • Instruction ID: 1f63e997838c9b9816aea8c0e020b1c81493e9be8f13eb569ca8f009216cc443
                                                        • Opcode Fuzzy Hash: 2c8a630497d9b26071984d54006c75933da3e15f2b28fdb68437a92c613d873a
                                                        • Instruction Fuzzy Hash: F9815B32A09B8696EB50CF69E4582AA33B5FB4ABD8F402136DF1D57794DF38E549C300
                                                        APIs
                                                        • _PyDict_GetItemIdWithError.PYTHON311 ref: 00007FF8B93CBA90
                                                        • PyErr_Occurred.PYTHON311 ref: 00007FF8B93CBAA3
                                                          • Part of subcall function 00007FF8B93CBA14: PySequence_GetItem.PYTHON311 ref: 00007FF8B93CBAE8
                                                          • Part of subcall function 00007FF8B93CBA14: PySequence_GetItem.PYTHON311 ref: 00007FF8B93CBAFF
                                                          • Part of subcall function 00007FF8B93CBA14: PyDict_Contains.PYTHON311 ref: 00007FF8B93CBB27
                                                          • Part of subcall function 00007FF8B93CBA14: PyObject_SetAttr.PYTHON311 ref: 00007FF8B93CBB3C
                                                          • Part of subcall function 00007FF8B93CBA14: _Py_Dealloc.PYTHON311 ref: 00007FF8B93CBB4D
                                                          • Part of subcall function 00007FF8B93CBA14: _Py_Dealloc.PYTHON311 ref: 00007FF8B93CBB5C
                                                          • Part of subcall function 00007FF8B93CBA14: PyErr_Format.PYTHON311 ref: 00007FF8B93CBB97
                                                          • Part of subcall function 00007FF8B93CBA14: _Py_Dealloc.PYTHON311 ref: 00007FF8B93CBBA6
                                                          • Part of subcall function 00007FF8B93CBA14: _Py_Dealloc.PYTHON311 ref: 00007FF8B93CBBC0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Item$Dict_Err_Sequence_$AttrContainsErrorFormatObject_OccurredWith
                                                        • String ID: duplicate values for field %R
                                                        • API String ID: 1919794741-1910533534
                                                        • Opcode ID: f71277947be2d2287fba46fe0b915e6ba484f6932f6352b1fb4de12eb2f3b1be
                                                        • Instruction ID: 7d4ae2c1236757fa529c323dc7d1a2384ff1c42fa13659268e04946f6a59a077
                                                        • Opcode Fuzzy Hash: f71277947be2d2287fba46fe0b915e6ba484f6932f6352b1fb4de12eb2f3b1be
                                                        • Instruction Fuzzy Hash: A6513F21A09F8681EE659F2AA95457A63B4AF59FE4F046131CF5E077A4EE3CE089C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Free$String$Eval_Thread$BuildDeallocErr_ErrorFromInfoLocalObjectProgRestoreSaveValue
                                                        • String ID: iu(uuuiu)
                                                        • API String ID: 2817777535-1877708109
                                                        • Opcode ID: f3fff332be11df24bb43f445367687364f99778bf223ac6a64006d9486d4d9c8
                                                        • Instruction ID: e5a5e352ff9b104445d25ffd8b33c45753b9ac875991abfbec5e32158811428f
                                                        • Opcode Fuzzy Hash: f3fff332be11df24bb43f445367687364f99778bf223ac6a64006d9486d4d9c8
                                                        • Instruction Fuzzy Hash: 5A510466B05A469AEB10DFA9D4A43AD23B4FB89FC8F009536DE0E57B58DF38D508C350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$CheckIndex_Number_OccurredSsize_tString
                                                        • String ID: Array does not support item deletion$Can only assign sequence of same size$indices must be integer
                                                        • API String ID: 428023279-3643249925
                                                        • Opcode ID: 67ecbcca89311aff2d866ea192ce1f612227fb21c186869f9d79deb68ba184de
                                                        • Instruction ID: 0b462fbc918acd3ae471b95c47e5213bcb1eb0ddf64ace2b571337aa1d8ea51b
                                                        • Opcode Fuzzy Hash: 67ecbcca89311aff2d866ea192ce1f612227fb21c186869f9d79deb68ba184de
                                                        • Instruction Fuzzy Hash: D9413D61A08FC681EE648F6AD8600BA2365FF4DFE4F056531EF1D47696DE3CE4498300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$AttrObject_$FastLookupSequence_
                                                        • String ID: '%U' is specified in _anonymous_ but not in _fields_$_anonymous_ must be a sequence
                                                        • API String ID: 1391743325-2678605723
                                                        • Opcode ID: 7250101b7d384b3603d10181ac32ac0acd4c5aaae793a49ebea8f6d5bde9a43b
                                                        • Instruction ID: 9b4d95f3ed4f09b301ed5a4ac276811f21e63c7989b55d6a452da5ceacfa0545
                                                        • Opcode Fuzzy Hash: 7250101b7d384b3603d10181ac32ac0acd4c5aaae793a49ebea8f6d5bde9a43b
                                                        • Instruction Fuzzy Hash: 5D414B61A09F8695EA648F69D95427A63B4FF8ABD1F046031DB4E03250DF3CE4498300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Object_$DeallocErr_$AttrCallCheckClearInstanceLookupRecursiveStringUnicode_
                                                        • String ID: abstract class$while processing _as_parameter_$wrong type
                                                        • API String ID: 4206935778-1173273510
                                                        • Opcode ID: 961a10382abbd73e4d2a667dfe19ccb16767b9e8d8b3bad4ce0000eff4bf0ebe
                                                        • Instruction ID: de06c3728f0b6c3e8a1b80b041e91e351e1c58ea5953a43b6740311ce5e70106
                                                        • Opcode Fuzzy Hash: 961a10382abbd73e4d2a667dfe19ccb16767b9e8d8b3bad4ce0000eff4bf0ebe
                                                        • Instruction Fuzzy Hash: 6F410926A09F8682EA649F6EE89417A2374EF8EFD1F156131DF0E47664DE2CE4498340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$Dict_ErrorItemOccurredWith$AttrLookupObject_$Callable_CheckLongLong_MaskSequence_StringTupleTuple_Unsigned
                                                        • String ID: _restype_ must be a type, a callable, or None$class must define _flags_ which must be an integer
                                                        • API String ID: 3087875697-2538317290
                                                        • Opcode ID: c02ca58e13a46a6ce0520458656b58573f0571ee4510cffb2fc4fd828f69ccf3
                                                        • Instruction ID: 5d86ffdbf66890c64991216b2910a170012a2bf7001c9c4fe809fafff0d27574
                                                        • Opcode Fuzzy Hash: c02ca58e13a46a6ce0520458656b58573f0571ee4510cffb2fc4fd828f69ccf3
                                                        • Instruction Fuzzy Hash: DA41E621A09B8692EA659F2DE99037A23B4FF4EBC4F446535DB4D462A4DF3CE468C310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$FormatMem_$Arg_CallocMemoryParseReallocStringTuplememcpy
                                                        • String ID: Memory cannot be resized because this object doesn't own it$On:resize$excepted ctypes instance$minimum size is %zd
                                                        • API String ID: 2473355626-828838525
                                                        • Opcode ID: f25097e4f29e0a836fc8ce735c340e9b52c9a2e89e2e7b96c33704ef34719194
                                                        • Instruction ID: 653623fa8563fa201c6f2c355e5f8eb74b1d6cb1044869d8c61442f6feae3973
                                                        • Opcode Fuzzy Hash: f25097e4f29e0a836fc8ce735c340e9b52c9a2e89e2e7b96c33704ef34719194
                                                        • Instruction Fuzzy Hash: 7531F861A09F8681EA649F59E46417A6374FF8DFC4F102036EB1E47764DF2CE898C750
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: Name::operator+
                                                        • String ID:
                                                        • API String ID: 2943138195-0
                                                        • Opcode ID: b0c5aa40c95afe9820d08c2b3a0b3f0a0bd29e174dcc6565612d28bd398cd5cc
                                                        • Instruction ID: 95eae4097c7a3a8e6915162b8b760d507522dabc5293a64cb418a58acf7abcb9
                                                        • Opcode Fuzzy Hash: b0c5aa40c95afe9820d08c2b3a0b3f0a0bd29e174dcc6565612d28bd398cd5cc
                                                        • Instruction Fuzzy Hash: DBF14A76A08B869AEB10DFA8D4901EC3BB1EB0479DB405036EB4D57B9ADF38D959C340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: LongLong_MaskTuple_Unsigned
                                                        • String ID: %s 'out' parameter must be passed as default value$NULL stgdict unexpected$call takes exactly %d arguments (%zd given)$paramflag %u not yet implemented
                                                        • API String ID: 1136903700-2588965191
                                                        • Opcode ID: 91dd6e13f2742febeda4ec11071149d11ba9fea3fb7657fd2f121691aebacfe3
                                                        • Instruction ID: e02758c9e0de55fc25870825e622037480f18ba3b9eac791d30e6a78f664fc67
                                                        • Opcode Fuzzy Hash: 91dd6e13f2742febeda4ec11071149d11ba9fea3fb7657fd2f121691aebacfe3
                                                        • Instruction Fuzzy Hash: 11813876A09B8686EAA08F1AE45467A67B4FB89BC4F516036DF4E43764DF3CE448C700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_String
                                                        • String ID: (%s) $expected %s instance, got %s$incompatible types, %s instance instead of %s instance$not a ctype instance
                                                        • API String ID: 1450464846-2159251832
                                                        • Opcode ID: 07203d23819d05828f358a56c03890258eda92ffb1c002cf2859f9f66371a8e9
                                                        • Instruction ID: 08d160f93dd6549c91826b7d232e3582f2e055b38ad996fa15464126c03d5ae0
                                                        • Opcode Fuzzy Hash: 07203d23819d05828f358a56c03890258eda92ffb1c002cf2859f9f66371a8e9
                                                        • Instruction Fuzzy Hash: 7E712C65A0CF8682EA149F1AE9641BA63B5EF8DFC4F456032DF4D877A5DF2CE4488340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Arg_Err_ParseSizeTuple_$FormatString
                                                        • String ID: abstract class$is|Oz#$i|OO$paramflag value %d not supported$paramflags must be a sequence of (int [,string [,value]]) tuples$paramflags must be a tuple or None$paramflags must have the same length as argtypes
                                                        • API String ID: 2189051491-1121734848
                                                        • Opcode ID: 3d6b330cc5c9dd7f19e068a29130591e5b204b1fdfc58b1c50816dd1f366be30
                                                        • Instruction ID: 1545c37041c94c197b9727299fccc0b5ca7fc3d7833b9e1967dba610d084943b
                                                        • Opcode Fuzzy Hash: 3d6b330cc5c9dd7f19e068a29130591e5b204b1fdfc58b1c50816dd1f366be30
                                                        • Instruction Fuzzy Hash: FB614A72A09B9285EB54CF6AE8902AA23B4FB49BC4F156036DF0D57B54DF3DE489C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: BlockFrameHandler3::Unwindabortterminate$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                        • String ID: csm$csm$csm
                                                        • API String ID: 4223619315-393685449
                                                        • Opcode ID: 1fea5c564d133bdba3aecb898f1e2b7bc476544beebca211cb7a23793dbe9004
                                                        • Instruction ID: 7fcc8160e205bee8418fbe74d9ca2fee7bb2a8b4c1a1aa7fc7761a4302bf1706
                                                        • Opcode Fuzzy Hash: 1fea5c564d133bdba3aecb898f1e2b7bc476544beebca211cb7a23793dbe9004
                                                        • Instruction Fuzzy Hash: 81E1B272A08B8286EB20CF69D4412AD77A0FB45BE9F102139DF8D57B99CF78E184C700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: CallDeallocErr_FormatObject_memset
                                                        • String ID: argument %zd: $too many arguments (%zi), maximum is %i
                                                        • API String ID: 1791410686-4072972272
                                                        • Opcode ID: 4740f729d07df1b72c89f8ee573bc102a3c799c06bb822e8bf3e008f4163d2c1
                                                        • Instruction ID: 729155cb1441948f7c6c775af27a4ce973a449c6bd50ad49883b002977f1c46f
                                                        • Opcode Fuzzy Hash: 4740f729d07df1b72c89f8ee573bc102a3c799c06bb822e8bf3e008f4163d2c1
                                                        • Instruction Fuzzy Hash: D4B16066A08FC285EB609F2D88902BA2375FF09BE8F146631DF5D477D5DE38E5498300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: Replicator::operator[]
                                                        • String ID: `generic-type-$`template-parameter-$generic-type-$template-parameter-
                                                        • API String ID: 3676697650-3207858774
                                                        • Opcode ID: ecd4a8ae6d7230611fff1dd4e64a59f99909a897cce7822f33257ee1ddf9a1a8
                                                        • Instruction ID: 1c71c55eac6a6932c246ff43a01f25f100ce093dfb0739500b1bac3d0de4be73
                                                        • Opcode Fuzzy Hash: ecd4a8ae6d7230611fff1dd4e64a59f99909a897cce7822f33257ee1ddf9a1a8
                                                        • Instruction Fuzzy Hash: 77918C22A08BCA89FB508F28D4402BC3BA2AF557AAF586132DB5D077A5DF3CE555C350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Arg_AttrDict_Err_FormatObject_ParseSizeStringTuple_Updatememcpy
                                                        • String ID: %.200s.__dict__ must be a dictionary, not %.200s$O!s#$__dict__
                                                        • API String ID: 111561578-4068157617
                                                        • Opcode ID: df2c1ae6872be876c0abca8e9306c520b908d31e559ab2d333eeb8cb4e17a471
                                                        • Instruction ID: cf37a6b75057a5ce6e4d8127eace0c8730e1c7dd2351483689d24bbfde4f2b4d
                                                        • Opcode Fuzzy Hash: df2c1ae6872be876c0abca8e9306c520b908d31e559ab2d333eeb8cb4e17a471
                                                        • Instruction Fuzzy Hash: EA314972A08B8682EB508F69E8640B923B4FF8AFE5F556132DB1D43754CF3CE4988300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2087887642.00007FF8B9061000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                        • Associated: 00000007.00000002.2087851325.00007FF8B9060000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087957246.00007FF8B9063000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087988693.00007FF8B9065000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088065900.00007FF8B9066000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9060000_lib.jbxd
                                                        Similarity
                                                        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                        • String ID:
                                                        • API String ID: 349153199-0
                                                        • Opcode ID: 49741281be2100ec61cea02429068dcdc2aa4a812f9568a561c19d79723e8765
                                                        • Instruction ID: 89e6d9307b5693bdf887aacd5c2f0a89976c2fedc83666baddcdd3d0fdca4f69
                                                        • Opcode Fuzzy Hash: 49741281be2100ec61cea02429068dcdc2aa4a812f9568a561c19d79723e8765
                                                        • Instruction Fuzzy Hash: 13815B21E186C386FED4EF6EA4412B976A1AF85BC0F54C139EB0D87696DF3CE4479600
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: CallObjectObject_
                                                        • String ID: (%s) $expected %s instance, got %s$incompatible types, %s instance instead of %s instance
                                                        • API String ID: 3040866976-3177377183
                                                        • Opcode ID: d8d30b96da88cef245048956aa11174a0505f3ed0a0a37e68dc2437735cc2005
                                                        • Instruction ID: 9b3ee4898a182bc78a80f2a205e79b4d32a908c927b7bf7b0248900e0a3dd5ad
                                                        • Opcode Fuzzy Hash: d8d30b96da88cef245048956aa11174a0505f3ed0a0a37e68dc2437735cc2005
                                                        • Instruction Fuzzy Hash: D551F665A08BC681EE649F2AD95427A6375AF8DFC4F486031EF4D577A5DF2CE888C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Unicode_$ConcatDict_FromInternStringTuple_Update
                                                        • String ID: _be
                                                        • API String ID: 1858819020-4071763053
                                                        • Opcode ID: 10cbbb94ffeeef5047c8331b99db0bdcf7c3f3ec2fb3fe09a0319070b4712324
                                                        • Instruction ID: 7a31ff791422c123f94488a079e82c4cb4887758cb7ff0b32bae950bc87e05e1
                                                        • Opcode Fuzzy Hash: 10cbbb94ffeeef5047c8331b99db0bdcf7c3f3ec2fb3fe09a0319070b4712324
                                                        • Instruction Fuzzy Hash: 76512376A09F8685EA549F29D85027973B8FB89FD4B18A135CB4D03364DF3CE8A8C340
                                                        APIs
                                                          • Part of subcall function 00007FF8B93CC4D0: _PyObject_GC_NewVar.PYTHON311(?,?,?,00007FF8B93CCE4C,?,?,?,?,?,00007FF8B93C6CC2), ref: 00007FF8B93CC4E7
                                                          • Part of subcall function 00007FF8B93CC4D0: memset.VCRUNTIME140(?,?,?,00007FF8B93CCE4C,?,?,?,?,?,00007FF8B93C6CC2), ref: 00007FF8B93CC534
                                                          • Part of subcall function 00007FF8B93CC4D0: PyObject_GC_Track.PYTHON311(?,?,?,00007FF8B93CCE4C,?,?,?,?,?,00007FF8B93C6CC2), ref: 00007FF8B93CC53C
                                                        • PyErr_NoMemory.PYTHON311(?,?,?,?,?,00007FF8B93C6CC2), ref: 00007FF8B93CCE8C
                                                        • _Py_Dealloc.PYTHON311 ref: 00007FF8B93CCFCD
                                                          • Part of subcall function 00007FF8B93CF698: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF8B93CCE69,?,?,?,?,?,00007FF8B93C6CC2), ref: 00007FF8B93CF6AD
                                                          • Part of subcall function 00007FF8B93CF698: VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF8B93CCE69,?,?,?,?,?,00007FF8B93C6CC2), ref: 00007FF8B93CF6ED
                                                        • ffi_prep_cif.LIBFFI-8 ref: 00007FF8B93CCF4E
                                                        • PyErr_Format.PYTHON311 ref: 00007FF8B93CCF6C
                                                        • ffi_prep_closure.LIBFFI-8 ref: 00007FF8B93CCF86
                                                        • PyErr_SetString.PYTHON311 ref: 00007FF8B93CCFBE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$Object_$AllocDeallocFormatInfoMemoryStringSystemTrackVirtualffi_prep_cifffi_prep_closurememset
                                                        • String ID: ffi_prep_cif failed with %d$ffi_prep_closure failed with %d$invalid result type for callback function
                                                        • API String ID: 262837356-3338905684
                                                        • Opcode ID: d5e79a3c8a6f2ae5980b289ff7b9deb079edb7f79e81270934b3751b0593511a
                                                        • Instruction ID: 5c3744c966eb35de26b0fe19a608eb00507f73df8d4f19f27ed3a25176d888c5
                                                        • Opcode Fuzzy Hash: d5e79a3c8a6f2ae5980b289ff7b9deb079edb7f79e81270934b3751b0593511a
                                                        • Instruction Fuzzy Hash: D0510632A09B8685EB648F29E85067A23B4FF49FC4F192536DB4D47764CF38E859C380
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocObject_$Arg_AttrCallFromMethodParseTupleUnicode_Vectorcall
                                                        • String ID: OO!
                                                        • API String ID: 3012979734-3205451899
                                                        • Opcode ID: b86a9e6aec3d04f9dfe7387ee9b59cc105e28f1fb880d666b22fe7cdd29bfbaf
                                                        • Instruction ID: d906d093f2898a33c405c341d76717d49d2e5a6a9477faf9cfaf32b6aee21d32
                                                        • Opcode Fuzzy Hash: b86a9e6aec3d04f9dfe7387ee9b59cc105e28f1fb880d666b22fe7cdd29bfbaf
                                                        • Instruction Fuzzy Hash: C1212B31A09B8681EF658F69E86467967B8EF4DFD0F046035DE4E47754EE3CE9688300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: String$Free$Err_Mem_$AllocCharFormatUnicode_Wide
                                                        • String ID: String too long for BSTR$unicode string expected instead of %s instance
                                                        • API String ID: 920172908-178309214
                                                        • Opcode ID: cf6aaef1cfa7e26ad3eb861eb924d9a3e9377ee2f3586ae237e535f2c803a6dc
                                                        • Instruction ID: a16431b3f6b347e3d6fe9a13f8d3a5d7e502380aeafcf531d0ded8f6d1e528d9
                                                        • Opcode Fuzzy Hash: cf6aaef1cfa7e26ad3eb861eb924d9a3e9377ee2f3586ae237e535f2c803a6dc
                                                        • Instruction Fuzzy Hash: 1B211D65A09F8682EB649F99E8641796774EF8DFC0F54A035DF0E53724DE3CE8988300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$DeallocString$Formatmemcpy
                                                        • String ID: byte string too long$bytes expected instead of %s instance$can't delete attribute
                                                        • API String ID: 1948958528-1866040848
                                                        • Opcode ID: fa96def4341ef930101010d25cc26409db7019c647d688fb077c539500109b12
                                                        • Instruction ID: 678da43247d5648e92d0d86f0693f656d0feb0564c1a3c07406ffd9869cc024c
                                                        • Opcode Fuzzy Hash: fa96def4341ef930101010d25cc26409db7019c647d688fb077c539500109b12
                                                        • Instruction Fuzzy Hash: 39212F61A08F8682EB648F5DE95017923B4FF49FD4F146132DB1E57665CF2CE499C301
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: Name::operator+
                                                        • String ID:
                                                        • API String ID: 2943138195-0
                                                        • Opcode ID: ea53d01b8add9f065da6da89440d1b5514e5cb284af6834d09ce1e9fb4639f71
                                                        • Instruction ID: b7868155fc9903c7d0b35f0cf483cad94ebffc9b74ece9a7f8687613c3d62bb3
                                                        • Opcode Fuzzy Hash: ea53d01b8add9f065da6da89440d1b5514e5cb284af6834d09ce1e9fb4639f71
                                                        • Instruction Fuzzy Hash: 78613862B14B9698FB00DFA8D8801EC27B1BB047A9F50643ADF4D6BB99DF78E545C340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: abortterminate$Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                        • String ID: csm$csm$csm
                                                        • API String ID: 211107550-393685449
                                                        • Opcode ID: 688fb15556d862c72de40c94a9225dad620afe04ad3ce9f2b8c9a53cb021efd3
                                                        • Instruction ID: 3cc9c2bb27dec2296675a94e78007b9b21b0df0171413c218f89623047f6a280
                                                        • Opcode Fuzzy Hash: 688fb15556d862c72de40c94a9225dad620afe04ad3ce9f2b8c9a53cb021efd3
                                                        • Instruction Fuzzy Hash: B5E17A73A08BC28AE7209F78D4802AD7BA0FB45BA9F156135DB8D47796DF38E485C740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc
                                                        • String ID: P$wrong type
                                                        • API String ID: 3617616757-281217272
                                                        • Opcode ID: e3327ad88a9a446218fbdf097499024a9865fdc2e91cfe0628b0646d4787f104
                                                        • Instruction ID: 65f4af80196bd37fc5509363a5f416c2658d502c6dd2843f8920cc80f31d7fe5
                                                        • Opcode Fuzzy Hash: e3327ad88a9a446218fbdf097499024a9865fdc2e91cfe0628b0646d4787f104
                                                        • Instruction Fuzzy Hash: 58711865A09FC681FA649F39E86417A27B5AF8DFC0F546435DB0E473A5DE2CE888C340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Arg_ParseSizeTuple_$Err_Long_StringVoid$AttrAuditCallable_CheckObject_OccurredSequence_Sys_Tuple
                                                        • String ID: argument must be callable or integer function address$cannot construct instance of this class: no argtypes
                                                        • API String ID: 2570622991-2742191083
                                                        • Opcode ID: 540973c798f55e8bddb45151d9b86c5f877ff1e98a5e2c5b0f3278a9c8d95e1e
                                                        • Instruction ID: 9935beeb35b5ef6c89115f07638814d032474a773cee531de47381221c230a5a
                                                        • Opcode Fuzzy Hash: 540973c798f55e8bddb45151d9b86c5f877ff1e98a5e2c5b0f3278a9c8d95e1e
                                                        • Instruction Fuzzy Hash: 90515C25A0DFC285EA649F59949427A27B4EF8DFC4F08A031DF0E07795EF2CE4899700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: Name::operator+
                                                        • String ID: cli::array<$cli::pin_ptr<$std::nullptr_t$std::nullptr_t $void$void
                                                        • API String ID: 2943138195-2239912363
                                                        • Opcode ID: e6d89d71e33ac373f0738e0b515b9d7d47b180a069a0d86b59b00a9470073de2
                                                        • Instruction ID: e34188f33664f383bfad54bcac1fec1de874edf86589dc53dd0e7b981f2c9de1
                                                        • Opcode Fuzzy Hash: e6d89d71e33ac373f0738e0b515b9d7d47b180a069a0d86b59b00a9470073de2
                                                        • Instruction Fuzzy Hash: 10513B62E18BD598FB118FA9D8452BC3BB0BB087A5F449135DF8D12795DF3CA144C710
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2087887642.00007FF8B9061000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                        • Associated: 00000007.00000002.2087851325.00007FF8B9060000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087957246.00007FF8B9063000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087988693.00007FF8B9065000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088065900.00007FF8B9066000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9060000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$DescriptorErr_FastFileObject_Sequence_String
                                                        • String ID: arguments 1-3 must be sequences$too many file descriptors in select()
                                                        • API String ID: 3320488554-3996108163
                                                        • Opcode ID: 05e470237c1967013c16db83c877e5144c843c525c657350500e77854bb128da
                                                        • Instruction ID: 43b37cc4a4b6d7e890e14f02231ece7347b0942057ecd67d64a731f1c5a2ab05
                                                        • Opcode Fuzzy Hash: 05e470237c1967013c16db83c877e5144c843c525c657350500e77854bb128da
                                                        • Instruction Fuzzy Hash: 83416C32609B8282EE14DF1DE9441397BA4FB95BE4F044235DB6E877A8DF38E456C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: CallDeallocObject_$FromFunctionLongLong_Traceback_
                                                        • String ID: GetResult$_ctypes/callproc.c
                                                        • API String ID: 2301701745-4166898048
                                                        • Opcode ID: 6b14f494761338040cbc18ac8ef32615b91be7de93a4bad4d1a784e7f6cbc817
                                                        • Instruction ID: 9ba716b365722087e3ba175a22e222d3020618dd0ba456349834d62445d78012
                                                        • Opcode Fuzzy Hash: 6b14f494761338040cbc18ac8ef32615b91be7de93a4bad4d1a784e7f6cbc817
                                                        • Instruction Fuzzy Hash: 3B313221E0DF8685EA659F2EA45417A62B4EF4EFC0F086530DF0E477A5DE2CE5488340
                                                        APIs
                                                        • PyObject_IsInstance.PYTHON311(?,?,00000000,00007FF8B93C6BCC), ref: 00007FF8B93C9D73
                                                        • PyObject_IsInstance.PYTHON311(?,?,00000000,00007FF8B93C6BCC), ref: 00007FF8B93C9DBB
                                                        • PyErr_Format.PYTHON311(?,?,00000000,00007FF8B93C6BCC), ref: 00007FF8B93C9E4D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: InstanceObject_$Err_Format
                                                        • String ID: ???$expected %s instance instead of %s$expected %s instance instead of pointer to %s
                                                        • API String ID: 215623467-1082101171
                                                        • Opcode ID: c42a85ef290f4f7c7dec54bd01f908c692fe1a4d2cba32a0c83425372474c043
                                                        • Instruction ID: 4f0b4d28614f0dc8c9e72dc98cb15dfada85279bc3d18727162edfa78432a28f
                                                        • Opcode Fuzzy Hash: c42a85ef290f4f7c7dec54bd01f908c692fe1a4d2cba32a0c83425372474c043
                                                        • Instruction Fuzzy Hash: DA316B21A08F8682EA649F6AE86407A2374AF4DFD4F55A032DB0D577A5DF3CE849C340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$BuildDeallocFromLong_OccurredSsize_tStringTuple_Value
                                                        • String ID: not a ctypes type or object$siN
                                                        • API String ID: 1444022424-92050270
                                                        • Opcode ID: 26a9fcd1b49395e45c52150cf6bc8a8343daf74cdcd0b31558393dc906a49e26
                                                        • Instruction ID: a1935fa7c0430ab581b798b3bba33b96582d52a6683a010c7b53c3d14b5bbdd5
                                                        • Opcode Fuzzy Hash: 26a9fcd1b49395e45c52150cf6bc8a8343daf74cdcd0b31558393dc906a49e26
                                                        • Instruction Fuzzy Hash: 36212921A09FC681EA649F2AE59027A23B5EF4DFD4F086034EF1E57764DF2CE8498310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Buffer_Err_ReleaseString$BufferObject_memcpy
                                                        • String ID: byte string too long$cannot delete attribute
                                                        • API String ID: 1128862751-688604938
                                                        • Opcode ID: c0fad4b2d32ac0ab3663af02738014edb070c5b9f2759e00e789a8b2334ff090
                                                        • Instruction ID: 5be89f63646afb9f5f581761974c6eaf6a5281bc630cded9249a8e462edd0ff6
                                                        • Opcode Fuzzy Hash: c0fad4b2d32ac0ab3663af02738014edb070c5b9f2759e00e789a8b2334ff090
                                                        • Instruction Fuzzy Hash: D5013C61A18E8682EA20CF69E46447A2374FF8DFC8F506132CB5E87264DE2DE548C700
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                        • String ID:
                                                        • API String ID: 349153199-0
                                                        • Opcode ID: 31b097c5beb5f15cde6c2b56eb33e70b4a1a94a0495c7f4a48947f332bb9daf1
                                                        • Instruction ID: c0931f6510a4b1d73d5d31398a5cb1ab3a12db3357dc41ba87ea5bba15816ac5
                                                        • Opcode Fuzzy Hash: 31b097c5beb5f15cde6c2b56eb33e70b4a1a94a0495c7f4a48947f332bb9daf1
                                                        • Instruction Fuzzy Hash: D381A025E0CBC786F760AF6E94512BA66B4AF8D7C4F54A035DB0D87396DE3CE4498700
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dict_Item$CallCheckDeallocErrorFunctionMakeObject_ResultTuple_UpdateWith
                                                        • String ID:
                                                        • API String ID: 1807771726-0
                                                        • Opcode ID: 42a6a9498eb4336f8fb7f7e14a875b7f35efea189098be1472c8111e8b538fde
                                                        • Instruction ID: 2f329af1e4c891a773beedaad7af04fbef6140d9aa64eebd88d0012e3f80c479
                                                        • Opcode Fuzzy Hash: 42a6a9498eb4336f8fb7f7e14a875b7f35efea189098be1472c8111e8b538fde
                                                        • Instruction Fuzzy Hash: D6611E21A0DF8686EAA59F29A95437A23B4AF4DFD4F086035DF4E077A5DF3CE4598300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: FileHeader$ExceptionFindInstanceRaiseTargetType
                                                        • String ID: Access violation - no RTTI data!$Attempted a typeid of nullptr pointer!$Bad dynamic_cast!$Bad read pointer - no RTTI data!
                                                        • API String ID: 1852475696-928371585
                                                        • Opcode ID: ca6cf6770a5e62d56dc10247fecd8c14e7675c1b430a8679457d8e3be21ba961
                                                        • Instruction ID: 05883240b84d4d1fc3f4153285b76bc4d5550c7f6d8c5c0b5b3d06716ebf4d26
                                                        • Opcode Fuzzy Hash: ca6cf6770a5e62d56dc10247fecd8c14e7675c1b430a8679457d8e3be21ba961
                                                        • Instruction Fuzzy Hash: BA518D62A18BC692EF20CF98E8911B96360FB46BEAF409135DB4E47765DF3CE505C300
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF8B9F66D1B,?,?,00000000,00007FF8B9F66B4C,?,?,?,?,00007FF8B9F66885), ref: 00007FF8B9F66BE1
                                                        • GetLastError.KERNEL32(?,?,?,00007FF8B9F66D1B,?,?,00000000,00007FF8B9F66B4C,?,?,?,?,00007FF8B9F66885), ref: 00007FF8B9F66BEF
                                                        • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF8B9F66D1B,?,?,00000000,00007FF8B9F66B4C,?,?,?,?,00007FF8B9F66885), ref: 00007FF8B9F66C08
                                                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF8B9F66D1B,?,?,00000000,00007FF8B9F66B4C,?,?,?,?,00007FF8B9F66885), ref: 00007FF8B9F66C1A
                                                        • FreeLibrary.KERNEL32(?,?,?,00007FF8B9F66D1B,?,?,00000000,00007FF8B9F66B4C,?,?,?,?,00007FF8B9F66885), ref: 00007FF8B9F66C60
                                                        • GetProcAddress.KERNEL32(?,?,?,00007FF8B9F66D1B,?,?,00000000,00007FF8B9F66B4C,?,?,?,?,00007FF8B9F66885), ref: 00007FF8B9F66C6C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: Library$Load$AddressErrorFreeLastProcwcsncmp
                                                        • String ID: api-ms-
                                                        • API String ID: 916704608-2084034818
                                                        • Opcode ID: 936032d40fa96b032ac86a2d89c5a398f87e2a2d839e469644f99c68bf1566a7
                                                        • Instruction ID: c161ef8b83133fb42bc23633f3005715f79605d11710c2b726e1e3afbac552b8
                                                        • Opcode Fuzzy Hash: 936032d40fa96b032ac86a2d89c5a398f87e2a2d839e469644f99c68bf1566a7
                                                        • Instruction Fuzzy Hash: 0D31BE21B1AFC291EE219F4AE8005B426A8FF4ABF6F595535DE1D0A394DF3DE148C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$CallDict_Err_MakeMallocMem_MemoryObject_Update
                                                        • String ID: X{}
                                                        • API String ID: 3445980372-2140212134
                                                        • Opcode ID: 3f2902342c13d165ca5a04ad6b751020229967bc3c101f7663baa985dba562bd
                                                        • Instruction ID: 16f6b4d2138440e187f20566b32fb117848ab27073f58f2021ebafc9e6716469
                                                        • Opcode Fuzzy Hash: 3f2902342c13d165ca5a04ad6b751020229967bc3c101f7663baa985dba562bd
                                                        • Instruction Fuzzy Hash: 0C311A31A09F8685EA958F6DA95427A62B4EF4AFD0F58A134DB5E077A0DF3CE4588300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$AttrCallable_CheckErr_LookupObject_String
                                                        • String ID: restype must be a type, a callable, or None
                                                        • API String ID: 1528254987-4008198047
                                                        • Opcode ID: 6452f5985481fdf810af319e620606f51f1d816ac9bc74436ba4aa13f9c82220
                                                        • Instruction ID: c0b864d212cadea3c76ca8beb368014dc78bf7da97395f8dc4601eb37a1b6895
                                                        • Opcode Fuzzy Hash: 6452f5985481fdf810af319e620606f51f1d816ac9bc74436ba4aa13f9c82220
                                                        • Instruction Fuzzy Hash: AC312122E0DF8781FA659F6ED55037A23B4EF49BD4F18A130CB4D566A4DF2CE8499300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: CharErr_Unicode_Wide$FormatString
                                                        • String ID: can't delete attribute$string too long$unicode string expected instead of %s instance
                                                        • API String ID: 530648689-1577475929
                                                        • Opcode ID: 54871f426e13d62f20164b13e72e16cb3eb4130456bf9d3dcc44f832ca140448
                                                        • Instruction ID: c7ef8ef05729fa22ac217ca44c22fc8bd324394220fa33eddd3ca7247aad4abf
                                                        • Opcode Fuzzy Hash: 54871f426e13d62f20164b13e72e16cb3eb4130456bf9d3dcc44f832ca140448
                                                        • Instruction Fuzzy Hash: A5213861A08BC682EB64CF6AE4901796375FF89FD0F54A136EB1D07668CF2CE499C700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Long$Long_MaskUnsigned
                                                        • String ID: _ctypes/cfield.c pymem$unicode string or integer address expected instead of %s instance
                                                        • API String ID: 1805849926-901310697
                                                        • Opcode ID: 2ce16603c6b5fb28991612c657e35fb793e2d5932663eadf79fd1512b973919a
                                                        • Instruction ID: 3b0c39eef8f870fdd2569663287984b1279fc0e2b5c550af98268dac63c9ad9e
                                                        • Opcode Fuzzy Hash: 2ce16603c6b5fb28991612c657e35fb793e2d5932663eadf79fd1512b973919a
                                                        • Instruction Fuzzy Hash: 79110A75A0AFC681EA648F5DE8642792775EF4DFC5F54A036CB1E06754EE3CE8A88300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocErr_$CharFormatStringUnicode_Wide
                                                        • String ID: one character unicode string expected$unicode string expected instead of %s instance
                                                        • API String ID: 3624372013-2255738861
                                                        • Opcode ID: a442bb40f20c3a4dd4081ba5bcb0ae0298b6afa5f68cd383e2f326c911a818c9
                                                        • Instruction ID: 7b49cbfee2cc6e60151e121a1bcb51945cbb1eff948e9ef6469fc764f8822c59
                                                        • Opcode Fuzzy Hash: a442bb40f20c3a4dd4081ba5bcb0ae0298b6afa5f68cd383e2f326c911a818c9
                                                        • Instruction Fuzzy Hash: B411FB76A09B8681EBA48F29E8541792374EF8EFD4F54B132DB4E47724DE2DE498C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Arg_CharErrorFreeFromLastLocalParseTupleUnicode_Wide
                                                        • String ID: <no description>$|i:FormatError
                                                        • API String ID: 935104296-1632374824
                                                        • Opcode ID: da62cbb651d4d48137c88a006a0480f238e20f846b976fc73609049c0e997912
                                                        • Instruction ID: 30e09a670f3802717d65e0dfed55f9ff923a8e193d80a6c028c4d7ef6aac5394
                                                        • Opcode Fuzzy Hash: da62cbb651d4d48137c88a006a0480f238e20f846b976fc73609049c0e997912
                                                        • Instruction Fuzzy Hash: AF016965A08BC652EA645F19A85407A62B5FF4DBD1F146230DB7E432D4EE3CE4488710
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Eval_Thread$Arg_Err_FreeFromLibraryParseRestoreSaveTupleWindows
                                                        • String ID: O&:FreeLibrary
                                                        • API String ID: 204461231-2600264430
                                                        • Opcode ID: 078f241c74f91baaec2f50080a5493ab98081374dae74a9cab3a0cffd8d54dea
                                                        • Instruction ID: 61e0dd87f22e6c5f3dca55c28d526a478b15851e58ad40dfb772c3ef41e50572
                                                        • Opcode Fuzzy Hash: 078f241c74f91baaec2f50080a5493ab98081374dae74a9cab3a0cffd8d54dea
                                                        • Instruction Fuzzy Hash: DA011B21A0CF8782E7A18F69A85413A2374EF8DBC4F146431EB5E43614DE3CE4498750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: String$Size$AttrBuildBytes_Err_FromObject_Value_
                                                        • String ID: O(O(NN))$__dict__$ctypes objects containing pointers cannot be pickled
                                                        • API String ID: 1770468409-724424928
                                                        • Opcode ID: 3ee03d1d2b345c529b1bd3c85f0488fda98b0b8f69e1e8ea5ec09f1cc578dd04
                                                        • Instruction ID: 22a1d2f950320c5098abefe07835714fc318fc8472876cb72b875c56df9d3fe5
                                                        • Opcode Fuzzy Hash: 3ee03d1d2b345c529b1bd3c85f0488fda98b0b8f69e1e8ea5ec09f1cc578dd04
                                                        • Instruction Fuzzy Hash: EE011B25A08B8692EA608F1AE95017A2374FF4DFD4F446131DF8D53764DF2CE555C700
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: abort$AdjustPointer
                                                        • String ID:
                                                        • API String ID: 1501936508-0
                                                        • Opcode ID: 33b9a28e85c1583a9e53f416898540066328f1663c9e5eff4cdc8514e51169f9
                                                        • Instruction ID: 316b76bd91c53515e7b014bb852256becaa33e98a0e0d76b9c5513570159dfcb
                                                        • Opcode Fuzzy Hash: 33b9a28e85c1583a9e53f416898540066328f1663c9e5eff4cdc8514e51169f9
                                                        • Instruction Fuzzy Hash: 4E51AB21A0ABC281EA658F19D4446BC67A4EF85FF3F09A539CB4D8A794DF7CE442C300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: abort$AdjustPointer
                                                        • String ID:
                                                        • API String ID: 1501936508-0
                                                        • Opcode ID: cf0ce418dbf8095189d4875bbd922365259c44d693191a2e82a2bfde5589004d
                                                        • Instruction ID: 0dcf7bc75829da665f587dbd17a42de5fc73123d02d03b391cbf91ab3c58fcea
                                                        • Opcode Fuzzy Hash: cf0ce418dbf8095189d4875bbd922365259c44d693191a2e82a2bfde5589004d
                                                        • Instruction Fuzzy Hash: 9E51D331E09BC281FA659F2CD4442B867A4AF85FE6F09A436CB8D86795DF3CE455D300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Mem_$FreeMalloc$Err_Memorymemcpy
                                                        • String ID:
                                                        • API String ID: 920471837-0
                                                        • Opcode ID: c91e9501240dbb047462beff57c3e24aa08f07d97696b8881faa54e688d9ffaf
                                                        • Instruction ID: fe2faf10e4f9ae22baa54f69edb2ed304274a4bcfa27696e32a4226841b00b38
                                                        • Opcode Fuzzy Hash: c91e9501240dbb047462beff57c3e24aa08f07d97696b8881faa54e688d9ffaf
                                                        • Instruction Fuzzy Hash: 70512B26A09FC592EB598F3995503B963B0FF59B84F18A235CF5D13296DF38A0E9C300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Tuple_
                                                        • String ID:
                                                        • API String ID: 828192933-0
                                                        • Opcode ID: 5e62f5604a1117c70738b5e9d10e81d038eb8c1c9d08bc44558772b595a0c4de
                                                        • Instruction ID: be2755c4e740d60f694464fd7c673bd4143209f9572075b49691a515fc6cde9e
                                                        • Opcode Fuzzy Hash: 5e62f5604a1117c70738b5e9d10e81d038eb8c1c9d08bc44558772b595a0c4de
                                                        • Instruction Fuzzy Hash: 76419D72909B8385EAA58F2DA81463A22B4FF8ABD4F046134DF4E02660DF3CE498C700
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dict_$DeallocObject_$AttrCallContainsErr_ErrorItemMakeOccurredUpdateWith
                                                        • String ID:
                                                        • API String ID: 3953964043-0
                                                        • Opcode ID: 514ed9f4908b8c8283f0e0c27daf6479cf123024387674585ac24fe74f6d228d
                                                        • Instruction ID: 72c1dec51a88d4d6d6a449b5013fbbc2eeade43f249878218c66b8bff62be8b9
                                                        • Opcode Fuzzy Hash: 514ed9f4908b8c8283f0e0c27daf6479cf123024387674585ac24fe74f6d228d
                                                        • Instruction Fuzzy Hash: BB411B31A09FC781EA659F6DA9542BA62B4EF4DBD4F04A134DB4E467A0DF2CF4989300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc
                                                        • String ID:
                                                        • API String ID: 3617616757-0
                                                        • Opcode ID: 068abb66bbfb9b3a2a685b208f6aebfac36357060354af221ed5b1c6e4112d13
                                                        • Instruction ID: d1f6ea5335a7340b8ae90e9fd7537b306b7638a5f299d57c2b2c34937050192e
                                                        • Opcode Fuzzy Hash: 068abb66bbfb9b3a2a685b208f6aebfac36357060354af221ed5b1c6e4112d13
                                                        • Instruction Fuzzy Hash: 2831DA72D09F8681FBA56F78886C37A23B8EF5EF99F146134CB0E450968F2D95498300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: FileHeader_local_unwind
                                                        • String ID: MOC$RCC$csm$csm
                                                        • API String ID: 2627209546-1441736206
                                                        • Opcode ID: 48d146a85fba6cc68383d4a357e19a92ddcb549a58e0a70336f33e234ca841ed
                                                        • Instruction ID: 52989c83ee8e4e0925d9e4f3cb8aa1bbca0f7450c1f9067fc1a3d761d4495563
                                                        • Opcode Fuzzy Hash: 48d146a85fba6cc68383d4a357e19a92ddcb549a58e0a70336f33e234ca841ed
                                                        • Instruction Fuzzy Hash: EE518A72A0878286EB609F29D44137D26A0FF86BF6F142135EF8D66799CF3CE485C641
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: Name::operator+
                                                        • String ID: {for
                                                        • API String ID: 2943138195-864106941
                                                        • Opcode ID: 416ecf82abdc7693f83b664dab0e642ebc660969777f9551cf3e7d4c265d34da
                                                        • Instruction ID: 760986aab24fc5e8c44c3b0cb005035bea354c41e426d9fc37a4db498763b490
                                                        • Opcode Fuzzy Hash: 416ecf82abdc7693f83b664dab0e642ebc660969777f9551cf3e7d4c265d34da
                                                        • Instruction Fuzzy Hash: 69514B72A18BC5A9FB019F28D4453E83BA1EB44799F44A031EB4C4BBA9DF7CD564C350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Object_$Dealloc$AttrInstanceLookup
                                                        • String ID: wrong type
                                                        • API String ID: 1828014136-2191655096
                                                        • Opcode ID: 48019a5db2fa545bbb614ff61a29e7f0ff849fa01fd9e197cdd365b54569e53e
                                                        • Instruction ID: 558359353d906a7617688bba52366b652ece2cad7f9d8fc6ea840b06187dd513
                                                        • Opcode Fuzzy Hash: 48019a5db2fa545bbb614ff61a29e7f0ff849fa01fd9e197cdd365b54569e53e
                                                        • Instruction Fuzzy Hash: 17512C21A0DF9681EA509F1DD99417A23B4AF8DBC0F546431DB4E477A5EF2CE448C340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc
                                                        • String ID: wrong type
                                                        • API String ID: 3617616757-2191655096
                                                        • Opcode ID: bdb23b902ebc4893c2a5809fa917940e2479e1e06ed5718a6fa12672c04d635d
                                                        • Instruction ID: c4941d6fe43666ec0a4f70c18f279de08f36b158e0435ca241bc5d73740a7461
                                                        • Opcode Fuzzy Hash: bdb23b902ebc4893c2a5809fa917940e2479e1e06ed5718a6fa12672c04d635d
                                                        • Instruction Fuzzy Hash: 89510921A09F9681FA649F29E56017A63B4EF8DBC0F486531DB0E477A5DF2CE889C740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: NameName::atol
                                                        • String ID: `template-parameter$void
                                                        • API String ID: 2130343216-4057429177
                                                        • Opcode ID: 7b7e14213947c3780e213c190a7c5fdcdd2a49ff05635447eaaef3bd9456bf2e
                                                        • Instruction ID: 845eb7b66f644c39a83d5da6aa61cc5d592a9d8282f0d4f910e44264ff8e930f
                                                        • Opcode Fuzzy Hash: 7b7e14213947c3780e213c190a7c5fdcdd2a49ff05635447eaaef3bd9456bf2e
                                                        • Instruction Fuzzy Hash: 18411722F08B9688FB008FA9D8512AC27B1BF487EAF545135DF0C2AB59DF7CA545C350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: Name::operator+Replicator::operator[]
                                                        • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                                        • API String ID: 1405650943-2211150622
                                                        • Opcode ID: 463b429a368d480f938697e6d099cec3f907049628b5d1349ecbd199c78a6655
                                                        • Instruction ID: fbcd7348e348d1b2ffd8c65b0988c9a0ceac77def29f07ba5c4e86e01f7bb561
                                                        • Opcode Fuzzy Hash: 463b429a368d480f938697e6d099cec3f907049628b5d1349ecbd199c78a6655
                                                        • Instruction Fuzzy Hash: 01415BB2E08B8A99FB518F6CD8402BC3BB0BB097AAF545539CB4C16364DF7CA545C311
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2087887642.00007FF8B9061000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                        • Associated: 00000007.00000002.2087851325.00007FF8B9060000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087957246.00007FF8B9063000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087988693.00007FF8B9065000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088065900.00007FF8B9066000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9060000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocModule_State
                                                        • String ID:
                                                        • API String ID: 1903735390-0
                                                        • Opcode ID: a7a767094c4d1de27d1ae5cfedc4f2a8987a46609b88e723d83c121dba346a55
                                                        • Instruction ID: fcf7d9a8dbef881a44aee20bb0b2a09dbc8c278f3def5ceacbee71e926b7b449
                                                        • Opcode Fuzzy Hash: a7a767094c4d1de27d1ae5cfedc4f2a8987a46609b88e723d83c121dba346a55
                                                        • Instruction Fuzzy Hash: 1D21B732D0DAC285FFA9CF79985833832A8AF55B99F148434CB0E4A184CF7DE546D340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$Arg_FormatNumber_OccurredSsize_tTupleUnpack
                                                        • String ID: byref$byref() argument must be a ctypes instance, not '%s'
                                                        • API String ID: 169608245-1446499295
                                                        • Opcode ID: 1c7a6bb527df66017d67d4d6c8e7051229e04b236d9d6aec440ba77389511a69
                                                        • Instruction ID: 55f148e703249ddf87212055504aa26b11c2d2530d60a4ecc4398006fe751b29
                                                        • Opcode Fuzzy Hash: 1c7a6bb527df66017d67d4d6c8e7051229e04b236d9d6aec440ba77389511a69
                                                        • Instruction Fuzzy Hash: D0211726609B8682EB108F69E86427A63B4FF8CFA4F141636DB6D47394DF6DD508C350
                                                        APIs
                                                        • PyDict_GetItemWithError.PYTHON311(?,?,00000001,00007FF8B93C77AC), ref: 00007FF8B93CB9AD
                                                        • PyErr_Occurred.PYTHON311(?,?,00000001,00007FF8B93C77AC), ref: 00007FF8B93CB9BC
                                                        • PyErr_Format.PYTHON311(?,?,00000001,00007FF8B93C77AC), ref: 00007FF8B93CB9ED
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$Dict_ErrorFormatItemOccurredWith
                                                        • String ID: not enough arguments$required argument '%S' missing
                                                        • API String ID: 62204369-3448764933
                                                        • Opcode ID: 28da8afa7e9ef03481714140949b522f70dd2a78d8c2b5e7d138b51459312286
                                                        • Instruction ID: b5d6e4b76bd98abb35c26b9fdd37ffbb27f5447a12fe04bd2599ac40409251aa
                                                        • Opcode Fuzzy Hash: 28da8afa7e9ef03481714140949b522f70dd2a78d8c2b5e7d138b51459312286
                                                        • Instruction Fuzzy Hash: C611F965A0AFC581EB658F2AE59413A6371AF49FC4F14A431DB4E47658DF2CE489C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: CharErr_FormatUnicode_Wide
                                                        • String ID: string too long (%zd, maximum length %zd)$unicode string expected instead of %s instance
                                                        • API String ID: 2195588020-2061977717
                                                        • Opcode ID: 3df54ba06c241b92dbf221aa78cdec5a2b91a3063c00f8d20a6361d5b8dc2ae5
                                                        • Instruction ID: 5f28192c31cec9011bfd3c9a4d6aa03308d0508b8929c84381bde96476e39aea
                                                        • Opcode Fuzzy Hash: 3df54ba06c241b92dbf221aa78cdec5a2b91a3063c00f8d20a6361d5b8dc2ae5
                                                        • Instruction Fuzzy Hash: EB118221B0CFC682EA608F5AE89417967A5EF8DFD4F546231DF1E43BA4CE2CD4598700
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: free$EntryInterlockedListNamePush__unmallocstrcpy_s
                                                        • String ID:
                                                        • API String ID: 3741236498-0
                                                        • Opcode ID: de3a4ec1d6e9946eef6b348e6d8a6ead344041b39e9dfd9c2ce66c677152b10d
                                                        • Instruction ID: c8719229261f612c33cb54ffd0455e1f16cffe016b9dd22f0f6017a0dc758515
                                                        • Opcode Fuzzy Hash: de3a4ec1d6e9946eef6b348e6d8a6ead344041b39e9dfd9c2ce66c677152b10d
                                                        • Instruction Fuzzy Hash: 8F31B222B19BD180EB118F69E8045692794FF09FE9B559635DF2D07780EE3EE446C340
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocDict_$CallErr_FormatFromItemLong_MakeObject_Unicode_Voidstrchr
                                                        • String ID:
                                                        • API String ID: 4054517332-0
                                                        • Opcode ID: 183dbe4e66a78b5f82bf9fcbdc5b815f8fe5dd19242b5949e3bcf8ed559180f2
                                                        • Instruction ID: a45da57fc1fd227ade508a5dac7f36cd3d58102d96f471293583f76ae4e5f943
                                                        • Opcode Fuzzy Hash: 183dbe4e66a78b5f82bf9fcbdc5b815f8fe5dd19242b5949e3bcf8ed559180f2
                                                        • Instruction Fuzzy Hash: 2C31EB31A0AF8681EE649F2AA95403A62B4EF4DFD4F4C6934DF4E46795DF2CE4558300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocErr_StringSubtypeType_
                                                        • String ID: has no _stginfo_
                                                        • API String ID: 402260271-2912685656
                                                        • Opcode ID: 9230919844186ca5f41c7b1a63fcb82edb38cf4c596bbf94e99535158fbb2ad0
                                                        • Instruction ID: d6e2f4c24cfaf83f2aab6842c4867d7be2c2a9d4ddd7eceeb0941b139807b000
                                                        • Opcode Fuzzy Hash: 9230919844186ca5f41c7b1a63fcb82edb38cf4c596bbf94e99535158fbb2ad0
                                                        • Instruction Fuzzy Hash: 6EB10562A09FC596EB648F29E85027A63B5FB88BC4F14A435EB4E53754DF3CE958C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: Name::operator+
                                                        • String ID: std::nullptr_t$std::nullptr_t $volatile$volatile
                                                        • API String ID: 2943138195-757766384
                                                        • Opcode ID: e51d893b916fd38dc1e020bc8963aa6f83aa847b46c3d095f24d6897074767ca
                                                        • Instruction ID: 5cdc757730fbfa287a218cd78873c2f23a4a63f33691d33ad491cf2fd0dde0ab
                                                        • Opcode Fuzzy Hash: e51d893b916fd38dc1e020bc8963aa6f83aa847b46c3d095f24d6897074767ca
                                                        • Instruction Fuzzy Hash: DF718972A08B8694FB508FACD9410BC6BA1BB047E6F446536DB8D47BA9DF3CE250C300
                                                        APIs
                                                        • PyMem_Malloc.PYTHON311(?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,00007FF8B93C3784), ref: 00007FF8B93C24ED
                                                        • PyMem_Free.PYTHON311(?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000,00007FF8B93C3784), ref: 00007FF8B93C25DB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Mem_$FreeMalloc
                                                        • String ID: %zd)$%zd,
                                                        • API String ID: 3308143561-2233965340
                                                        • Opcode ID: 97bbcc1d359357e3c252192984d3b0109526b27b564f2bbea6cf16545a3b7b27
                                                        • Instruction ID: f45146f69f9bf4cf0af8457ccab0cf3b430122d48b33274896b1fa61b040d2b2
                                                        • Opcode Fuzzy Hash: 97bbcc1d359357e3c252192984d3b0109526b27b564f2bbea6cf16545a3b7b27
                                                        • Instruction Fuzzy Hash: 20418C22A09BC581EB158F19A4602BBA7A0EF5EFD4F882131DF5E57691DE3DE44AC310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$FormatInstanceObject_String
                                                        • String ID: Pointer does not support item deletion$expected %s instead of %s
                                                        • API String ID: 341772743-2046472288
                                                        • Opcode ID: 56d4fabad618d8a5c8e6f1fde8dcb41e7996936431b442245916351dcbdf5c73
                                                        • Instruction ID: 9902c8ccd7036716ac19bb652925597741f88c10d1132626c04ca6f7bc318ece
                                                        • Opcode Fuzzy Hash: 56d4fabad618d8a5c8e6f1fde8dcb41e7996936431b442245916351dcbdf5c73
                                                        • Instruction Fuzzy Hash: 2521FD61A08F8282EA549F6EE8640BA2371EF8DFD4F156532EF1D87795DE3CD4898300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Arg_FromLongLong_ParseTuple
                                                        • String ID: OO:CopyComPointer
                                                        • API String ID: 1908940310-822416302
                                                        • Opcode ID: a50de67720cd425b58803957e1784c7b340943145018a53cdb6de08dc5e3c1c0
                                                        • Instruction ID: ec6d62d34a387daf764717770be696213ee7aa2b1db3be285eaa64ead6a38ea6
                                                        • Opcode Fuzzy Hash: a50de67720cd425b58803957e1784c7b340943145018a53cdb6de08dc5e3c1c0
                                                        • Instruction Fuzzy Hash: A8215136A08F8685EB159F7998401BD23B4FF4CBD8F089235EB2D57A94CE3CE0498310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dict_Err_NextString
                                                        • String ID: args not a tuple?$too many initializers
                                                        • API String ID: 1977209248-2791065560
                                                        • Opcode ID: f4fd08385035d02860af40dbb96f0e851c8c10ea306c559d0ae5fa500cb6d0af
                                                        • Instruction ID: b4b2feb35355580a411a666444ad4e42840bee63590425223dc4d95f604d728d
                                                        • Opcode Fuzzy Hash: f4fd08385035d02860af40dbb96f0e851c8c10ea306c559d0ae5fa500cb6d0af
                                                        • Instruction Fuzzy Hash: 4C211D61A08FC281EA508F19E45037A63B0EF89BE4F156332EB6D536E5CF6CD989C740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Arg_AuditDeallocFromLongLong_ParseSys_Tuple
                                                        • String ID: ctypes.set_errno
                                                        • API String ID: 928689845-1564666054
                                                        • Opcode ID: 59a8a5489d63178a80b732e192b127fc94092e90c4c175c04c3ca01ed042f338
                                                        • Instruction ID: 38a5f865acc1b35cd572bd9fab8c5e28f2d63f36d282027af21acca2edd8ccb7
                                                        • Opcode Fuzzy Hash: 59a8a5489d63178a80b732e192b127fc94092e90c4c175c04c3ca01ed042f338
                                                        • Instruction Fuzzy Hash: D611C661E18BC682EF644F6AE89407A27B4EF4DBC0F487031DB1D46250DE2CE999C740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Arg_AuditDeallocFromLongLong_ParseSys_Tuple
                                                        • String ID: ctypes.set_last_error
                                                        • API String ID: 928689845-913187751
                                                        • Opcode ID: f23f19bccc13864e0ba767f98ec326220a154fbbf3424597505e894eb8dd0003
                                                        • Instruction ID: d91cc30250279f2e818f3af9d67202fafa891e6f7a1a830f94595884e9a5eb12
                                                        • Opcode Fuzzy Hash: f23f19bccc13864e0ba767f98ec326220a154fbbf3424597505e894eb8dd0003
                                                        • Instruction Fuzzy Hash: B111C661F08B8682EF744F6AE8940BA2774EF4EBC1F086031DB1D06250DE2CE9998740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_FormatSubtypeType_Unicode_strchr
                                                        • String ID: 'out' parameter %d must be a pointer type, not %s$PzZ
                                                        • API String ID: 3500358371-2360062653
                                                        • Opcode ID: fceb702919c06022e64addd7c9aaba2d34447d85d2b2cb0159e7ba4236f850e0
                                                        • Instruction ID: c9a3f0f6d7a7327edd2a78cb5a006f7274a010d7469775e5b672508c79df48b6
                                                        • Opcode Fuzzy Hash: fceb702919c06022e64addd7c9aaba2d34447d85d2b2cb0159e7ba4236f850e0
                                                        • Instruction Fuzzy Hash: 7C111921A08B8791EB509F29E49427A23B5EF9DFC8F446032DF4D47265DE2CE888C340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_FormatSubtypeType_Unicode_strchr
                                                        • String ID: cast() argument 2 must be a pointer type, not %s$sPzUZXO
                                                        • API String ID: 3500358371-1038790478
                                                        • Opcode ID: 00c494f3386268376c83a7897981a44eeb5e2169e225d7a55c5354403a66d736
                                                        • Instruction ID: 3f9395c8596d587f0814e9cc830cf54ee4f78df97e4705e12c9ec3e9f92d9ec1
                                                        • Opcode Fuzzy Hash: 00c494f3386268376c83a7897981a44eeb5e2169e225d7a55c5354403a66d736
                                                        • Instruction Fuzzy Hash: 8A110D61B09BC691FF259F5A989427923B4AF9EFC4F486435CB4E47261DE2CE888C310
                                                        APIs
                                                        • PyObject_GetAttrString.PYTHON311(?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C4FA8
                                                        • PyDict_New.PYTHON311(?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C4FBC
                                                        • PyErr_NewException.PYTHON311(?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C4FDA
                                                          • Part of subcall function 00007FF8B93C5028: PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C504E
                                                          • Part of subcall function 00007FF8B93C5028: PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5065
                                                          • Part of subcall function 00007FF8B93C5028: PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C507D
                                                          • Part of subcall function 00007FF8B93C5028: PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C50A0
                                                          • Part of subcall function 00007FF8B93C5028: PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C50C6
                                                          • Part of subcall function 00007FF8B93C5028: PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C50EC
                                                          • Part of subcall function 00007FF8B93C5028: PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5112
                                                          • Part of subcall function 00007FF8B93C5028: PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5138
                                                          • Part of subcall function 00007FF8B93C5028: PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C515E
                                                          • Part of subcall function 00007FF8B93C5028: PyType_Ready.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5181
                                                          • Part of subcall function 00007FF8B93C5028: PyModule_AddType.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C51A7
                                                          • Part of subcall function 00007FF8B93C5028: PyModule_AddType.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C51CD
                                                          • Part of subcall function 00007FF8B93C5028: PyModule_AddType.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C51F3
                                                          • Part of subcall function 00007FF8B93C5028: PyModule_AddType.PYTHON311(?,?,00000000,00007FF8B93C4FF4,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5219
                                                          • Part of subcall function 00007FF8B93C5304: PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C532F
                                                          • Part of subcall function 00007FF8B93C5304: PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5366
                                                          • Part of subcall function 00007FF8B93C5304: PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C538B
                                                          • Part of subcall function 00007FF8B93C5304: PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C53AA
                                                          • Part of subcall function 00007FF8B93C5304: PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C53CC
                                                          • Part of subcall function 00007FF8B93C5304: PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C53EB
                                                          • Part of subcall function 00007FF8B93C5304: PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C540D
                                                          • Part of subcall function 00007FF8B93C5304: PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C542C
                                                          • Part of subcall function 00007FF8B93C5304: PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5451
                                                          • Part of subcall function 00007FF8B93C5304: PyModule_AddObjectRef.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5470
                                                          • Part of subcall function 00007FF8B93C5304: PyLong_FromLong.PYTHON311(?,?,00000000,00007FF8B93C500E,?,?,?,00007FF8B93C4F7C), ref: 00007FF8B93C5495
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Module_ReadyType_$Object$FromLongLong_$Type$AttrDict_Err_ExceptionObject_String
                                                        • String ID: _unpickle$ctypes.ArgumentError
                                                        • API String ID: 4217053054-165408235
                                                        • Opcode ID: 32827969c832a808a66d5017e69f26ea533dafa79bf6c295bc1895e8a6d04efa
                                                        • Instruction ID: 3072577ff940ea1983f0c9cd1f36180fe4530b680ffe9e944962d8eccba055b1
                                                        • Opcode Fuzzy Hash: 32827969c832a808a66d5017e69f26ea533dafa79bf6c295bc1895e8a6d04efa
                                                        • Instruction Fuzzy Hash: 6501ED25A1DF9782FB609F6DA96013622A9AF4DBD0F446134DA5D827A1EF3CF0598300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Dict_Err_ItemUnraisableWrite
                                                        • String ID: on calling _ctypes.DictRemover
                                                        • API String ID: 2766432985-2232269487
                                                        • Opcode ID: 256ea331e05c61a4a808f1e36cd886345c9bade03a7633d5d0aea444e30aedf2
                                                        • Instruction ID: 1de2a134efff1a46d38b42c73554e66d059a1e55dc978e9e846cfceb610b39d8
                                                        • Opcode Fuzzy Hash: 256ea331e05c61a4a808f1e36cd886345c9bade03a7633d5d0aea444e30aedf2
                                                        • Instruction Fuzzy Hash: C6016D62E0AB8681FF688F6D88643392374EF9DFD5F582530CB1E151A0CF2CD8498300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: FormatFromUnicode_$Dealloc
                                                        • String ID: %s(%R)$<%s object at %p>
                                                        • API String ID: 1714529502-296555854
                                                        • Opcode ID: 7e64ef3b32a657b11c2f44244a8f51ce1e0c9cec8aec46fab4d60a3fe1e5b4e0
                                                        • Instruction ID: 84eec769a35741de9364ef4a685a4a4e8c26155e51a0ec0b156d9be1648c5293
                                                        • Opcode Fuzzy Hash: 7e64ef3b32a657b11c2f44244a8f51ce1e0c9cec8aec46fab4d60a3fe1e5b4e0
                                                        • Instruction Fuzzy Hash: 4501E561A09A8681EE149F2AE89006A6375FF5DFC4B086132CF0D073A4DE2CE899C340
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_File_ObjectPrintS_vsnprintfStringSys_Write
                                                        • String ID: stderr
                                                        • API String ID: 1103062482-1769798200
                                                        • Opcode ID: 9a0837009893c9ce3f6b921fad968050c61bacc10e62fde9b4fb5cee5af4f5c7
                                                        • Instruction ID: 4982cfa815bb14c03a6cbbf72908255b8741eb171a3d27c1d298095c0ef52a2a
                                                        • Opcode Fuzzy Hash: 9a0837009893c9ce3f6b921fad968050c61bacc10e62fde9b4fb5cee5af4f5c7
                                                        • Instruction Fuzzy Hash: E101E962A18B8591EA308F54F4A97AA73B4FF9DB81F441036CA8D46764DE3CE558CB40
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_Format$memcpy
                                                        • String ID: bytes too long (%zd, maximum length %zd)$expected bytes, %s found
                                                        • API String ID: 437140070-1985973764
                                                        • Opcode ID: d9cd41fcd4a9d7115470baacfbcd2da228f5ee59300fb10d52ed7cf167236025
                                                        • Instruction ID: be60c92e4828f91eb23fa900437e843eaa630fce8b7f6a2c6a2b94abb2d93b54
                                                        • Opcode Fuzzy Hash: d9cd41fcd4a9d7115470baacfbcd2da228f5ee59300fb10d52ed7cf167236025
                                                        • Instruction Fuzzy Hash: C6011EA1E09BC6C5EA509F5DD4902792360AF5EBD4F607232C71D13294CE2DE49D8300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2087887642.00007FF8B9061000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                        • Associated: 00000007.00000002.2087851325.00007FF8B9060000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087957246.00007FF8B9063000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087988693.00007FF8B9065000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088065900.00007FF8B9066000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9060000_lib.jbxd
                                                        Similarity
                                                        • API ID: Module_$FromInternObjectStateStringUnicode_
                                                        • String ID: close$error
                                                        • API String ID: 4029360594-371397155
                                                        • Opcode ID: d1d56f56bfa3555b9ef12796d8bede51d7c66017a5d4b22be61f28461ee977ed
                                                        • Instruction ID: 5d9439f6d5e77b5bafbdc60bbeaa842d4e6d5bd3f255d803c13867a4005abb27
                                                        • Opcode Fuzzy Hash: d1d56f56bfa3555b9ef12796d8bede51d7c66017a5d4b22be61f28461ee977ed
                                                        • Instruction Fuzzy Hash: 38F0DA31A09A8792EE14CF6DF8550793368BF49BD4B588136DB1D4A7A4DF3CD45AC380
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: AuditErr_StringSubtypeSys_Type_
                                                        • String ID: (O)$ctypes.addressof$invalid type
                                                        • API String ID: 288810468-3457326693
                                                        • Opcode ID: 1ed79e3af6a29a22ef0b12f793c3d6b77dfb8862b8c0b7dc43e2b4ad75ba5f26
                                                        • Instruction ID: a39e12bb7c4f0b53ffe3630b6fe1ea08e74ff7590fb4f8800a8a2a24a3264e63
                                                        • Opcode Fuzzy Hash: 1ed79e3af6a29a22ef0b12f793c3d6b77dfb8862b8c0b7dc43e2b4ad75ba5f26
                                                        • Instruction Fuzzy Hash: 5AF01251B08E8782EF659F6AE8A10762374EF4DFC8F447431DB2D86161EE2CE599C314
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Arg_AuditParseSys_Tuple
                                                        • String ID: (O)$O&:PyObj_FromPtr$ctypes.PyObj_FromPtr
                                                        • API String ID: 3491098224-1450318991
                                                        • Opcode ID: 2bb121435f85e257f9b1056af5b6aad70d99910b320661e3d929a3a09f6eb257
                                                        • Instruction ID: 59d578b6655ffaa33b64c5cde4b6140961149de3eff037821d87b7d1d9391e40
                                                        • Opcode Fuzzy Hash: 2bb121435f85e257f9b1056af5b6aad70d99910b320661e3d929a3a09f6eb257
                                                        • Instruction Fuzzy Hash: CEF08221A0CEC792EE158F19E8901AA2374FF49BC8F802032D71E47260DE6CE90AC350
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: NameName::$Name::operator+
                                                        • String ID:
                                                        • API String ID: 826178784-0
                                                        • Opcode ID: bce8ca39c1d4cdf7971423a01a1e8e868c385637c9e3d3eec5322708e8c4e6dd
                                                        • Instruction ID: 213d5edc5773a3dae8d3425f2ae71e17354a6bc72bfe24dcffae2b75dcd85fdd
                                                        • Opcode Fuzzy Hash: bce8ca39c1d4cdf7971423a01a1e8e868c385637c9e3d3eec5322708e8c4e6dd
                                                        • Instruction Fuzzy Hash: C5417822A08BD694EB10CF68D8910BC2BA4FB15BE5B65A036DB4D173A5DF3DE415C300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocDict_Item
                                                        • String ID:
                                                        • API String ID: 1953171116-0
                                                        • Opcode ID: 3e79e8a0ec8c6a2242c0b13afb3047cb975f84468eaa628f38e07b0f45846962
                                                        • Instruction ID: 043ee8f7c74c2d72894bec1359ae9fed4de2a3d3fd9e456f7fe78cd5aca70adb
                                                        • Opcode Fuzzy Hash: 3e79e8a0ec8c6a2242c0b13afb3047cb975f84468eaa628f38e07b0f45846962
                                                        • Instruction Fuzzy Hash: A4213E71A4EFC682FA658F29AD5413A62B4EF8EFD1B186530EB0E47795DF2CE5448300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2087887642.00007FF8B9061000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF8B9060000, based on PE: true
                                                        • Associated: 00000007.00000002.2087851325.00007FF8B9060000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087957246.00007FF8B9063000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2087988693.00007FF8B9065000.00000004.00000001.01000000.00000012.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088065900.00007FF8B9066000.00000002.00000001.01000000.00000012.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9060000_lib.jbxd
                                                        Similarity
                                                        • API ID: List_$DeallocItem
                                                        • String ID:
                                                        • API String ID: 1559017468-0
                                                        • Opcode ID: ca1c250aef14b2cb80a943dd37ef050920af6dc516bc50837cea6f6d33c8ee49
                                                        • Instruction ID: e497ba0b6abf625a6382507076baa451df04618093b721bc454f1217e3586538
                                                        • Opcode Fuzzy Hash: ca1c250aef14b2cb80a943dd37ef050920af6dc516bc50837cea6f6d33c8ee49
                                                        • Instruction Fuzzy Hash: 49213931A18A9286EA10CF2EA5046A973A4FB48BC1F584435CB4E87754DF3DE597C380
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dict_$DeallocObject_$AttrCallContainsErr_ErrorItemMakeOccurredUpdateWith
                                                        • String ID:
                                                        • API String ID: 3953964043-0
                                                        • Opcode ID: 83de81b2cdb9a0b5f02c82c61faec42d8a7f4e94c71193b3e965a821689d7666
                                                        • Instruction ID: 9ab99c9f79e79b85f6d6a1ba8293690d6aeb9321b160ce5b09ac0eabf90ad31b
                                                        • Opcode Fuzzy Hash: 83de81b2cdb9a0b5f02c82c61faec42d8a7f4e94c71193b3e965a821689d7666
                                                        • Instruction Fuzzy Hash: 22211721A09FC381EA649F2DA9501BA23B4EF4DBD4F48A035DB4D467A4DF2CF4998300
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc
                                                        • String ID:
                                                        • API String ID: 3617616757-0
                                                        • Opcode ID: abd2609812ce25a27d1ac097890b043a0477b61f164c4d0ec192c4a938d68858
                                                        • Instruction ID: f952c2ccdee86150bbb36ad0918583c0ad949cc51c387bec927b829de10ddbda
                                                        • Opcode Fuzzy Hash: abd2609812ce25a27d1ac097890b043a0477b61f164c4d0ec192c4a938d68858
                                                        • Instruction Fuzzy Hash: CF212176D09F8290FFE48F78981837A23B8EF5AF9AF14A030CB4E491A5CF2D55489310
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: CallObject_$DeallocDict_Err_ErrorItemOccurredWith
                                                        • String ID:
                                                        • API String ID: 4058657591-0
                                                        • Opcode ID: 1a35c4ab6dce3baf8b5148636fef7374f6697dae909102b08545470e9d818853
                                                        • Instruction ID: 11bef63ac123948c6a415d5ef5debae9e33f4f6c02c40284381a1ccfac1d03e4
                                                        • Opcode Fuzzy Hash: 1a35c4ab6dce3baf8b5148636fef7374f6697dae909102b08545470e9d818853
                                                        • Instruction Fuzzy Hash: EB012C60B0AB8681EF685F2AA95813A52B5EF5DFC0B09A034EB1E07754DE2CE4448310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocErr_Stringmemcpy
                                                        • String ID: abstract class
                                                        • API String ID: 4155950771-1623945838
                                                        • Opcode ID: 39caa09f7d9a9fa5dd63c26db85cad3ebfb1af8ff0279c48b353af220d1a1222
                                                        • Instruction ID: 694c38d7c5678cb6963ba2ff940016f4e68624c393aac980fefb3f2832cdedcd
                                                        • Opcode Fuzzy Hash: 39caa09f7d9a9fa5dd63c26db85cad3ebfb1af8ff0279c48b353af220d1a1222
                                                        • Instruction Fuzzy Hash: 5E217732A09F8582EB948F2AA44012A73B4FB48FD4F1A6131DF4D43758CF38E4648300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Object_$Err_InstanceStringSubclass
                                                        • String ID: abstract class
                                                        • API String ID: 1122563627-1623945838
                                                        • Opcode ID: 6c7db8fb0eb44c7424908bf4032845ff0e9bfd72eafbca4c076b0be6399d20a6
                                                        • Instruction ID: 9209d0faec746eb965089c5e3f7dc941be9d251503915757046fa9fea8a402d1
                                                        • Opcode Fuzzy Hash: 6c7db8fb0eb44c7424908bf4032845ff0e9bfd72eafbca4c076b0be6399d20a6
                                                        • Instruction Fuzzy Hash: C5213D21A0CF8782FB50AF6EA86007A17B5EF4DFC4F04B531DB0E562A5DE2CE4598340
                                                        APIs
                                                          • Part of subcall function 00007FF8B93C3A00: __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF8B93C3A4B
                                                        • PyUnicode_FromStringAndSize.PYTHON311 ref: 00007FF8B93C4090
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: FromSizeStringUnicode___stdio_common_vsprintf
                                                        • String ID: :%x$ctypes object structure too deep
                                                        • API String ID: 1484205955-3091822184
                                                        • Opcode ID: 2459c21495d6783b8173aaa301187f361a2d8e91fe46e9680da2c72f9c63c0db
                                                        • Instruction ID: bb5ca9dbb24f09c2e8ebd5b8a93886b65ad121cf806e6444faf337b5c77e605b
                                                        • Opcode Fuzzy Hash: 2459c21495d6783b8173aaa301187f361a2d8e91fe46e9680da2c72f9c63c0db
                                                        • Instruction Fuzzy Hash: D9213B32618AC691EA70CF19E4502AA63A4FB8DBC0F846131DB8E47665DE3CE259CB00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: AuditErr_StringSys_
                                                        • String ID: abstract class$ctypes.cdata
                                                        • API String ID: 1384585920-3531133667
                                                        • Opcode ID: 9146581257e5cd249a8ce15bd5017c0ced05df42edf8eab21e35891fecd2194b
                                                        • Instruction ID: 603db8178f5d94a0445f8642d38a4dc1e0bf94e4852e3b28cbfeb0c23ca335f9
                                                        • Opcode Fuzzy Hash: 9146581257e5cd249a8ce15bd5017c0ced05df42edf8eab21e35891fecd2194b
                                                        • Instruction Fuzzy Hash: A7013921B19B8282EB548F6AE89017A7BA4FF8DFC4F49A035DB4D97724DF28D455C300
                                                        APIs
                                                        Strings
                                                        • bytes or integer address expected instead of %s instance, xrefs: 00007FF8B93C8AEB
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Long$Bytes_Long_MaskStringUnsigned
                                                        • String ID: bytes or integer address expected instead of %s instance
                                                        • API String ID: 3464282214-706233300
                                                        • Opcode ID: c48ceac9eea2b1fa827f2cbb00a6abdd9340ea2753a13b5f87d6d5264b647cc5
                                                        • Instruction ID: a9a7d704553ac28fa0f85cf50d261bf633100ac30996dc30f0732efcd7b92cd0
                                                        • Opcode Fuzzy Hash: c48ceac9eea2b1fa827f2cbb00a6abdd9340ea2753a13b5f87d6d5264b647cc5
                                                        • Instruction Fuzzy Hash: DB011776A09F8A86EB508F29E8902792375FF5DFD4F50A432CB4E42314CE3CE8998300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: AuditDeallocFromLongLong_Sys_
                                                        • String ID: ctypes.get_errno
                                                        • API String ID: 2276389247-2892954555
                                                        • Opcode ID: c6ace954750aef6584acdef0dbafe0f2db3ad2dcd629e74672a8309c43f57945
                                                        • Instruction ID: 798c72707f49cf7f77f05db5d961cbb165ce0b80b440995784af85cd7ee74203
                                                        • Opcode Fuzzy Hash: c6ace954750aef6584acdef0dbafe0f2db3ad2dcd629e74672a8309c43f57945
                                                        • Instruction Fuzzy Hash: CBF0A421F1ABC2C1EA549F2AE99417A62B5EF8DBC0F482034EB5E47764DF3CE4848700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_LongLong_MaskStringUnicode_Unsigned
                                                        • String ID: function name must be string, bytes object or integer
                                                        • API String ID: 2115587880-3177123413
                                                        • Opcode ID: 81ea3209a1b354214586730592f4c670ad1da60d41d4e62eb4eacb33d520f56b
                                                        • Instruction ID: 7c776ccbe6216f0c552d9a3e1501f1c940246f8a49c5c53ea01b93fc78d1bd98
                                                        • Opcode Fuzzy Hash: 81ea3209a1b354214586730592f4c670ad1da60d41d4e62eb4eacb33d520f56b
                                                        • Instruction Fuzzy Hash: B7018122B19F8681FB654F6EE8A967922A5EF4DBC4F05B030C64D87760EE2CA4498700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: AuditDeallocFromLongLong_Sys_
                                                        • String ID: ctypes.get_last_error
                                                        • API String ID: 2276389247-1232113872
                                                        • Opcode ID: 853979658a44e765c27009c70b8a62aa63505b1bac88553f7faa954c15010c56
                                                        • Instruction ID: 1256689a39b867c9edb1b1a30c1b3bab7eb54e8f6ae889f19a3d2df1c165aa73
                                                        • Opcode Fuzzy Hash: 853979658a44e765c27009c70b8a62aa63505b1bac88553f7faa954c15010c56
                                                        • Instruction Fuzzy Hash: 70F0A921F19BC281EB559F3AE99417962B5EF9DBC0F482034EB1E42754DF3CE1848700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Arg_AuditCallObject_ParseSys_Tuplememset
                                                        • String ID: O&O!$ctypes.call_function
                                                        • API String ID: 886791329-313584727
                                                        • Opcode ID: 956f25cfe963604cb9d4e30e000f0088442d622793c0436951a4906829bed983
                                                        • Instruction ID: c3b53d299b73e45bb74a4f77d5d2532bc8a8890221689e53b48c0dae80cab9a3
                                                        • Opcode Fuzzy Hash: 956f25cfe963604cb9d4e30e000f0088442d622793c0436951a4906829bed983
                                                        • Instruction Fuzzy Hash: 97015B76A18F8B82E7108F19E8947AA63A9FF4C7C4F402136EA4C06624DF3CE549CB00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Arg_AuditCallObject_ParseSys_Tuplememset
                                                        • String ID: O&O!$ctypes.call_function
                                                        • API String ID: 886791329-313584727
                                                        • Opcode ID: 17adec98670e9f6cdebf84fa662457cca95efbc4de64805adf32e68e07ce2538
                                                        • Instruction ID: 96a4a54be0dd6afafe9e4dec6530bbbffbfcc353813e5930ab585faf60731d5c
                                                        • Opcode Fuzzy Hash: 17adec98670e9f6cdebf84fa662457cca95efbc4de64805adf32e68e07ce2538
                                                        • Instruction Fuzzy Hash: 44015B76A18B8BC2EB108F19E4547AA63A9FF4C7C4F402136EA4D03624DF3CE149CB10
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocErr_String
                                                        • String ID: _type_ must be a type$_type_ must have storage info
                                                        • API String ID: 1259552197-214983684
                                                        • Opcode ID: f9c93959e9af95d6c9b4c14054f54ac853c0c588ad50044a4a2a3fec31618313
                                                        • Instruction ID: 8570ee1052b0b14adde19b31d0cdd1302e7b4cd5fb8e51d261aab397fcaf0a69
                                                        • Opcode Fuzzy Hash: f9c93959e9af95d6c9b4c14054f54ac853c0c588ad50044a4a2a3fec31618313
                                                        • Instruction Fuzzy Hash: B90112B5A09F8785EA559F5DD4901792274EF4EBD1F54A131DB1E523A0DF2CE4488301
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Callable_CheckDeallocErr_String
                                                        • String ID: the errcheck attribute must be callable
                                                        • API String ID: 3907376375-3049503998
                                                        • Opcode ID: 40a5e4c9387a9eacadc56f8a50b5cb35d6fcf5bb7bd3e5eec0ef331718cf67ff
                                                        • Instruction ID: fb09158defb6c5bf022805eb0ca6bd27ef0f1ab63d123b12c249111fd9f49f9d
                                                        • Opcode Fuzzy Hash: 40a5e4c9387a9eacadc56f8a50b5cb35d6fcf5bb7bd3e5eec0ef331718cf67ff
                                                        • Instruction Fuzzy Hash: BBF03121A08EC682EAA88F79F9541392374FF8DFD4F54A131CB5D46154DE2CD4998310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_String
                                                        • String ID: cannot be converted to pointer
                                                        • API String ID: 1450464846-3065012988
                                                        • Opcode ID: ba69f6be1e03f64db6319ffa1c479f40c92e1bf7f208d3a0c57e532b4c3c8d90
                                                        • Instruction ID: b72adbc1a434efc0c2f3beb57425ef7ff114346a15e5df5b4c3e14c24b4a6817
                                                        • Opcode Fuzzy Hash: ba69f6be1e03f64db6319ffa1c479f40c92e1bf7f208d3a0c57e532b4c3c8d90
                                                        • Instruction Fuzzy Hash: 2201FB65A09B8A95EA648F29E89433923B5EF8DFC4F14A031DB4D07764DE3CE8988700
                                                        APIs
                                                          • Part of subcall function 00007FF8B9F669C0: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF8B9F625CE), ref: 00007FF8B9F669CE
                                                        • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF8B9F6266E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: abortterminate
                                                        • String ID: MOC$RCC$csm
                                                        • API String ID: 661698970-2671469338
                                                        • Opcode ID: e63037d86fd6ed08c01758bd2d278b6a49b1453d2f75febe4acf0c3d16fc865e
                                                        • Instruction ID: c07a4af1920bb21b3e4b0952f264b371a07aaec64f1e857545359f02fd74057a
                                                        • Opcode Fuzzy Hash: e63037d86fd6ed08c01758bd2d278b6a49b1453d2f75febe4acf0c3d16fc865e
                                                        • Instruction Fuzzy Hash: C4F06232918787C1E7505FA9E1810AC3A74FF49BEAF09A171DB4846356CF3DD4A4CB41
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$Long_OccurredStringVoid
                                                        • String ID: integer expected
                                                        • API String ID: 1621529885-2140524511
                                                        • Opcode ID: 7b49f154c6c6e067b1201768131b658a8a7bf5851dad34e5bb971b0d47541ff1
                                                        • Instruction ID: bb44d136da7018642fad2ebbd4188433cfba938edb6e8f327f90dcf2fd0fe321
                                                        • Opcode Fuzzy Hash: 7b49f154c6c6e067b1201768131b658a8a7bf5851dad34e5bb971b0d47541ff1
                                                        • Instruction Fuzzy Hash: 14F01D29B08B8686EB549F59E5A423A6374EF4DFD0F05B030DB0E47355DE2CD4988700
                                                        APIs
                                                        Strings
                                                        • second item in _fields_ tuple (index %zd) must be a C type, xrefs: 00007FF8B93C817E
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocErr_FormatFreeMem_
                                                        • String ID: second item in _fields_ tuple (index %zd) must be a C type
                                                        • API String ID: 3237669406-2717732800
                                                        • Opcode ID: 6c5e0c61733740b2a0fd8058cc8b9152b4a417e0ab55625c6ded04eac5423bae
                                                        • Instruction ID: 30703729edae99e53a88fd135bd6dd9b31ef9ec27e16a909be231ddda061c656
                                                        • Opcode Fuzzy Hash: 6c5e0c61733740b2a0fd8058cc8b9152b4a417e0ab55625c6ded04eac5423bae
                                                        • Instruction Fuzzy Hash: A3E04C64A0DAC783EA649F6D98640382324EF8BFE5B502231DA1F526B0CE3CA54D9305
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: Name::operator+$NameName::
                                                        • String ID:
                                                        • API String ID: 168861036-0
                                                        • Opcode ID: 98efd56155e24b1ceec94087ea0ccb087ffd731ce7e45ec66b02000ff67e82c1
                                                        • Instruction ID: eecb87b0a9a861f1eb7d7de2050b45b27f6715aed0846886ceb40a9bb2836c3c
                                                        • Opcode Fuzzy Hash: 98efd56155e24b1ceec94087ea0ccb087ffd731ce7e45ec66b02000ff67e82c1
                                                        • Instruction Fuzzy Hash: 5F516C72A18B9689FB118F68D8417BC37A1BB45BAAF656031DB0E07795DF3DE440C710
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Mem_$DeallocFreeMallocmemcpy
                                                        • String ID:
                                                        • API String ID: 1346496523-0
                                                        • Opcode ID: 8c08fdf6c3f6743b583b35e04fc598e2fc29906b9b2b5698a8cb90300fdd1926
                                                        • Instruction ID: 788894b177ef7a1eba62427cdc434e99b47d613230dc8b59eed69e790c44915c
                                                        • Opcode Fuzzy Hash: 8c08fdf6c3f6743b583b35e04fc598e2fc29906b9b2b5698a8cb90300fdd1926
                                                        • Instruction Fuzzy Hash: 15210462A09F8282EA689F29A95013A22B4FF4CFD4B046535DB4D47754EF3CE8A5C340
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Descr_Dict_ItemString
                                                        • String ID:
                                                        • API String ID: 975051370-0
                                                        • Opcode ID: cbfa8e76cbb37faade4b4752a761ba53e7deef88f0e4638b9d9c9114bc06fd37
                                                        • Instruction ID: bea27afa9373d25e78f34bf7c2bb5b3239ad2e850b5e3a10876aadad3f0a8118
                                                        • Opcode Fuzzy Hash: cbfa8e76cbb37faade4b4752a761ba53e7deef88f0e4638b9d9c9114bc06fd37
                                                        • Instruction Fuzzy Hash: A3114F25A0DF8685EAA48F1AA95433A6274EF4EFD0F086130DF4E43755DF3CE4558305
                                                        APIs
                                                          • Part of subcall function 00007FF8B93C22B0: _PyObject_MakeTpCall.PYTHON311 ref: 00007FF8B93C2301
                                                        • PyWeakref_NewProxy.PYTHON311(?,?,00000000,00007FF8B93C156A), ref: 00007FF8B93C163E
                                                        • PyDict_SetItem.PYTHON311(?,?,00000000,00007FF8B93C156A), ref: 00007FF8B93C165F
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C156A), ref: 00007FF8B93C6A71
                                                        • _Py_Dealloc.PYTHON311(?,?,00000000,00007FF8B93C156A), ref: 00007FF8B93C6A80
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$CallDict_ItemMakeObject_ProxyWeakref_
                                                        • String ID:
                                                        • API String ID: 1512266493-0
                                                        • Opcode ID: edfa2a0c717579e9911386e870fa1321e468c4d2dd0d8facd930d0c933b2ac38
                                                        • Instruction ID: 41be39a208615152380a94ee735dd847eacd4d14ab77ee6e86406d535379a034
                                                        • Opcode Fuzzy Hash: edfa2a0c717579e9911386e870fa1321e468c4d2dd0d8facd930d0c933b2ac38
                                                        • Instruction Fuzzy Hash: 9C114F22A09FC285EA545F29A85007A63B8FF4EFD0B1CA131EF5E07795CE3CE5658340
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dealloc$Object_Track
                                                        • String ID:
                                                        • API String ID: 887704541-0
                                                        • Opcode ID: 3d42f6f96641afa8e40a9b95133215a649903610cae807ab0b9964238f53290f
                                                        • Instruction ID: 94b8384101fef544708e5a2317faa25e0947806889492f02e1da56d60489881a
                                                        • Opcode Fuzzy Hash: 3d42f6f96641afa8e40a9b95133215a649903610cae807ab0b9964238f53290f
                                                        • Instruction Fuzzy Hash: 0D01FF35E0AF86D0FEAA8F79986453A2378EF8EFA5F186530CB4D42650CF2DE4458340
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: State_$EnsureInitializeInitializedRelease
                                                        • String ID:
                                                        • API String ID: 2621580956-0
                                                        • Opcode ID: 228736a826a5a1ff67be1b297f58c8bae0a48c2954096bea5476443be523e544
                                                        • Instruction ID: 11373ba39eb6cb8b2b0d440be810b03dc53651a71979fe1d79075fea44cb1506
                                                        • Opcode Fuzzy Hash: 228736a826a5a1ff67be1b297f58c8bae0a48c2954096bea5476443be523e544
                                                        • Instruction Fuzzy Hash: F2F03A21B08BC182EB509F6AB85446AA274FF9DFC0F586434EB4983716DE3CD8958B00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: abort$CreateFrameInfo
                                                        • String ID: csm
                                                        • API String ID: 2697087660-1018135373
                                                        • Opcode ID: 5e4671b1cbff3658d511699c3cf653202505efa909c7ec854f7fa1af4338784c
                                                        • Instruction ID: a0536901a393f4a74ef010bfcbaf808635bb26e1559b0e9eb24cf150a92019e9
                                                        • Opcode Fuzzy Hash: 5e4671b1cbff3658d511699c3cf653202505efa909c7ec854f7fa1af4338784c
                                                        • Instruction Fuzzy Hash: 1E512872A1878186E720AF1AE04026E77B4FB89BE2F102539DF8D47B55DF38E464CB40
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: Name::operator+
                                                        • String ID: void$void
                                                        • API String ID: 2943138195-3746155364
                                                        • Opcode ID: 7dcf970a61f58172c3a4f39e178d28c376ed2dbead67cac1058dce2bd18ce07b
                                                        • Instruction ID: f2b821ff7fbe8bd1475b0310c9452fb0714e28b1ba36097a8efd452293eebcc9
                                                        • Opcode Fuzzy Hash: 7dcf970a61f58172c3a4f39e178d28c376ed2dbead67cac1058dce2bd18ce07b
                                                        • Instruction Fuzzy Hash: 6831F662E18B9998FB01CFA8E8410FC37B0FB48799B445536EB4E56B59DF3C9144C750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocErr_String
                                                        • String ID: abstract class
                                                        • API String ID: 1259552197-1623945838
                                                        • Opcode ID: 889cc83bd7e42d210c141f1a36b7b4f58b9fb1ebab554f935c723b1e3cc6fbc7
                                                        • Instruction ID: b1030e7522d5138085fc03bad9295d96dfe5ec7beae5b7ce0abf841a09be8927
                                                        • Opcode Fuzzy Hash: 889cc83bd7e42d210c141f1a36b7b4f58b9fb1ebab554f935c723b1e3cc6fbc7
                                                        • Instruction Fuzzy Hash: 0B113022A09F8682EA649F2DA49477A63B4EF8EBD1F146134CB0E56391DF3CE4488300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_FormatLongLong_
                                                        • String ID: one character bytes, bytearray or integer expected
                                                        • API String ID: 832222675-2748977362
                                                        • Opcode ID: 4171aea13ba1fa0aee4d8e851ffe7b5e382af772fa60775af7b968a914772540
                                                        • Instruction ID: be572131cea00c3babb5594d822a48ffa16e6b8e297549a5a95dad373edeead9
                                                        • Opcode Fuzzy Hash: 4171aea13ba1fa0aee4d8e851ffe7b5e382af772fa60775af7b968a914772540
                                                        • Instruction Fuzzy Hash: A0111C62A08BC685EB658F2DD45417A2BB4EF4EFC4F186031DB4D47255CE2CE8A8C301
                                                        APIs
                                                        • PyErr_SetString.PYTHON311 ref: 00007FF8B93CA185
                                                          • Part of subcall function 00007FF8B93CAA7C: PyErr_SetString.PYTHON311(?,?,?,?,00007FF8B93C947D,?), ref: 00007FF8B93CAABD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_String
                                                        • String ID: NULL pointer access$Pointer does not support item deletion
                                                        • API String ID: 1450464846-1262937747
                                                        • Opcode ID: cc63e7bd2d2a3bc22265ebdaaeb10ee6e24a6e51b4ebc2f3b89706aefd929760
                                                        • Instruction ID: 77e1079486600dfbe8246f086516a8b5e73a71d4ba4fbeb40a3b8eb7460ee462
                                                        • Opcode Fuzzy Hash: cc63e7bd2d2a3bc22265ebdaaeb10ee6e24a6e51b4ebc2f3b89706aefd929760
                                                        • Instruction Fuzzy Hash: 6E013961A08B8681EA549F5AA8904BA2368BF8AFD4F116132EE4D977A5CE3CD554C300
                                                        APIs
                                                          • Part of subcall function 00007FF8B93CEA24: PyType_IsSubtype.PYTHON311(?,?,?,?,00007FF8B93CE889), ref: 00007FF8B93CEA31
                                                        • PyErr_SetString.PYTHON311 ref: 00007FF8B93CE9C8
                                                          • Part of subcall function 00007FF8B93CAA7C: PyErr_SetString.PYTHON311(?,?,?,?,00007FF8B93C947D,?), ref: 00007FF8B93CAABD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_String$SubtypeType_
                                                        • String ID: can't delete attribute$not a ctype instance
                                                        • API String ID: 3320257282-2740123057
                                                        • Opcode ID: 18fbc3005ffdff5a035a76096331e82b7bdea77d6c35e831de142f80868fa9ec
                                                        • Instruction ID: c08fd5fd9d6539c87d98c96dc8cf11231822ac2b214f198cffc02d3eab865635
                                                        • Opcode Fuzzy Hash: 18fbc3005ffdff5a035a76096331e82b7bdea77d6c35e831de142f80868fa9ec
                                                        • Instruction Fuzzy Hash: FB112765A08F8181EB60CF1AE44006A67B4FF4CFE4B106132EF9D53BA8DF2CE9648700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_ItemSequence_String
                                                        • String ID: args not a tuple?
                                                        • API String ID: 138718260-274370407
                                                        • Opcode ID: f981f7e703dfeb18ac4443360c7dfc39ae4566ed3aa42caf66e0419349738e14
                                                        • Instruction ID: d456f236ec457976eceeaf0eb34810235da2dec34bdda123cab9a88f4cdffdc9
                                                        • Opcode Fuzzy Hash: f981f7e703dfeb18ac4443360c7dfc39ae4566ed3aa42caf66e0419349738e14
                                                        • Instruction Fuzzy Hash: AC018C21B08F8285E6508F19E45006A6360FB49FE0F59A231EB6D577A5CF28D5A5C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_String
                                                        • String ID: Array does not support item deletion$invalid index
                                                        • API String ID: 1450464846-799983634
                                                        • Opcode ID: 67e0225e1662b2c6de7c64aa0e1a7725335fd733c618b52c26417df970fd658a
                                                        • Instruction ID: e5b50d4de38ff199332783f7a8680cd13f94c987ff1c8b92d0ef8d0b84add6ee
                                                        • Opcode Fuzzy Hash: 67e0225e1662b2c6de7c64aa0e1a7725335fd733c618b52c26417df970fd658a
                                                        • Instruction Fuzzy Hash: E1014C61A08F8A91DA50DF4AE86087A2378FF99BC0F422172EB4D53361DF2DD518C300
                                                        APIs
                                                        • PyErr_SetString.PYTHON311(?,?,?,00007FF8B93C1959), ref: 00007FF8B93C8EE9
                                                          • Part of subcall function 00007FF8B93C3DC0: _PyObject_New.PYTHON311(?,?,?,?,00007FF8B93C46A2,?,?,?,00007FF8B93C1959), ref: 00007FF8B93C3DCB
                                                        • _Py_Dealloc.PYTHON311(?,?,?,00007FF8B93C1959), ref: 00007FF8B93C8EF4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: DeallocErr_Object_String
                                                        • String ID: expected CData instance
                                                        • API String ID: 3982460303-1581534645
                                                        • Opcode ID: cb84d01ecd15a1eda4d8d1b175decd3e5ebb0d94a1c0848139c17e093e1ac344
                                                        • Instruction ID: e0c6afe564a41d5c210b32deaa12645ab727e76b70a8eb3abd0fa321c8850fec
                                                        • Opcode Fuzzy Hash: cb84d01ecd15a1eda4d8d1b175decd3e5ebb0d94a1c0848139c17e093e1ac344
                                                        • Instruction Fuzzy Hash: 7B012861A09F8A91EA649F2DA85413A23B4AF4DBC4F142430CA1E46760DF3CE1598314
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: AttrEqualGenericObject_StringUnicode_
                                                        • String ID: _fields_
                                                        • API String ID: 947992268-3196300388
                                                        • Opcode ID: c6dedb99678c499afd6badd1b017026620a4ab54dad84f9f25f416736ac5017a
                                                        • Instruction ID: f56bf529a91084209d612fb159a0f06116c17d6281b4a678dc73837befefdfb1
                                                        • Opcode Fuzzy Hash: c6dedb99678c499afd6badd1b017026620a4ab54dad84f9f25f416736ac5017a
                                                        • Instruction Fuzzy Hash: 56F0F421B1CBC641EB509F3EA54426B5674EF4DFD0F58A130DB5E46698CE2CE599C700
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Dict_Err_ItemString
                                                        • String ID: abstract class
                                                        • API String ID: 960913676-1623945838
                                                        • Opcode ID: 152bc656983328e65481e0599e2526a4dd7c8e873d35052210cfab64f93eb631
                                                        • Instruction ID: b87d2033201f55771ad64fa83c728bee8894f1a19f0d677460f0f8e28b6b635f
                                                        • Opcode Fuzzy Hash: 152bc656983328e65481e0599e2526a4dd7c8e873d35052210cfab64f93eb631
                                                        • Instruction Fuzzy Hash: 24F0F450A08B8A81EA649F7EF8940791374EF4EBD4B547131DB1E467A5DE2CD499C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: AuditBytes_FromSizeStringSys_
                                                        • String ID: ctypes.string_at
                                                        • API String ID: 1783689829-1910480597
                                                        • Opcode ID: ad0ccf7f71804dd0e038b4a23bae58c0fa799e11b1e17efbe4fa3c6d44ce38ba
                                                        • Instruction ID: e112523ac95339db7d0094095fed792cf12831c30c6e313323a23d376bed33a4
                                                        • Opcode Fuzzy Hash: ad0ccf7f71804dd0e038b4a23bae58c0fa799e11b1e17efbe4fa3c6d44ce38ba
                                                        • Instruction Fuzzy Hash: 2AF030A1B08AC691EB604F29B9511792665AF5DBE4F187731DA3E465D4DE1CD0889300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: AuditCharFromSys_Unicode_Wide
                                                        • String ID: ctypes.wstring_at
                                                        • API String ID: 614261396-2169766756
                                                        • Opcode ID: c82b687e7251797f6e5b90717e26ccc800462a1ff5413f444b11774fb9a74885
                                                        • Instruction ID: 1b704576026390e2e003febfa1ada75e8ec14ec5e2c041ac316f3d6cf2ea40f5
                                                        • Opcode Fuzzy Hash: c82b687e7251797f6e5b90717e26ccc800462a1ff5413f444b11774fb9a74885
                                                        • Instruction Fuzzy Hash: 0FF0E960B18A8291EE200F29F9A10B96260AF0DBF4F487731DB3E861E0DD6CD0448300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: FromLong_Ssize_t
                                                        • String ID: this type has no size
                                                        • API String ID: 168540982-982649334
                                                        • Opcode ID: 6f14cdcc885872a6a1df23694bcedff85d145f2805944da9bd946685c2c050ae
                                                        • Instruction ID: 98f595dc110e51370d40f5cce550baa95247c6da967b8808d58e0bdbd76d544c
                                                        • Opcode Fuzzy Hash: 6f14cdcc885872a6a1df23694bcedff85d145f2805944da9bd946685c2c050ae
                                                        • Instruction Fuzzy Hash: 23F0AC91B19A8792EB649F6A99A107A23749F8DFC4F153031DF0E8A265DE2CE4888354
                                                        APIs
                                                          • Part of subcall function 00007FF8B9F6F050: _IsNonwritableInCurrentImage.LIBCMT ref: 00007FF8B9F6F110
                                                          • Part of subcall function 00007FF8B9F6F050: RtlUnwindEx.KERNEL32(?,?,?,?,?,?,?,00007FF8B9F6EE15), ref: 00007FF8B9F6F15F
                                                          • Part of subcall function 00007FF8B9F669C0: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF8B9F625CE), ref: 00007FF8B9F669CE
                                                        • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF8B9F6EE3A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: CurrentImageNonwritableUnwindabortterminate
                                                        • String ID: csm$f
                                                        • API String ID: 4189928240-629598281
                                                        • Opcode ID: 41dc89b1ce5f079b65ce2aaee024a8a434243f0f20765bf48ba2e403aae6c5bc
                                                        • Instruction ID: 1f2a757dade356547fee75c717728de517120dda1691d4a15e8509c4fe004554
                                                        • Opcode Fuzzy Hash: 41dc89b1ce5f079b65ce2aaee024a8a434243f0f20765bf48ba2e403aae6c5bc
                                                        • Instruction Fuzzy Hash: 75E030629087C281EB206FA5E18513D2AA5AF16BE5F19A034DB8806746CF3DD4B8C741
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: PrintableUnicode_
                                                        • String ID: '$\
                                                        • API String ID: 1291510985-1366717710
                                                        • Opcode ID: 8f056e593a683e8d15de34f78a6f47cb157d5505191b12e7d535d23602ebe9e6
                                                        • Instruction ID: 199893741143d3bac8e85d26f4c0b519de14f0ab57857f32e7a5b23386fb2ace
                                                        • Opcode Fuzzy Hash: 8f056e593a683e8d15de34f78a6f47cb157d5505191b12e7d535d23602ebe9e6
                                                        • Instruction Fuzzy Hash: 54E08621F18F8746FB742E3DB88427612A25B9D7E0F4E3131EB69052D9CD2CE8C95714
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: FormatFromUnicode_
                                                        • String ID: <Field type=%s, ofs=%zd, size=%zd>$<Field type=%s, ofs=%zd:%zd, bits=%zd>
                                                        • API String ID: 3889672380-2914491812
                                                        • Opcode ID: 08e4dafb61acecda0dd77ce9d4e7f7947246ca23280beaed436fd91f997484e9
                                                        • Instruction ID: 7c17523821f52ce358345d361c81e9415449897088d4bcc6ac058fc47f943bfe
                                                        • Opcode Fuzzy Hash: 08e4dafb61acecda0dd77ce9d4e7f7947246ca23280beaed436fd91f997484e9
                                                        • Instruction Fuzzy Hash: F5E0E566A04A85C2DB648F0DD8504693725FF5AF98BA52166CB4C03370CF38D9AAD790
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Err_$OccurredString
                                                        • String ID: PyObject is NULL
                                                        • API String ID: 114435612-3221357749
                                                        • Opcode ID: 2e5002b93a88984c719b4076089918ef8885b05004490f6185a51e22d0327163
                                                        • Instruction ID: dee4d33f690824c84ee76b6ccd5a558ba32d887ada3faf7049cc5621677d67dc
                                                        • Opcode Fuzzy Hash: 2e5002b93a88984c719b4076089918ef8885b05004490f6185a51e22d0327163
                                                        • Instruction Fuzzy Hash: 5EE04F20A0AA8791EE504F2DD85003923B0BF4DFC4F546439C70E06320DE2CE0498300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Capsule_FreeMem_Pointer
                                                        • String ID: _ctypes pymem
                                                        • API String ID: 1268649101-201515578
                                                        • Opcode ID: 62ef90d10503a54e82f353289ff9a1ab72bad7d0f7bb64e3368930f79f513158
                                                        • Instruction ID: 624fd62250bed94796bc830e0088998aa3da75ee9dc110c467860fcad605951b
                                                        • Opcode Fuzzy Hash: 62ef90d10503a54e82f353289ff9a1ab72bad7d0f7bb64e3368930f79f513158
                                                        • Instruction Fuzzy Hash: 78C01210E0A7C682ED586F59AC940301364AF0DF85F842034C70D01220DE2C6059C300
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088129467.00007FF8B93C1000.00000020.00000001.01000000.0000000F.sdmp, Offset: 00007FF8B93C0000, based on PE: true
                                                        • Associated: 00000007.00000002.2088094009.00007FF8B93C0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088170487.00007FF8B93D0000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088209313.00007FF8B93D7000.00000004.00000001.01000000.0000000F.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088245631.00007FF8B93DB000.00000002.00000001.01000000.0000000F.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b93c0000_lib.jbxd
                                                        Similarity
                                                        • API ID: Capsule_FreeMem_Pointer
                                                        • String ID: _ctypes/cfield.c pymem
                                                        • API String ID: 1268649101-2578739719
                                                        • Opcode ID: 13f5c1952ace5f4f8c9f181e4b2ebf5f0c2b934a391285e14cb501e27f568ab5
                                                        • Instruction ID: 26c689de29b9206359dfbf852ecd39bd23cd031e89b73cf7e79dbb9ff9f181cd
                                                        • Opcode Fuzzy Hash: 13f5c1952ace5f4f8c9f181e4b2ebf5f0c2b934a391285e14cb501e27f568ab5
                                                        • Instruction Fuzzy Hash: ECC01210E0E78692ED585F59A85413413659F0DF84F942074C60D05220DE6C65998300
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,00007FF8B9F66859,?,?,?,?,00007FF8B9F6FF42,?,?,?,?,?), ref: 00007FF8B9F669FB
                                                        • SetLastError.KERNEL32(?,?,?,00007FF8B9F66859,?,?,?,?,00007FF8B9F6FF42,?,?,?,?,?), ref: 00007FF8B9F66A84
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2088453756.00007FF8B9F61000.00000020.00000001.01000000.0000000E.sdmp, Offset: 00007FF8B9F60000, based on PE: true
                                                        • Associated: 00000007.00000002.2088414184.00007FF8B9F60000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088510059.00007FF8B9F71000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088589734.00007FF8B9F76000.00000004.00000001.01000000.0000000E.sdmpDownload File
                                                        • Associated: 00000007.00000002.2088624293.00007FF8B9F77000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8b9f60000_lib.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast
                                                        • String ID:
                                                        • API String ID: 1452528299-0
                                                        • Opcode ID: bbe9895d534b658101cce7e74ca5bd95b80ee12bf15f37732e53d0ee5c009e2b
                                                        • Instruction ID: 6b73819ffcf9f3d9335c1f5c17b3be44fb95b21d629e69d6decf4ccf6fad0997
                                                        • Opcode Fuzzy Hash: bbe9895d534b658101cce7e74ca5bd95b80ee12bf15f37732e53d0ee5c009e2b
                                                        • Instruction Fuzzy Hash: 34110020F097C282FA549FA9E84413526A5BF49BF2F189638DB6E077D9DE2CB841C600