Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2a2d6bO44t.exe

Overview

General Information

Sample name:2a2d6bO44t.exe
renamed because original name is a hash value
Original sample name:f6fb58ffdb5677fab17b5a8195c8d09b.exe
Analysis ID:1545081
MD5:f6fb58ffdb5677fab17b5a8195c8d09b
SHA1:59b4a727b2899edc54586221cea97db5bbed0ba1
SHA256:401c641ff4f1215cf2b3624d13d0169dfa8848306f636d46d70f1733249c8461
Tags:64exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 2a2d6bO44t.exe (PID: 824 cmdline: "C:\Users\user\Desktop\2a2d6bO44t.exe" MD5: F6FB58FFDB5677FAB17B5A8195C8D09B)
    • 2a2d6bO44t.exe (PID: 5772 cmdline: "C:\Users\user\Desktop\2a2d6bO44t.exe" MD5: F6FB58FFDB5677FAB17B5A8195C8D09B)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 2a2d6bO44t.exeReversingLabs: Detection: 21%
Source: 2a2d6bO44t.exeVirustotal: Detection: 22%Perma Link
Source: 2a2d6bO44t.exeJoe Sandbox ML: detected
Source: 2a2d6bO44t.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672930717.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-locale-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673147081.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-runtime-l1-1-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_lzma.pdbMM source: 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.0.dr
Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670611686.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_socket.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, _socket.pyd.0.dr
Source: Binary string: ucrtbase.pdb source: 2a2d6bO44t.exe, 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmp, ucrtbase.dll.0.dr
Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671598773.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-memory-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670395383.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-debug-l1-1-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_hashlib.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, _hashlib.pyd.0.dr
Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672336146.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-sysinfo-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672775643.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-filesystem-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673221557.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-stdio-l1-1-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_ctypes.pdb source: 2a2d6bO44t.exe, 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmp, _ctypes.pyd.0.dr
Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670815928.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-heap-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672479512.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-util-l1-1-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_bz2.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, _bz2.pyd.0.dr
Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672183830.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-synch-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672705433.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-environment-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670468290.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-errorhandling-l1-1-0.dll.0.dr
Source: Binary string: vcruntime140.amd64.pdbGCTL source: 2a2d6bO44t.exe, 00000000.00000003.1669564233.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671825906.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-processthreads-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670255248.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-console-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670538040.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672633384.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-convert-l1-1-0.dll.0.dr
Source: Binary string: .PdB] source: 2a2d6bO44t.exe
Source: Binary string: C:\A\21\b\bin\amd64\select.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr
Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671973807.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-profile-l1-1-0.dll.0.dr
Source: Binary string: ucrtbase.pdbUGP source: 2a2d6bO44t.exe, 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmp, ucrtbase.dll.0.dr
Source: Binary string: vcruntime140.amd64.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1669564233.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673375428.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-time-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670746800.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-handle-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672262157.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-synch-l1-2-0.dll.0.dr
Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671748664.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-processenvironment-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670325436.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-datetime-l1-1-0.dll.0.dr
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1d 10 Sep 2019built on: Mon Sep 16 11:00:37 2019 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: libcrypto-1_1.dll.0.dr
Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672552114.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-conio-l1-1-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\python38.pdb source: 2a2d6bO44t.exe, 00000001.00000002.1683096527.00007FFDFB76D000.00000002.00000001.01000000.00000005.sdmp, python38.dll.0.dr
Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671516198.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-localization-l1-2-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_lzma.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.0.dr
Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673005619.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-math-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671900470.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-processthreads-l1-1-1.dll.0.dr
Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671672682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-namedpipe-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673449028.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-utility-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672043673.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-rtlsupport-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672407613.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-timezone-l1-1-0.dll.0.dr
Source: Binary string: C:\A\6\b\libcrypto-1_1.pdb source: libcrypto-1_1.dll.0.dr
Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672114499.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670679390.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l2-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673073194.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-process-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671442800.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-libraryloader-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670919441.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-interlocked-l1-1-0.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: libcrypto-1_1.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\unicodedata.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A4687A000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.0.dr
Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672854900.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-heap-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673298942.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-string-l1-1-0.dll.0.dr
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F685A0 FindFirstFileExW,FindClose,0_2_00007FF733F685A0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F679B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF733F679B0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F80B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF733F80B84
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F685A0 FindFirstFileExW,FindClose,1_2_00007FF733F685A0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F679B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF733F679B0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F80B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF733F80B84
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013F3280 FindFirstFileExW,FindNextFileW,FindClose,1_2_00007FFE013F3280
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013F303C FindFirstFileExW,FindNextFileW,FindClose,1_2_00007FFE013F303C
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A4687A000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A4687A000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: 2a2d6bO44t.exe, 00000000.00000003.1669564233.0000024A46870000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
Source: 2a2d6bO44t.exe, 00000000.00000003.1669564233.0000024A46870000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micG
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.dr, libffi-7.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A4687A000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A4687A000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A4687A000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A4687A000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A4687A000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A4687A000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.drString found in binary or memory: http://ocsp.digicert.com0N
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.dr, libffi-7.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: python38.dll.0.drString found in binary or memory: http://python.org/dev/peps/pep-0263/
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.dr, libffi-7.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.dr, libffi-7.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.dr, libffi-7.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: 2a2d6bO44t.exe, 00000000.00000003.1673602870.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, base_library.zip.0.drString found in binary or memory: http://www.python.org/dev/peps/pep-0205/
Source: 2a2d6bO44t.exe, 00000001.00000002.1682041958.00000121382E0000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drString found in binary or memory: http://www.python.org/download/releases/2.3/mro/.
Source: 2a2d6bO44t.exe, 00000001.00000003.1680328487.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680685111.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680735796.0000012136404000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000002.1681149635.0000012136407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
Source: 2a2d6bO44t.exe, 00000001.00000002.1681414736.0000012137C40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
Source: 2a2d6bO44t.exe, 00000001.00000002.1681149635.0000012136407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
Source: 2a2d6bO44t.exe, 00000001.00000003.1680328487.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680685111.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680735796.0000012136404000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000002.1681149635.0000012136407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
Source: 2a2d6bO44t.exe, 00000001.00000003.1680328487.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680685111.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680735796.0000012136404000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000002.1681149635.0000012136407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
Source: 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A4687A000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A4687D000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: libcrypto-1_1.dll.0.drString found in binary or memory: https://www.openssl.org/H
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F610000_2_00007FF733F61000
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F7FBD80_2_00007FF733F7FBD8
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F85C740_2_00007FF733F85C74
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F7CD6C0_2_00007FF733F7CD6C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F695FB0_2_00007FF733F695FB
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F70E700_2_00007FF733F70E70
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F84F100_2_00007FF733F84F10
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F82F200_2_00007FF733F82F20
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F857280_2_00007FF733F85728
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F7FBD80_2_00007FF733F7FBD8
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F71F300_2_00007FF733F71F30
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F6979B0_2_00007FF733F6979B
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F69FCD0_2_00007FF733F69FCD
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F750400_2_00007FF733F75040
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F710740_2_00007FF733F71074
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F7D8800_2_00007FF733F7D880
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F728C00_2_00007FF733F728C0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F8518C0_2_00007FF733F8518C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F791B00_2_00007FF733F791B0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F7D2000_2_00007FF733F7D200
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F88A380_2_00007FF733F88A38
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F70A600_2_00007FF733F70A60
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F712800_2_00007FF733F71280
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F77AAC0_2_00007FF733F77AAC
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F68B200_2_00007FF733F68B20
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F80B840_2_00007FF733F80B84
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F833BC0_2_00007FF733F833BC
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F773F40_2_00007FF733F773F4
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F70C640_2_00007FF733F70C64
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F714840_2_00007FF733F71484
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F72CC40_2_00007FF733F72CC4
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F695FB1_2_00007FF733F695FB
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F84F101_2_00007FF733F84F10
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F610001_2_00007FF733F61000
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F85C741_2_00007FF733F85C74
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F7CD6C1_2_00007FF733F7CD6C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F70E701_2_00007FF733F70E70
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F82F201_2_00007FF733F82F20
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F857281_2_00007FF733F85728
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F7FBD81_2_00007FF733F7FBD8
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F71F301_2_00007FF733F71F30
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F6979B1_2_00007FF733F6979B
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F69FCD1_2_00007FF733F69FCD
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F750401_2_00007FF733F75040
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F710741_2_00007FF733F71074
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F7D8801_2_00007FF733F7D880
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F728C01_2_00007FF733F728C0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F8518C1_2_00007FF733F8518C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F791B01_2_00007FF733F791B0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F7D2001_2_00007FF733F7D200
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F88A381_2_00007FF733F88A38
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F70A601_2_00007FF733F70A60
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F712801_2_00007FF733F71280
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F77AAC1_2_00007FF733F77AAC
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F68B201_2_00007FF733F68B20
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F80B841_2_00007FF733F80B84
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F833BC1_2_00007FF733F833BC
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F7FBD81_2_00007FF733F7FBD8
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F773F41_2_00007FF733F773F4
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F70C641_2_00007FF733F70C64
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F714841_2_00007FF733F71484
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F72CC41_2_00007FF733F72CC4
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013A12001_2_00007FFE013A1200
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE014100BC1_2_00007FFE014100BC
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE0139D1201_2_00007FFE0139D120
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013A23841_2_00007FFE013A2384
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE0138C3601_2_00007FFE0138C360
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013AC4291_2_00007FFE013AC429
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013832741_2_00007FFE01383274
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013903001_2_00007FFE01390300
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013883101_2_00007FFE01388310
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE0138233C1_2_00007FFE0138233C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013A62D01_2_00007FFE013A62D0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE0139F5A41_2_00007FFE0139F5A4
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE0138F5201_2_00007FFE0138F520
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013C27401_2_00007FFE013C2740
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013916D01_2_00007FFE013916D0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013826F81_2_00007FFE013826F8
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013928B01_2_00007FFE013928B0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013888541_2_00007FFE01388854
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE01385B5C1_2_00007FFE01385B5C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE0138FBE01_2_00007FFE0138FBE0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013E7BFC1_2_00007FFE013E7BFC
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013F2A681_2_00007FFE013F2A68
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE0139DAC01_2_00007FFE0139DAC0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013B0E151_2_00007FFE013B0E15
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE01428DF81_2_00007FFE01428DF8
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013F2C481_2_00007FFE013F2C48
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE01382FA01_2_00007FFE01382FA0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE0138FF601_2_00007FFE0138FF60
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013AF0001_2_00007FFE013AF000
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE0138D0301_2_00007FFE0138D030
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE01425E641_2_00007FFE01425E64
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE13336AE41_2_00007FFE13336AE4
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE13332DD01_2_00007FFE13332DD0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE148E3CF01_2_00007FFE148E3CF0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE148E2D301_2_00007FFE148E2D30
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE148E1A801_2_00007FFE148E1A80
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE148E1A801_2_00007FFE148E1A80
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE148E521C1_2_00007FFE148E521C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE148E26301_2_00007FFE148E2630
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE148E31401_2_00007FFE148E3140
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE148E37B01_2_00007FFE148E37B0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE1A45D1301_2_00007FFE1A45D130
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE1A4571CC1_2_00007FFE1A4571CC
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: String function: 00007FF733F625F0 appears 100 times
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: String function: 00007FF733F62760 appears 36 times
Source: api-ms-win-core-processenvironment-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-interlocked-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-util-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-stdio-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-processthreads-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-errorhandling-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-console-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-process-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-synch-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-timezone-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-file-l2-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-debug-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-string-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-handle-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-synch-l1-2-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-profile-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-localization-l1-2-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-datetime-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-math-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-locale-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-time-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-processthreads-l1-1-1.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-utility-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-namedpipe-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-filesystem-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-file-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-rtlsupport-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-conio-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-heap-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-convert-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-runtime-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-string-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-file-l1-2-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-memory-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-sysinfo-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-libraryloader-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-core-heap-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: api-ms-win-crt-environment-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
Source: 2a2d6bO44t.exe, 00000000.00000003.1673073194.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672262157.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1673298942.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672183830.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1669564233.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dll^ vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1671516198.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1673221557.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670468290.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672479512.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1671672682.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepython38.dll. vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ctypes.pyd. vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670611686.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670395383.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1671598773.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670325436.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1673375428.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670538040.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672705433.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670679390.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672336146.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672930717.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1671748664.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670255248.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672043673.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670919441.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1671973807.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1671900470.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ha vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1673005619.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670746800.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672552114.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672633384.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1673147081.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672114499.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1673449028.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1670815928.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1671825906.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672407613.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1671442800.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672854900.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1677147397.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000000.00000003.1672775643.0000024A46870000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exeBinary or memory string: OriginalFilename vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000001.00000003.1679503987.00000121363F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilename_ctypes.pyd. vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000001.00000003.1679383310.00000121363F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000001.00000002.1683579117.00007FFDFB87F000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamepython38.dll. vs 2a2d6bO44t.exe
Source: 2a2d6bO44t.exe, 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenamevcruntime140.dll^ vs 2a2d6bO44t.exe
Source: classification engineClassification label: mal52.winEXE@3/51@0/0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F629E0 GetLastError,FormatMessageW,MessageBoxW,0_2_00007FF733F629E0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242Jump to behavior
Source: 2a2d6bO44t.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\2a2d6bO44t.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 2a2d6bO44t.exeReversingLabs: Detection: 21%
Source: 2a2d6bO44t.exeVirustotal: Detection: 22%
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile read: C:\Users\user\Desktop\2a2d6bO44t.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\2a2d6bO44t.exe "C:\Users\user\Desktop\2a2d6bO44t.exe"
Source: C:\Users\user\Desktop\2a2d6bO44t.exeProcess created: C:\Users\user\Desktop\2a2d6bO44t.exe "C:\Users\user\Desktop\2a2d6bO44t.exe"
Source: C:\Users\user\Desktop\2a2d6bO44t.exeProcess created: C:\Users\user\Desktop\2a2d6bO44t.exe "C:\Users\user\Desktop\2a2d6bO44t.exe"Jump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeSection loaded: libffi-7.dllJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile opened: C:\Users\user\Desktop\pyvenv.cfgJump to behavior
Source: 2a2d6bO44t.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 2a2d6bO44t.exeStatic file information: File size 5915953 > 1048576
Source: 2a2d6bO44t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 2a2d6bO44t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 2a2d6bO44t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 2a2d6bO44t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 2a2d6bO44t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 2a2d6bO44t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 2a2d6bO44t.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: 2a2d6bO44t.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672930717.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-locale-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673147081.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-runtime-l1-1-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_lzma.pdbMM source: 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.0.dr
Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670611686.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-2-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_socket.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, _socket.pyd.0.dr
Source: Binary string: ucrtbase.pdb source: 2a2d6bO44t.exe, 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmp, ucrtbase.dll.0.dr
Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671598773.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-memory-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670395383.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-debug-l1-1-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_hashlib.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, _hashlib.pyd.0.dr
Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672336146.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-sysinfo-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672775643.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-filesystem-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673221557.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-stdio-l1-1-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_ctypes.pdb source: 2a2d6bO44t.exe, 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmp, _ctypes.pyd.0.dr
Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670815928.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-heap-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672479512.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-util-l1-1-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_bz2.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, _bz2.pyd.0.dr
Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672183830.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-synch-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672705433.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-environment-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670468290.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-errorhandling-l1-1-0.dll.0.dr
Source: Binary string: vcruntime140.amd64.pdbGCTL source: 2a2d6bO44t.exe, 00000000.00000003.1669564233.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671825906.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-processthreads-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670255248.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-console-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670538040.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672633384.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-convert-l1-1-0.dll.0.dr
Source: Binary string: .PdB] source: 2a2d6bO44t.exe
Source: Binary string: C:\A\21\b\bin\amd64\select.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, select.pyd.0.dr
Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671973807.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-profile-l1-1-0.dll.0.dr
Source: Binary string: ucrtbase.pdbUGP source: 2a2d6bO44t.exe, 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmp, ucrtbase.dll.0.dr
Source: Binary string: vcruntime140.amd64.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1669564233.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmp, VCRUNTIME140.dll.0.dr
Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673375428.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-time-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670746800.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-handle-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672262157.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-synch-l1-2-0.dll.0.dr
Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671748664.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-processenvironment-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670325436.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-datetime-l1-1-0.dll.0.dr
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1d 10 Sep 2019built on: Mon Sep 16 11:00:37 2019 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: libcrypto-1_1.dll.0.dr
Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672552114.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-conio-l1-1-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\python38.pdb source: 2a2d6bO44t.exe, 00000001.00000002.1683096527.00007FFDFB76D000.00000002.00000001.01000000.00000005.sdmp, python38.dll.0.dr
Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671516198.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-localization-l1-2-0.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\_lzma.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.0.dr
Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673005619.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-math-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671900470.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-processthreads-l1-1-1.dll.0.dr
Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671672682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-namedpipe-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673449028.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-utility-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672043673.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-rtlsupport-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672407613.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-timezone-l1-1-0.dll.0.dr
Source: Binary string: C:\A\6\b\libcrypto-1_1.pdb source: libcrypto-1_1.dll.0.dr
Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672114499.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-string-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670679390.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-file-l2-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673073194.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-process-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1671442800.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-libraryloader-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1670919441.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-core-interlocked-l1-1-0.dll.0.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: libcrypto-1_1.dll.0.dr
Source: Binary string: C:\A\21\b\bin\amd64\unicodedata.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A4687A000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.0.dr
Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1672854900.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-heap-l1-1-0.dll.0.dr
Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: 2a2d6bO44t.exe, 00000000.00000003.1673298942.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, api-ms-win-crt-string-l1-1-0.dll.0.dr
Source: 2a2d6bO44t.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 2a2d6bO44t.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 2a2d6bO44t.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 2a2d6bO44t.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 2a2d6bO44t.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: ucrtbase.dll.0.drStatic PE information: 0x81CF5D89 [Wed Jan 5 14:32:41 2039 UTC]
Source: libcrypto-1_1.dll.0.drStatic PE information: section name: .00cfg
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013B0200 push rdi; ret 1_2_00007FFE013B0206
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013AA096 push rdi; ret 1_2_00007FFE013AA0A2
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013AA5B5 push rdi; ret 1_2_00007FFE013AA5BB
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013AFAED push rdi; ret 1_2_00007FFE013AFAF4
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE1A45CB1B push rbp; retf 1_2_00007FFE1A45CB28
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\_ctypes.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-util-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\libcrypto-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\VCRUNTIME140.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-file-l2-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-string-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\python38.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-file-l1-2-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\select.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\ucrtbase.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\libffi-7.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-file-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-console-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI8242\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F66EA0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF733F66EA0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\_ctypes.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-file-l1-2-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\select.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-util-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\libcrypto-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-file-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-file-l2-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-console-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-string-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\python38.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-16908
Source: C:\Users\user\Desktop\2a2d6bO44t.exeAPI coverage: 1.8 %
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F685A0 FindFirstFileExW,FindClose,0_2_00007FF733F685A0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F679B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF733F679B0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F80B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF733F80B84
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F685A0 FindFirstFileExW,FindClose,1_2_00007FF733F685A0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F679B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF733F679B0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F80B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF733F80B84
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013F3280 FindFirstFileExW,FindNextFileW,FindClose,1_2_00007FFE013F3280
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013F303C FindFirstFileExW,FindNextFileW,FindClose,1_2_00007FFE013F303C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE133401A4 GetSystemInfo,VirtualAlloc,1_2_00007FFE133401A4
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F79924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF733F79924
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F82790 GetProcessHeap,0_2_00007FF733F82790
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F6C62C SetUnhandledExceptionFilter,0_2_00007FF733F6C62C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F79924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF733F79924
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F6BBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF733F6BBC0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F6C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF733F6C44C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F6C62C SetUnhandledExceptionFilter,1_2_00007FF733F6C62C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F79924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF733F79924
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F6BBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF733F6BBC0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FF733F6C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF733F6C44C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013CA184 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFE013CA184
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE013F0F20 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFE013F0F20
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE13336810 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFE13336810
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE13335DF8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFE13335DF8
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE133369F8 SetUnhandledExceptionFilter,1_2_00007FFE133369F8
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE148E5054 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FFE148E5054
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE148E4A34 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFE148E4A34
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 1_2_00007FFE1A45D414 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FFE1A45D414
Source: C:\Users\user\Desktop\2a2d6bO44t.exeProcess created: C:\Users\user\Desktop\2a2d6bO44t.exe "C:\Users\user\Desktop\2a2d6bO44t.exe"Jump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F88880 cpuid 0_2_00007FF733F88880
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: EnumSystemLocalesW,1_2_00007FFE013EF35C
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: GetPrimaryLen,EnumSystemLocalesW,1_2_00007FFE013EF3C4
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: EnterCriticalSection,EnumSystemLocalesW,LeaveCriticalSection,1_2_00007FFE013ED2E0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: GetPrimaryLen,EnumSystemLocalesW,1_2_00007FFE013EF478
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_00007FFE013EF8C0
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: GetProcAddress,GetLocaleInfoW,1_2_00007FFE0139DC20
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,1_2_00007FFE013EFA48
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\ucrtbase.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Desktop\2a2d6bO44t.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Desktop\2a2d6bO44t.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\_ctypes.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Desktop\2a2d6bO44t.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-console-l1-1-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-datetime-l1-1-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-file-l1-2-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-convert-l1-1-0.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Desktop\2a2d6bO44t.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Desktop\2a2d6bO44t.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI8242 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Desktop VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Desktop\BPMLNOBVSB VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Desktop\MXPXCVPDVN VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Documents VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Documents\DVWHKMNFNN VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Pictures\Camera Roll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Pictures VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Videos VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeQueries volume information: C:\Users\user\Downloads VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F6C330 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF733F6C330
Source: C:\Users\user\Desktop\2a2d6bO44t.exeCode function: 0_2_00007FF733F84F10 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF733F84F10
Source: C:\Users\user\Desktop\2a2d6bO44t.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
11
Process Injection
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Timestomp
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS34
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
2a2d6bO44t.exe21%ReversingLabsWin64.Infostealer.ClipBanker
2a2d6bO44t.exe23%VirustotalBrowse
2a2d6bO44t.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\_MEI8242\VCRUNTIME140.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\_bz2.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\_ctypes.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\_hashlib.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\_lzma.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\_socket.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-console-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-datetime-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-debug-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-errorhandling-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-file-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-file-l1-2-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-file-l2-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-handle-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-heap-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-interlocked-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-libraryloader-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-localization-l1-2-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-memory-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-namedpipe-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-processenvironment-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-processthreads-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-processthreads-l1-1-1.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-profile-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-rtlsupport-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-string-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-synch-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-synch-l1-2-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-sysinfo-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-timezone-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-core-util-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-conio-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-convert-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-environment-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-filesystem-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-heap-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-locale-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-math-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-process-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-runtime-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-stdio-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-string-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-time-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\api-ms-win-crt-utility-l1-1-0.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\libcrypto-1_1.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\libffi-7.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\python38.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\select.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\ucrtbase.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI8242\unicodedata.pyd0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
https://www.openssl.org/H0%URL Reputationsafe
http://crl.mic0%URL Reputationsafe
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%VirustotalBrowse
http://www.python.org/dev/peps/pep-0205/0%VirustotalBrowse
http://python.org/dev/peps/pep-0263/0%VirustotalBrowse
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6882a2d6bO44t.exe, 00000001.00000002.1681414736.0000012137C40000.00000004.00001000.00020000.00000000.sdmpfalseunknown
http://python.org/dev/peps/pep-0263/python38.dll.0.drfalseunknown
http://crl.thawte.com/ThawteTimestampingCA.crl02a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.dr, libffi-7.dll.0.drfalse
  • URL Reputation: safe
unknown
http://ocsp.thawte.com02a2d6bO44t.exe, 00000000.00000003.1674110682.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669675509.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675675597.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669786731.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670006950.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1676938192.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1677571863.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1669910584.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1670156798.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000000.00000003.1675138485.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, python38.dll.0.dr, select.pyd.0.dr, _socket.pyd.0.dr, _ctypes.pyd.0.dr, _hashlib.pyd.0.dr, libcrypto-1_1.dll.0.dr, _bz2.pyd.0.dr, _lzma.pyd.0.dr, unicodedata.pyd.0.dr, libffi-7.dll.0.drfalse
  • URL Reputation: safe
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader2a2d6bO44t.exe, 00000001.00000003.1680328487.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680685111.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680735796.0000012136404000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000002.1681149635.0000012136407000.00000004.00000020.00020000.00000000.sdmpfalseunknown
https://www.openssl.org/Hlibcrypto-1_1.dll.0.drfalse
  • URL Reputation: safe
unknown
http://crl.mic2a2d6bO44t.exe, 00000000.00000003.1669564233.0000024A46870000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.micG2a2d6bO44t.exe, 00000000.00000003.1669564233.0000024A46870000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    http://www.python.org/dev/peps/pep-0205/2a2d6bO44t.exe, 00000000.00000003.1673602870.0000024A46870000.00000004.00000020.00020000.00000000.sdmp, base_library.zip.0.drfalseunknown
    https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#2a2d6bO44t.exe, 00000001.00000003.1680328487.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680685111.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680735796.0000012136404000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000002.1681149635.0000012136407000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py2a2d6bO44t.exe, 00000001.00000002.1681149635.0000012136407000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://www.python.org/download/releases/2.3/mro/.2a2d6bO44t.exe, 00000001.00000002.1682041958.00000121382E0000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.0.drfalse
          unknown
          https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy2a2d6bO44t.exe, 00000001.00000003.1680328487.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680685111.00000121363F3000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000003.1680735796.0000012136404000.00000004.00000020.00020000.00000000.sdmp, 2a2d6bO44t.exe, 00000001.00000002.1681149635.0000012136407000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1545081
            Start date and time:2024-10-30 04:24:06 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 3m 59s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:2
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:2a2d6bO44t.exe
            renamed because original name is a hash value
            Original Sample Name:f6fb58ffdb5677fab17b5a8195c8d09b.exe
            Detection:MAL
            Classification:mal52.winEXE@3/51@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Report size exceeded maximum capacity and may have missing disassembly code.
            No simulations
            No context
            No context
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Users\user\AppData\Local\Temp\_MEI8242\VCRUNTIME140.dllfNzx1wx8tL.exeGet hashmaliciousMicroClipBrowse
              Q3Gdn0oKkj.exeGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.Win32.MalwareX-gen.6946.2158.exeGet hashmaliciousMicroClipBrowse
                  SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exeGet hashmaliciousMicroClip, RedLineBrowse
                    qGyiOnJETW.exeGet hashmaliciousMicroClipBrowse
                      4EBACnJgpd.exeGet hashmaliciousUnknownBrowse
                        file.exeGet hashmaliciousAmadey, AsyncRAT, Clipboard Hijacker, Cryptbot, MicroClip, Neoreklami, RedLineBrowse
                          SecuriteInfo.com.Trojan.Siggen29.42959.20394.9110.exeGet hashmaliciousAsyncRAT, MicroClip, PureLog Stealer, RedLineBrowse
                            PCUEAYj8Pj.exeGet hashmaliciousAsyncRAT, MicroClip, PureLog Stealer, RedLineBrowse
                              rD5Uox2mkB.exeGet hashmaliciousAsyncRAT, MicroClip, PureLog Stealer, RedLineBrowse
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):89752
                                Entropy (8bit):6.5021374229557996
                                Encrypted:false
                                SSDEEP:1536:EFmmAQ77IPzHql9a2k+2v866Xc/0i+N1WtYil42TZiCvecbtjawN+o/J:EQmI+NnXertP42xvecbtjd+ox
                                MD5:0E675D4A7A5B7CCD69013386793F68EB
                                SHA1:6E5821DDD8FEA6681BDA4448816F39984A33596B
                                SHA-256:BF5FF4603557C9959ACEC995653D052D9054AD4826DF967974EFD2F377C723D1
                                SHA-512:CAE69A90F92936FEBDE67DACD6CE77647CB3B3ED82BB66463CD9047E90723F633AA2FC365489DE09FECDC510BE15808C183B12E6236B0893AF19633F6A670E66
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: fNzx1wx8tL.exe, Detection: malicious, Browse
                                • Filename: Q3Gdn0oKkj.exe, Detection: malicious, Browse
                                • Filename: SecuriteInfo.com.Win32.MalwareX-gen.6946.2158.exe, Detection: malicious, Browse
                                • Filename: SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe, Detection: malicious, Browse
                                • Filename: qGyiOnJETW.exe, Detection: malicious, Browse
                                • Filename: 4EBACnJgpd.exe, Detection: malicious, Browse
                                • Filename: file.exe, Detection: malicious, Browse
                                • Filename: SecuriteInfo.com.Trojan.Siggen29.42959.20394.9110.exe, Detection: malicious, Browse
                                • Filename: PCUEAYj8Pj.exe, Detection: malicious, Browse
                                • Filename: rD5Uox2mkB.exe, Detection: malicious, Browse
                                Reputation:moderate, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............x.D.x.D.x.D..AD.x.D..=D.x.D.x.D.x.Dx..E.x.Dx..E.x.Dx..E.x.Dx..E.x.Dx..E.x.Dx.QD.x.Dx..E.x.DRich.x.D........PE..d....}.Y.........." .........T...............................................`.......Y....`A........................................p...4............@.......0..(.... ...>...P..p.......8...........................@................................................text...$........................... ..`.rdata...6.......8..................@..@.data...0.... ......................@....pdata..(....0......................@..@.rsrc........@......................@..@.reloc..p....P......................@..B................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):84040
                                Entropy (8bit):6.41469022264903
                                Encrypted:false
                                SSDEEP:1536:SSpo7/9ZwseNsUQJ8rbXis0WwOpcAE+8aoBnuRtApxbBVZIG4VJyI:SSW7lZws+bLwOpvEZa+uRWVVZIG4VF
                                MD5:3DC8AF67E6EE06AF9EEC52FE985A7633
                                SHA1:1451B8C598348A0C0E50AFC0EC91513C46FE3AF6
                                SHA-256:C55821F5FDB0064C796B2C0B03B51971F073140BC210CBE6ED90387DB2BED929
                                SHA-512:DA16BFBC66C8ABC078278D4D3CE1595A54C9EF43AE8837CEB35AE2F4757B930FE55E258827036EBA8218315C10AF5928E30CB22C60FF69159C8FE76327280087
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:moderate, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........H.1.).b.).b.).b.Qib.).b.A.c.).bM.=b.).b.A.c.).b.A.c.).b.A.c.).bD@.c.).b.O.c.).b.).b.).bD@.c.).bD@.c.).bD@.b.).bD@.c.).bRich.).b................PE..d.....].........." .........f......t........................................p.......a....`.............................................H............P.......@..(.......H....`......p...T...............................................8............................text...>........................... ..`.rdata..~A.......B..................@..@.data........0......................@....pdata..(....@......................@..@.rsrc........P....... ..............@..@.reloc.......`.......,..............@..B................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):123464
                                Entropy (8bit):5.886703955852103
                                Encrypted:false
                                SSDEEP:3072:qpG85kJGmH3c+5M333KvUPzeENGLf3Tz4ccUZw1IGVPE:qDSGT+5+KMPzyLf3TEcKu
                                MD5:F1E33A8F6F91C2ED93DC5049DD50D7B8
                                SHA1:23C583DC98AA3F6B8B108DB5D90E65D3DD72E9B4
                                SHA-256:9459D246DF7A3C638776305CF3683946BA8DB26A7DE90DF8B60E1BE0B27E53C4
                                SHA-512:229896DA389D78CBDF2168753ED7FCC72D8E0E62C6607A3766D6D47842C0ABD519AC4F5D46607B15E7BA785280F9D27B482954E931645337A152B8A54467C6A5
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:moderate, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U..4..4..4..L@..4..\..4..\..4..\..4..\..4..]..4..R..4..R..4..]..4..4.i4..]..4..]..4..],..4..]..4.Rich.4.........PE..d.....].........." .................]....................................................`..........................................`......$a..........................H...........0...T...............................................`............................text............................... ..`.rdata..0l.......n..................@..@.data....>.......:...l..............@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):45640
                                Entropy (8bit):5.996546047346997
                                Encrypted:false
                                SSDEEP:768:8skeCps0iszzPFrGE/CBAdIPGV03ju774xxIGsIx7WDG4yw:81eCpLzDBZ+AdIPmYju7OxIGsIxWyw
                                MD5:A6448BC5E5DA21A222DE164823ADD45C
                                SHA1:6C26EB949D7EB97D19E42559B2E3713D7629F2F9
                                SHA-256:3692FC8E70E6E29910032240080FC8109248CE9A996F0A70D69ACF1542FCA69A
                                SHA-512:A3833C7E1CF0E4D181AC4DE95C5DFA685CF528DC39010BF0AC82864953106213ECCFF70785021CCB05395B5CF0DCB89404394327CD7E69F820D14DFA6FBA8CBA
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:moderate, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2..&v.uv.uv.u...ur.u$..tt.u$..t}.u$..t~.u$..tt.u...tt.u.ts.uv.u..u.tw.u.tw.u.iuw.u.tw.uRichv.u................PE..d.....].........." .....@...Z......X2...............................................7....`..........................................u..P...@v..........................H............X..T...........................`X...............P...............................text....?.......@.................. ..`.rdata..p3...P...4...D..............@..@.data...h............x..............@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):252488
                                Entropy (8bit):6.080982550390949
                                Encrypted:false
                                SSDEEP:6144:bkHDwqjhhwYbOqQNEkT/4OQhJwAbHoqLNvka/gOFhUw6b4qCNxkV/3OdhAWwPbGE:bd7/IbtSKOt
                                MD5:37057C92F50391D0751F2C1D7AD25B02
                                SHA1:A43C6835B11621663FA251DA421BE58D143D2AFB
                                SHA-256:9442DC46829485670A6AC0C02EF83C54B401F1570D1D5D1D85C19C1587487764
                                SHA-512:953DC856AD00C3AEC6AEAB3AFA2DEB24211B5B791C184598A2573B444761DB2D4D770B8B807EBBA00EE18725FF83157EC5FA2E3591A7756EB718EBA282491C7C
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........0d..^7..^7..^7..7..^7.._6..^7..[6..^7..Z6..^7..]6..^7Q._6..^7.._6..^7.._7..^7Q.S6..^7Q.^6..^7Q..7..^7Q.\6..^7Rich..^7........PE..d.....].........." .................6..............................................o*....`............................................L.......x.......................H.......$...@...T............................................... ............................text............................... ..`.rdata..............................@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..$...........................@..B................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):78920
                                Entropy (8bit):6.061178831576516
                                Encrypted:false
                                SSDEEP:1536:KzMe79sDb+eGm08Vr5lcDAB9/s+7+pkaOz3CkNA9y1IGVwCyMPbi:de79u8/GFmAB9/se+pROz3jN1IGVw+Pm
                                MD5:D6BAE4B430F349AB42553DC738699F0E
                                SHA1:7E5EFC958E189C117ECCEF39EC16EBF00E7645A9
                                SHA-256:587C4F3092B5F3E34F6B1E927ECC7127B3FE2F7FA84E8A3D0C41828583BD5CEF
                                SHA-512:A8F8FED5EA88E8177E291B708E44B763D105907E9F8C9E046C4EEBB8684A1778383D1FBA6A5FA863CA37C42FD58ED977E9BB3A6B12C5B8D9AB6EF44DE75E3D1E
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........1..._..._..._....._...^.._...Z..._...[..._...\.._.a.^.._...^.._...^.B._.a.R..._.a._..._.a..._.a.]..._.Rich.._.................PE..d.....].........." .....x..........h........................................`.......2....`.............................................P...0........@.......0..........H....P.........T...........................@................................................text....v.......x.................. ..`.rdata...v.......x...|..............@..@.data...............................@....pdata.......0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20248
                                Entropy (8bit):7.035406046605262
                                Encrypted:false
                                SSDEEP:384:iWEhWL4+QpBj0HRN7aebXQHRN7LgkSIlexkdT:Qv+qWaM8V6U
                                MD5:B56D69079D2001C1B2AF272774B53A64
                                SHA1:67EDE1C5A71412B11847F79F5A684EABAF00DE01
                                SHA-256:F3A41D882544202B2E1BDF3D955458BE11FC7F76BA12668388A681870636F143
                                SHA-512:7EB8FE111DD2E1F7E308B622461EB311C2B9FC4EF44C76E1DEF6C524EB7281D5522AF12211F1F91F651F2B678592D2997FE4CD15724F700DEAFF314A1737B3A8
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0...........`.........................................`...+............ ...................A..............8............................................................................rdata..@...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19736
                                Entropy (8bit):7.0443036655888225
                                Encrypted:false
                                SSDEEP:384:vWEhW/4+QpBj0HRN7TQHRN7Gp1x09lge9://+qWT8Gps9
                                MD5:5AF784F599437629DEEA9FE4E8EB4799
                                SHA1:3C891B920FD2703EDD6881117EA035CED5A619F6
                                SHA-256:7E5BD3EE263D09C7998E0D5FFA684906DDC56DA61536331C89C74B039DF00C7C
                                SHA-512:4DF58513CF52511C0D2037CDC674115D8ED5A0ED4360EB6383CC6A798A7037F3F7F2D587797223ED7797CCD476F1C503B3C16E095843F43E6B87D55AD4822D70
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0......ey....`.........................................`................ ...................A..............8............................................................................rdata..$...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19736
                                Entropy (8bit):7.049693596229206
                                Encrypted:false
                                SSDEEP:192:UPWEhWcHHV/McJW65FdQpBjSdHnhWgN7a8WckW65FdQHnhWgN7a8WshFoodqnajK:wWEhWmJ7QpBj0HRN7GQHRN7FhSIlexEk
                                MD5:E1CA15CF0597C6743B3876AF23A96960
                                SHA1:301231F7250431BD122B12ED34A8D4E8BB379457
                                SHA-256:990E46D8F7C9574A558EBDFCB8739FBCCBA59D0D3A2193C9C8E66807387A276D
                                SHA-512:7C9DACD882A0650BF2F553E9BC5647E6320A66021AC4C1ADC802070FD53DE4C6672A7BACFD397C51009A23B6762E85C8017895E9347A94D489D42C50FA0A1C42
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0............`.........................................`................ ...................A..............8............................................................................rdata..0...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19736
                                Entropy (8bit):7.0758779488098416
                                Encrypted:false
                                SSDEEP:384:FvfC5WEhWllQpBj0HRN77lQHRN7QSkclsHd/:Fi5uqWB8Q7/
                                MD5:8D6599D7C4897DCD0217070CCA074574
                                SHA1:25EACAAA4C6F89945E97388796A8C85BA6FB01FB
                                SHA-256:A011260FAFAAAEFD7E7326D8D5290C6A76D55E5AF4E43FFA4DE5FEA9B08FA928
                                SHA-512:E8E2E7C5BFF41CCAA0F77C3CFEE48DAC43C11E75688F03B719CC1D716DB047597A7A2CE25B561171EF259957BDCD9DD4345A0E0125DB2B36F31698BA178E2248
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0.......j....`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):23320
                                Entropy (8bit):6.972639549935684
                                Encrypted:false
                                SSDEEP:384:2BPvVX7WEhWXqEQpBj0HRN7UQHRN7mSIlexb:+PvVXDqHqWU8m6l
                                MD5:642B29701907E98E2AA7D36EBA7D78B8
                                SHA1:16F46B0E057816F3592F9C0A6671111EA2F35114
                                SHA-256:5D72FEAC789562D445D745A55A99536FA9302B0C27B8F493F025BA69BA31941C
                                SHA-512:1BEAB2B368CC595BEB39B2F5A2F52D334BC42BF674B8039D334C6D399C966AFF0B15876105F0A4A54FA08E021CB44907ED47D31A0AF9E789EB4102B82025CF57
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................@............`.........................................`................0...................A..............8............................................................................rdata..............................@..@.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19736
                                Entropy (8bit):7.053716052760641
                                Encrypted:false
                                SSDEEP:384:9ZWEhWwqEQpBj0HRN7xnE77QHRN7ICMlly:9ZJHqWNE778r
                                MD5:F0C73F7454A5CE6FB8E3D795FDB0235D
                                SHA1:ACDD6C5A359421D268B28DDF19D3BCB71F36C010
                                SHA-256:2A59DD891533A028FAE7A81E690E4C28C9074C2F327393FAB17329AFFE53FD7B
                                SHA-512:BD6CF4E37C3E7A1A3B36F42858AF1B476F69CAA4BA1FD836A7E32220E5EFF7CCC811C903019560844AF988A7C77CC41DC6216C0C949D8E04516A537DA5821A3E
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0...........`.........................................`...L............ ...................A..............8............................................................................rdata..\...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19736
                                Entropy (8bit):7.113839950805383
                                Encrypted:false
                                SSDEEP:384:IVxWEhWnqEQpBj0HRN7HQHRN7YAXAXOVlTS:IVh6HqWH8lAH
                                MD5:7D4D4593B478B4357446C106B64E61F8
                                SHA1:8A4969C9E59D7A7485C8CC5723C037B20DEA5C9D
                                SHA-256:0A6E2224CDE90A0D41926E8863F9956848FFBF19848E8855BD08953112AFC801
                                SHA-512:7BC9C473705EC98BA0C1DA31C295937D97710CEDEFC660F6A5CB0512BAE36AD23BEBB2F6F14DF7CE7F90EC3F817B02F577317FDD514560AAB22CB0434D8E4E0B
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...).NV.........." .........................................................0............`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19736
                                Entropy (8bit):7.052601866399419
                                Encrypted:false
                                SSDEEP:384:XWEhW2lQpBj0HRN7NkhXQHRN7vnR1lp1x09lgerA:37qWw8vRnpss
                                MD5:7BC1B8712E266DB746914DB48B27EF9C
                                SHA1:C76EB162C23865B3F1BD7978F7979D6BA09CCB60
                                SHA-256:F82D05AEA21BCF6337EF45FBDAD6D647D17C043A67B44C7234F149F861A012B9
                                SHA-512:DB6983F5F9C18908266DBF01EF95EBAE49F88EDC04A0515699EF12201AC9A50F09939B8784C75AE513105ADA5B155E5330BD42D70F8C8C48FE6005513AEFAD2A
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0.......r....`.........................................`..._............ ...................A..............8............................................................................rdata..t...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20248
                                Entropy (8bit):7.028564065154355
                                Encrypted:false
                                SSDEEP:192:nZlrPWEhWcrIAjW65FdQpBjSdHnhWgN7a8WcA+0W65FdQHnhWgN7a8W1P5mzVEMW:ZlzWEhWKFQpBj0HRN7JGQHRN7rCMllq
                                MD5:B071E761CEA670D89D7AE80E016CE7E6
                                SHA1:C675BE753DBEF1624100F16674C2221A20CF07DD
                                SHA-256:63FB84A49308B857804AE1481D2D53B00A88BBD806D257D196DE2BD5C385701E
                                SHA-512:F2ECBDABA3516D92BD29DCCE618185F1755451D95C7DBBE23F8215318F6F300A9964C93EC3ED65C5535D87BE82B668E1D3025A7E325AF71A05F14E15D530D35F
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0............`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19736
                                Entropy (8bit):7.064651561006373
                                Encrypted:false
                                SSDEEP:192:DPWEhWcAQIqyW65FdQpBjSdHnhWgN7a8WcnKW65FdQHnhWgN7a8WwFoodqnajqxB:LWEhWFqEQpBj0HRN7XsQHRN7XSIlex7N
                                MD5:1DCCF27F2967601CE6666C8611317F03
                                SHA1:D8246DF2ED9EC4A8A719FD4B1DB4FD8A71EF679B
                                SHA-256:6A83AB9A413AFD74D77A090F52784B0128527BEE9CB0A4224C59D5C75FC18387
                                SHA-512:70B96D69D609211F8B9E05FA510EA7D574AE8DA3A6498F5C982AEE71635B8A749162247055B7BA21A884BFA06C1415B68912C463F0F1B6FFB9049F3532386877
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0...........`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20248
                                Entropy (8bit):7.078698929399523
                                Encrypted:false
                                SSDEEP:384:GvuBL3BXWEhWfnhLvQpBj0HRN7YQ3QHRN7Tp1x09lgek/:xBL3B3shLvqWYQ38Tps6
                                MD5:569A7AC3F6824A04282FF708C629A6D2
                                SHA1:FC0D78DE1075DFD4C1024A72074D09576D4D4181
                                SHA-256:84C579A8263A87991CA1D3AEE2845E1C262FB4B849606358062093D08AFDC7A2
                                SHA-512:E9CBFF82E32540F9230CEAD9063ACB1ACEB7CCC9F3338C0B7AD10B0AC70FF5B47C15944D0DCE33EA8405554AA9B75DE30B26AE2CA55DB159D45B6E64BC02A180
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0......Gg....`.........................................`................ ...................A..............8............................................................................rdata..(...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):22296
                                Entropy (8bit):7.054401722955359
                                Encrypted:false
                                SSDEEP:384:WOMw3zdp3bwjGjue9/0jCRrndbkWEhWE6yQpBj0HRN7LFQHRN7l8pUclXr:WOMwBprwjGjue9/0jCRrndby/qWLF8l4
                                MD5:1D75E7B9F68C23A195D408CF02248119
                                SHA1:62179FC9A949D238BB221D7C2F71BA7C1680184C
                                SHA-256:67EBE168B7019627D68064043680674F9782FDA7E30258748B29412C2B3D4C6B
                                SHA-512:C2EE84A9AEAC34F7B51426D12F87BB35D8C3238BB26A6E14F412EA485E5BD3B8FB5B1231323D4B089CF69D8180A38DDD7FD593CC52CBDF250125AD02D66EEA9D
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0......U.....`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20248
                                Entropy (8bit):7.0496932942785735
                                Encrypted:false
                                SSDEEP:384:/qWEhW8nhLvQpBj0HRN78riQHRN7TaSIlexO:ADhLvqWR8W6s
                                MD5:623283471B12F1BDB83E25DBAFAF9C16
                                SHA1:ECBBA66F4DCA89A3FAA3E242E30AEFAC8DE02153
                                SHA-256:9CA500775FEE9FF69B960D65040B8DC415A2EFDE2982A9251EE6A3E8DE625BC7
                                SHA-512:54B69FFA2C263BE4DDADCA62FA2867FEA6148949D64C2634745DB3DCBC1BA0ECF7167F02FA53EFD69EAAEE81D617D914F370F26CA16EE5850853F70C69E9A61F
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0............`.........................................`...l............ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19736
                                Entropy (8bit):7.110045595478065
                                Encrypted:false
                                SSDEEP:384:nWEhWC5oQpBj0HRN7EODQHRN7nvp1x09lgefv:nNaqWEo8nvpsH
                                MD5:61F70F2D1E3F22E976053DF5F3D8ECB7
                                SHA1:7D224B7F404CDE960E6B7A1C449B41050C8E9C58
                                SHA-256:2695761B010D22FDFDA2B5E73CF0AC7328CCC62B4B28101D5C10155DD9A48020
                                SHA-512:1DDC568590E9954DB198F102BE99EABB4133B49E9F3B464F2FC7F31CC77D06D5A7132152F4B331332C42F241562EE6C7BF1C2D68E546DB3F59AB47EAF83A22CF
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0......S.....`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20760
                                Entropy (8bit):7.026463196608447
                                Encrypted:false
                                SSDEEP:384:UWWEhWsxlQpBj0HRN7l1khQHRN7kTPSIlexA:1DqWl1kh8kL62
                                MD5:1322690996CF4B2B7275A7950BAD9856
                                SHA1:502E05ED81E3629EA3ED26EE84A4E7C07F663735
                                SHA-256:5660030EE4C18B1610FB9F46E66F44D3FC1CF714ECCE235525F08F627B3738D7
                                SHA-512:7EDC06BFA9E633351291B449B283659E5DD9E706DD57ADE354BCE3AF55DF4842491AF27C7721B2ACC6948078BDFC8E9736FEC46E0641AF368D419C7ED6AEBD44
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0......G.....`.........................................`...G............ ...................A..............8............................................................................rdata..h...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):21784
                                Entropy (8bit):7.053725357941814
                                Encrypted:false
                                SSDEEP:384:5WXk1JzNcKSImWEhW1qEQpBj0HRN77S4QHRN7j8AXOVlTHxE:5bcKSdkHqW+48j/cE
                                MD5:95612A8A419C61480B670D6767E72D09
                                SHA1:3B94D1745AFF6AAFEFF87FED7F23E45473F9AFC9
                                SHA-256:6781071119D66757EFA996317167904697216AD72D7C031AF4337138A61258D4
                                SHA-512:570F15C2C5AA599332DD4CFB3C90DA0DD565CA9053ECF1C2C05316A7F623615DD153497E93B38DF94971C8ABF2E25BC1AAAF3311F1CDA432F2670B32C767012A
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0............`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20248
                                Entropy (8bit):7.060875826104053
                                Encrypted:false
                                SSDEEP:384:iDfIeAWEhWY6yQpBj0HRN7wHQHRN7NjZSIlexL:NemTqWC8NV6d
                                MD5:D6AD0F2652460F428C0E8FC40B6F6115
                                SHA1:1A5152871ABC5CF3D4868A218DE665105563775E
                                SHA-256:4EF09FA6510EEEBB4855B6F197B20A7A27B56368C63CC8A3D1014FA4231AB93A
                                SHA-512:CEAFEEE932919BC002B111D6D67B7C249C85D30DA35DFBCEBD1F37DB51E506AC161E4EE047FF8F7BF0D08DA6A7F8B97E802224920BD058F8E790E6FA0EE48B22
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0......@!....`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19224
                                Entropy (8bit):7.1376464003004685
                                Encrypted:false
                                SSDEEP:192:tnjFPWEhWcCTQW65FdQpBjSdHnhWgN7a8Wc//W65FdQHnhWgN7a8WOR5mzVEMqnL:tnhWEhWnqQpBj0HRN7hQHRN7mCMll5i
                                MD5:654D95515AB099639F2739685CB35977
                                SHA1:9951854A5CF407051CE6CD44767BFD9BD5C4B0CC
                                SHA-256:C4868E4CEBDF86126377A45BD829D88449B4AA031C9B1C05EDC47D6D395949D4
                                SHA-512:9C9DD64A3AD1136BA62CCA14FC27574FAAEBC3DE1E371A86B83599260424A966DFD813991A5EF0B2342E0401CB99CE83CD82C19FCAE73C7DECDB92BAC1FB58A8
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0......N.....`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20248
                                Entropy (8bit):7.038577027863076
                                Encrypted:false
                                SSDEEP:384:QGeVdWEhWF4+QpBj0HRN7nKQHRN7KFcR8pUclXi:QGeVFp+qWK8AG8pUh
                                MD5:E6B7681CCC718DDB69C48ABE8709FDD6
                                SHA1:A518B705746B2C6276F56A2F1C996360B837D548
                                SHA-256:4B532729988224FE5D98056CD94FC3E8B4BA496519F461EF5D9D0FF9D9402D4B
                                SHA-512:89B20AFFAA23E674543F0F2E9B0A8B3ECD9A8A095E19D50E11C52CB205DAFDBF2672892FD35B1C45F16E78AE9B61525DE67DBE7673F8CA450AA8C42FEEAC0895
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0.......2....`.........................................`................ ...................A..............8............................................................................rdata..,...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19736
                                Entropy (8bit):7.087741938037833
                                Encrypted:false
                                SSDEEP:384:nyMvfWEhWtJ7QpBj0HRN7n0QHRN7gTtAXOVlTF2:nyMvPq7qWn08gWd
                                MD5:BCB412464F01467F1066E94085957F42
                                SHA1:716C11B5D759D59DBFEC116874E382D69F9A25B6
                                SHA-256:F040B6E07935B67599EA7E32859A3E93DB37FF4195B28B4451AD0D274DB6330E
                                SHA-512:79EC0C5EE21680843C8B7F22DA3155B7607D5BE269F8A51056CC5F060AD3A48CED3B6829117262ABA1A90E692374B59DDFE92105D14179F631EFC0C863BFDECB
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0......#j....`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):21784
                                Entropy (8bit):7.005386895286503
                                Encrypted:false
                                SSDEEP:384:Ddv3V0dfpkXc0vVaEWEhWYYxnhLvQpBj0HRN7gPZGQHRN7xuHNiWXhlhOY3:Ddv3VqpkXc0vVaS5ahLvqWSA8sNizM
                                MD5:B98598657162DE8FBC1536568F1E5A4F
                                SHA1:F7C020220025101638FD690D86C53D895A03E53C
                                SHA-256:F596C72BE43DB3A722B7C7A0FD3A4D5AEA68267003986FBFD278702AF88EFA74
                                SHA-512:AD5F46A3F4F6E64A5DCB85C328F1B8DAEFA94FC33F59922328FDCFEDC04A8759F16A1A839027F74B7D7016406C20AC47569277620D6B909E09999021B669A0D6
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0............`.........................................`...V............ ...................A..............8............................................................................rdata..l...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20248
                                Entropy (8bit):7.091480115020503
                                Encrypted:false
                                SSDEEP:384:ntZ3lWEhWFJ7QpBj0HRN7DdC8QHRN7cSIlexF:pa7qWDdC88c6H
                                MD5:B751571148923D943F828A1DEB459E24
                                SHA1:D4160404C2AA6AEAF3492738F5A6CE476A0584A6
                                SHA-256:B394B1142D060322048FB6A8AC6281E4576C0E37BE8DA772BC970F352DD22A20
                                SHA-512:26E252FF0C01E1E398EBDDCC5683A58CDD139161F2B63B65BDE6C3E943E85C0820B24486859C2C597AF6189DE38CA7FE6FA700975BE0650CB53C791CD2481C9D
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0......?.....`.........................................`...v............ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20760
                                Entropy (8bit):7.031246620579023
                                Encrypted:false
                                SSDEEP:384:rB2WEhWC5oQpBj0HRN7xQHRN7sbSIlexe:rBs1aqWx8868
                                MD5:8AEA681E0E2B9ABBF73A924003247DBB
                                SHA1:5BAFC2E0A3906723F9B12834B054E6F44D7FF49F
                                SHA-256:286068A999FE179EE91B289360DD76E89365900B130A50E8651A9B7ECE80B36D
                                SHA-512:08C83A729036C94148D9A5CBC03647FA2ADEA4FBA1BBB514C06F85CA804EEFBF36C909CB6EDC1171DA8D4D5E4389E15E52571BAA6987D1F1353377F509E269AB
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...".NV.........." .........................................................0.......5....`.........................................`...E............ ...................A..............8............................................................................rdata..\...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19736
                                Entropy (8bit):7.126809628880692
                                Encrypted:false
                                SSDEEP:192:DPWEhWcG6SJxHW65FdQpBjSdHnhWgN7a8Wcb8W65FdQHnhWgN7a8Wbv8p2kacqnd:LWEhWP6yQpBj0HRN7reQHRN7c8pUclXM
                                MD5:EAB486E4719B916CAD05D64CD4E72E43
                                SHA1:876C256FB2AEB0B25A63C9EE87D79B7A3C157EAD
                                SHA-256:05FE96FAA8429992520451F4317FBCEBA1B17716FA2CAF44DDC92EDE88CE509D
                                SHA-512:C50C3E656CC28A2F4F6377BA24D126BDC248A3125DCA490994F8CACE0A4903E23346AE937BB5B0A333F7D39ECE42665AE44FDE2FD5600873489F3982151A0F5D
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0............`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):19736
                                Entropy (8bit):7.050436266578937
                                Encrypted:false
                                SSDEEP:192:VPWEhWcAQIqyW65FdQpBjSdHnhWgN7a8Wcx/YaWW65FdQHnhWgN7a8Wu08p2kacE:dWEhWxqEQpBj0HRN7FwQHRN7k8pUclXS
                                MD5:EDD61FF85D75794DC92877F793A2CEF6
                                SHA1:DE9F1738FC8BF2D19AA202E34512EC24C1CCB635
                                SHA-256:8ACA888849E9089A3A56FA867B16B071951693AB886843CFB61BD7A5B08A1ECE
                                SHA-512:6CEF9B256CDCA1A401971CA5706ADF395961B2D3407C1FFF23E6C16F7E2CE6D85D946843A53532848FCC087C18009C08F651C6EB38112778A2B4B33E8C64796C
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0.......k....`.........................................`...9............ ...................A..............8............................................................................rdata..L...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20760
                                Entropy (8bit):7.043213792651867
                                Encrypted:false
                                SSDEEP:384:0N+WEhW+FQpBj0HRN7N7rJQHRN7YSIlexs:ZjqW1rJ8Y6e
                                MD5:22BFE210B767A667B0F3ED692A536E4E
                                SHA1:88E0FF9C141D8484B5E34EAAA5E4BE0B414B8ADF
                                SHA-256:F1A2499CC238E52D69C63A43D1E61847CF852173FE95C155056CFBD2CB76ABC3
                                SHA-512:CBEA3C690049A73B1A713A2183FF15D13B09982F8DD128546FD3DB264AF4252CCD390021DEE54435F06827450DA4BD388BD6FF11B084C0B43D50B181C928FD25
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0.......i....`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):23832
                                Entropy (8bit):6.893758159434215
                                Encrypted:false
                                SSDEEP:384:ODyuWEhWjlQpBj0HRN7ubJlUQHRN7sXhlhOq:qMqWuzU8lq
                                MD5:DA5E087677C8EBBC0062EAC758DFED49
                                SHA1:CA69D48EFA07090ACB7AE7C1608F61E8D26D3985
                                SHA-256:08A43A53A66D8ACB2E107E6FC71213CEDD180363055A2DC5081FE5A837940DCE
                                SHA-512:6262E9A0808D8F64E5F2DFAD5242CD307E2F5EAA78F0A768F325E65C98DB056C312D79F0B3E63C74E364AF913A832C1D90F4604FE26CC5FB05F3A5A661B12573
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................@............`.........................................`................0...................A..............8............................................................................rdata..............................@..@.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20248
                                Entropy (8bit):7.034562111482961
                                Encrypted:false
                                SSDEEP:192:I8PWEhWck+4cW65FdQpBjSdHnhWgN7a8Wcl4zKW65FdQHnhWgN7a8W5kX5mzVEMq:9WEhWi4+QpBj0HRN71/QHRN7ckwCMllO
                                MD5:33A0FE1943C5A325F93679D6E9237FEE
                                SHA1:737D2537D602308FC022DBC0C29AA607BCDEC702
                                SHA-256:5AF7AA065FFDBF98D139246E198601BFDE025D11A6C878201F4B99876D6C7EAC
                                SHA-512:CAB7FCAA305A9ACE1F1CC7077B97526BEBC0921ADF23273E74CD42D7FE99401D4F7EDE8ECB9847B6734A13760B9EBE4DBD2465A3DB3139ED232DBEF68FB62C54
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0.......y....`.........................................`..."............ ...................A..............8............................................................................rdata..<...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):21784
                                Entropy (8bit):7.046057210626605
                                Encrypted:false
                                SSDEEP:384:h81nWm5CcWEhWke9HQpBj0HRN7KQhv2kQHRN7yAXOVlTnG:hOnWm5C6DMHqWKmuk8pb
                                MD5:633DCA52DA4EBAA6F4BF268822C6DC88
                                SHA1:1EBFC0F881CE338D2F66FCC3F9C1CBB94CDC067E
                                SHA-256:424FD5D3D3297A8AB1227007EF8DED5A4F194F24BD573A5211BE71937AA55D22
                                SHA-512:ED058525EE7B4CC7E12561C7D674C26759A4301322FF0B3239F3183911CE14993614E3199D8017B9BFDE25C8CB9AC0990D318BB19F3992624B39EC0F084A8DF1
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0......."....`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20760
                                Entropy (8bit):7.011889321604509
                                Encrypted:false
                                SSDEEP:384:eQWEhWxFQpBj0HRN7o8/QHRN7/cPcSIlexP:eWGqWo8/8/l6B
                                MD5:43BF2037BFD3FB60E1FEDAC634C6F86E
                                SHA1:959EEBE41D905AD3AFA4254A52628EC13613CF70
                                SHA-256:735703C0597DA278AF8A6359FC051B9E657627F50AD5B486185C2EF328AD571B
                                SHA-512:7042846C009EFEA45CA5FAFDC08016ECA471A8C54486BA03F212ABBA47467F8744E9546C8F33214620F97DBCC994E3002788AD0DB65B86D8A3E4FF0D8A9D0D05
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0............`.........................................`................ ...................A..............8............................................................................rdata..(...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20248
                                Entropy (8bit):7.08402114712403
                                Encrypted:false
                                SSDEEP:384:29DWEhWXFQpBj0HRN7lbQHRN7s8SIlexeXC:kkqWN8L6cXC
                                MD5:D51BC845C4EFBFDBD68E8CCFFDAD7375
                                SHA1:C82E580EC68C48E613C63A4C2F9974BB59182CF6
                                SHA-256:89D9F54E6C9AE1CB8F914DA1A2993A20DE588C18F1AAF4D66EFB20C3A282C866
                                SHA-512:2E353CF58AD218C3E068A345D1DA6743F488789EF7C6B96492D48571DC64DF8A71AD2DB2E5976CFD04CF4B55455E99C70C7F32BD2C0F4A8BED1D29C2DAFC17B0
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0......].....`.........................................`...e............ ...................A..............8............................................................................rdata..|...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):28952
                                Entropy (8bit):6.688687241998293
                                Encrypted:false
                                SSDEEP:384:wZVacWM4Oe59Ckb1hgmLiWEhW1e9HQpBj0HRN7O2KQHRN7w3kclsHMkZT:wZVJWMq59Bb1jQuMHqWOz8Akx
                                MD5:487F72D0CF7DC1D85FA18788A1B46813
                                SHA1:0AABFF6D4EE9A2A56D40EE61E4591D4BA7D14C0D
                                SHA-256:560BAF1B87B692C284CCBB82F2458A688757231B315B6875482E08C8F5333B3D
                                SHA-512:B7F4E32F98BFDCF799331253FAEBB1FB08EC24F638D8526F02A6D9371C8490B27D03DB3412128CED6D2BBB11604247F3F22C8380B1BF2A11FB3BB92F18980185
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........,...............................................P.......%....`.........................................`....%...........@...............0...A..............8............................................................................rdata...&.......(..................@..@.rsrc........@.......,..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20760
                                Entropy (8bit):7.028263219925353
                                Encrypted:false
                                SSDEEP:384:JitIlWEhWO5oQpBj0HRN7BXVQHRN7DEp1x09lgezq:w6paqWz8Apsm
                                MD5:54A8FCA040976F2AAC779A344B275C80
                                SHA1:EA1F01D6DCDF688EB0F21A8CB8A38F03BC777883
                                SHA-256:7E90E7ACC69ACA4591CE421C302C7F6CDF8E44F3B4390F66EC43DFF456FFEA29
                                SHA-512:CB20BED4972E56F74DE1B7BC50DC1E27F2422DBB302AECB749018B9F88E3E4A67C9FC69BBBB8C4B21D49A530CC8266172E7D237650512AAFB293CDFE06D02228
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0............`.........................................`...x............ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):24344
                                Entropy (8bit):6.897926491070706
                                Encrypted:false
                                SSDEEP:384:B42r77WEhWCFQpBj0HRN7SQHRN7oSIlexw40:B42r7DrqWS8o6x0
                                MD5:21B509D048418922B92985696710AFCA
                                SHA1:C499DD098AAB8C7E05B8B0FD55F994472D527203
                                SHA-256:FE7336D2FB3B13A00B5B4CE055A84F0957DAEFDACE94F21B88E692E54B678AC3
                                SHA-512:C517B02D4E94CF8360D98FD093BCA25E8AE303C1B4500CF4CF01F78A7D7EF5F581B99A0371F438C6805A0B3040A0E06994BA7B541213819BD07EC8C6251CB9BB
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................@......~.....`.........................................`...4............0...................A..............8............................................................................rdata..H...........................@..@.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):25880
                                Entropy (8bit):6.843889819511554
                                Encrypted:false
                                SSDEEP:384:z3vAmiFVhFWEhWGqQpBj0HRN79XJQHRN7/SCMllJXq:zvYjoqW958/ga
                                MD5:120A5DC2682CD2A838E0FC0EFD45506E
                                SHA1:8710BE5D5E9C878669FF8B25B67FB2DEB32CD77A
                                SHA-256:C14F0D929A761A4505628C4EB5754D81B88AA1FDAD2154A2F2B0215B983B6D89
                                SHA-512:4330EDF9B84C541E5ED3BB672548F35EFA75C6B257C3215FC29BA6E152294820347517EC9BD6BDE38411EFA9074324A276CF0D7D905ED5DD88E906D78780760C
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." ......... ...............................................@............`.........................................`...a............0...............$...A..............8............................................................................rdata..t...........................@..@.rsrc........0....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):25880
                                Entropy (8bit):6.8416401850774395
                                Encrypted:false
                                SSDEEP:768:p5yguNvZ5VQgx3SbwA71IkFZpMHqW74W8Lipsy:p5yguNvZ5VQgx3SbwA71IipMR747fy
                                MD5:F22FACA49E4D5D80EC26ED31E7ECD0E0
                                SHA1:473BCBFB78E6A63AFD720B5CBE5C55D9495A3D88
                                SHA-256:1EB30EA95DAE91054A33A12B1C73601518D28E3746DB552D7CE120DA589D4CF4
                                SHA-512:C8090758435F02E3659D303211D78102C71754BA12B0A7E25083FD3529B3894DC3AB200B02A2899418CC6ED3B8F483D36E6C2BF86CE2A34E5FD9AD0483B73040
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." ......... ...............................................@............`.........................................`................0...............$...A..............8............................................................................rdata..............................@..@.rsrc........0....... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):22296
                                Entropy (8bit):6.97368865913958
                                Encrypted:false
                                SSDEEP:384:SPEzaWEhW/slQpBj0HRN7sVQHRN7gkclsHTyt:Y0YRqWg8jyt
                                MD5:2FD0DA47811B8ED4A0ABDF9030419381
                                SHA1:46E3F21A9BD31013A804BA45DC90CC22331A60D1
                                SHA-256:DE81C4D37833380A1C71A5401DE3AB4FE1F8856FC40D46D0165719A81D7F3924
                                SHA-512:2E6F900628809BFD908590FE1EA38E0E36960235F9A6BBCCB73BBB95C71BFD10F75E1DF5E8CF93A682E4ADA962B06C278AFC9123AB5A4117F77D1686FF683D6F
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0............`.........................................`................ ...................A..............8............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):20248
                                Entropy (8bit):7.0800725103781765
                                Encrypted:false
                                SSDEEP:384:JBf5WEhWye9HQpBj0HRN7tKQHRN7jsAXOVlTBr:zf5dMHqWtK87U
                                MD5:FE1096F1ADE3342F049921928327F553
                                SHA1:118FB451AB006CC55F715CDF3B5E0C49CF42FBE0
                                SHA-256:88D3918E2F063553CEE283306365AA8701E60FB418F37763B4719F9974F07477
                                SHA-512:0A982046F0C93F68C03A9DD48F2BC7AEE68B9EEBEAEA01C3566B2384D0B8A231570E232168D4608A09136BCB2B1489AF802FD0C25348F743F0C1C8955EDD41C1
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......m2..)S..)S..)S....].(S....A.+S....^.(S....C.(S..Rich)S..........................PE..d...#.NV.........." .........................................................0.......0....`.........................................`...^............ ...................A..............8............................................................................rdata..t...........................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                Category:dropped
                                Size (bytes):841697
                                Entropy (8bit):5.484581034394053
                                Encrypted:false
                                SSDEEP:24576:fhidp/tosQNRs54PK4IM7Vw59bfCEnXTR32k:fhidp/tosQNRs54PK4Ip9F5
                                MD5:F4981249047E4B7709801A388E2965AF
                                SHA1:42847B581E714A407A0B73E5DAB019B104EC9AF2
                                SHA-256:B191E669B1C715026D0732CBF8415F1FF5CFBA5ED9D818444719D03E72D14233
                                SHA-512:E8EF3FB3C9D5EF8AE9065838B124BA4920A3A1BA2D4174269CAD05C1F318BC9FF80B1C6A6C0F3493E998F0587EF59BE0305BC92E009E67B82836755470BC1B13
                                Malicious:false
                                Preview:PK..........!...7............._bootlocale.pycU....................................@....z...d.Z.d.d.l.Z.d.d.l.Z.e.j...d...r,d.d.d...Z.nJz.e.j...W.n4..e.k.rj......e.e.d...r\d.d.d...Z.n.d.d.d...Z.Y.n.X.d.d.d...Z.d.S.)...A minimal subset of the locale module used at interpreter startup.(imported by the _io module), in order to reduce startup time...Don't import directly from third-party code; use the `locale` module instead!......N..winTc....................C........t.j.j.r.d.S.t.....d...S.).N..UTF-8.........sys..flags..utf8_mode.._locale.._getdefaultlocale....do_setlocale..r......_bootlocale.py..getpreferredencoding...............r......getandroidapilevelc....................C........d.S.).Nr....r....r....r....r....r....r...............c....................C........t.j.j.r.d.S.d.d.l.}.|...|...S.).Nr....r......r....r....r......localer......r....r....r....r....r....r.....................c....................C....6...|.r.t...t.j.j.r.d.S.t...t.j...}.|.s2t.j.d.k.r2d.}.|.S.).Nr......darwin....A
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):3381792
                                Entropy (8bit):6.094908167946797
                                Encrypted:false
                                SSDEEP:49152:Y4TKuk29SIU6i5fOjPWl+0rOh5PKToEGG9I+q4dNQbZQm9aGupuu9LoeiyPaRb84:YiV+CGQ4dtBMeiJRb8+1CPwDv3uFZjN
                                MD5:BF83F8AD60CB9DB462CE62C73208A30D
                                SHA1:F1BC7DBC1E5B00426A51878719196D78981674C4
                                SHA-256:012866B68F458EC204B9BCE067AF8F4A488860774E7E17973C49E583B52B828D
                                SHA-512:AE1BDDA1C174DDF4205AB19A25737FE523DCA6A9A339030CD8A95674C243D0011121067C007BE56DEF4EAEFFC40CBDADFDCBD1E61DF3404D6A3921D196DCD81E
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........R...3...3...3...K...3..[...3..[...3..[...3..[...3..U...3...3..{3..qZ...3..qZ..1..qZ...3..qZf..3..qZ...3..Rich.3..................PE..d....k.].........." ......$..........r....................................... 4.......4...`..............................................f...Z3.@.....3.|.....1.......3. .....3..O..P-,.8............................-,..............P3..............................text...g.$.......$................. ..`.rdata.......0$.......$.............@..@.data...Ax....1..*....0.............@....pdata........1.......1.............@..@.idata...#...P3..$....2.............@..@.00cfg........3.......2.............@..@.rsrc...|.....3.......2.............@..@.reloc...x....3..z....3.............@..B........................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):32792
                                Entropy (8bit):6.372276555451265
                                Encrypted:false
                                SSDEEP:384:JYnlpDwZH1XYEMXvdQOsNFYzsQDELCvURDa7qscTHstU0NsICwHLZxXYPoBhT/A4:JYe0Vn5Q28J8qsqMttktuTSTWDG4yhRe
                                MD5:4424BAF6ED5340DF85482FA82B857B03
                                SHA1:181B641BF21C810A486F855864CD4B8967C24C44
                                SHA-256:8C1F7F64579D01FEDFDE07E0906B1F8E607C34D5E6424C87ABE431A2322EBA79
                                SHA-512:8ADB94893ADA555DE2E82F006AB4D571FAD8A1B16AC19CA4D2EFC1065677F25D2DE5C981473FABD0398F6328C1BE1EBD4D36668EA67F8A5D25060F1980EE7E33
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........3..{]A.{]A.{]A...A.{]A..\@.{]A..\@.{]A.{\A.{]A..X@.{]A..Y@.{]A..^@.{]A..Y@.{]A..^@.{]A..]@.{]A.._@.{]ARich.{]A........................PE..d.....\.........." .....F...$.......I...................................................`..........................................j.......m..P....................f...............b...............................b...............`.. ............................text....D.......F.................. ..`.rdata..H....`.......J..............@..@.data................^..............@....pdata...............`..............@..@.reloc...............d..............@..B................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):4183112
                                Entropy (8bit):6.420172758698049
                                Encrypted:false
                                SSDEEP:49152:wV6CJES/Za2BaobNruDPYRQYK8JCNNtkAz+/Q46VqNo9NYxwCFIInKHJCMjntPNj:MxB/aDUQNtufeNFIKHoMjzkDU
                                MD5:D2A8A5E7380D5F4716016777818A32C5
                                SHA1:FB12F31D1D0758FE3E056875461186056121ED0C
                                SHA-256:59AB345C565304F638EFFA7C0236F26041FD06E35041A75988E13995CD28ACE9
                                SHA-512:AD1269D1367F587809E3FBE44AF703C464A88FA3B2AE0BF2AD6544B8ED938E4265AAB7E308D999E6C8297C0C85C608E3160796325286DB3188A3EDF040A02AB7
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.................................7[.........................................B............c...........Rich............................PE..d.....].........." .........."...............................................B.....f.@...`.........................................@I8.....X.9.|.....B.......?.P.....?.H.....B. t..p. .T............................. .................X............................text...$........................... ..`.rdata..............................@..@.data........09......"9.............@....pdata..P.....?......2=.............@..@.rsrc.........B......8?.............@..@.reloc.. t....B..v...D?.............@..B................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):26696
                                Entropy (8bit):6.101296746249305
                                Encrypted:false
                                SSDEEP:768:6kYtqIDCNdwhBfAqXuqzz5H1IGqGbWDG4y4:6TnDCNCh93X7zzR1IGqG2y4
                                MD5:6AE54D103866AAD6F58E119D27552131
                                SHA1:BC53A92A7667FD922CE29E98DFCF5F08F798A3D2
                                SHA-256:63B81AF5D3576473C17AC929BEA0ADD5BF8D7EA95C946CAF66CBB9AD3F233A88
                                SHA-512:FF23F3196A10892EA22B28AE929330C8B08AB64909937609B7AF7BFB1623CD2F02A041FD9FAB24E4BC1754276BDAFD02D832C2F642C8ECDCB233F639BDF66DD0
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................)............................M................M......M......M.E....M......Rich...........PE..d.....].........." .........2......h...............................................a"....`..........................................?..L....@..x....p.......`.......N..H.......,....2..T............................3...............0...............................text...u........................... ..`.rdata.......0......."..............@..@.data........P.......:..............@....pdata.......`.......<..............@..@.rsrc........p.......@..............@..@.reloc..,............L..............@..B................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):1046080
                                Entropy (8bit):6.649151787942547
                                Encrypted:false
                                SSDEEP:24576:L1foGwlaDT22+Pk+j2ZXCE6cctEMmxvSZX0ypCD3:JfoBR2+PfXWrT
                                MD5:4E326FEEB3EBF1E3EB21EEB224345727
                                SHA1:F156A272DBC6695CC170B6091EF8CD41DB7BA040
                                SHA-256:3C60056371F82E4744185B6F2FA0C69042B1E78804685944132974DD13F3B6D9
                                SHA-512:BE9420A85C82EEEE685E18913A7FF152FCEAD72A90DDCC2BCC8AB53A4A1743AE98F49354023C0A32B3A1D919BDA64B5D455F6C3A49D4842BBBA4AA37C1D05D67
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........of...5...5...5..5...5...5&..5...5...5...4...5...4...5...4...5...4...5...4..5...5...5...4...5Rich...5........PE..d....]..........." .....:...........a..............................................4m....`A................................................................. ..........@J..............p........................... f..............................................text... 9.......:.................. ..`.rdata..N....P.......>..............@..@.data....&..........................@....pdata....... ......................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\2a2d6bO44t.exe
                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):1096264
                                Entropy (8bit):5.343512979675051
                                Encrypted:false
                                SSDEEP:12288:EGe9qQOZ67191SnFRFotduNFBjCmN/XlyCAx9++bBlhJk93cgewrxEeBc0bB:EGe9GK4oYhCc/+9nbDhG2wrxc0bB
                                MD5:4C0D43F1A31E76255CB592BB616683E7
                                SHA1:0A9F3D77A6E064BAEBACACC780701117F09169AD
                                SHA-256:0F84E9F0D0BF44D10527A9816FCAB495E3D797B09E7BBD1E6BD666CEB4B6C1A8
                                SHA-512:B8176A180A441FE402E86F055AA5503356E7F49E984D70AB1060DEE4F5F17FCEC9C01F75BBFF75CE5F4EF212677A6525804BE53646CC0D7817B6ED5FD83FD778
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B.0v..^%..^%..^%.f.%..^%Tv_$..^%Tv[$..^%TvZ$..^%Tv]$..^%.w_$..^%cx_$..^%.._%N.^%.wS$..^%.w^$..^%.w.%..^%.w\$..^%Rich..^%................PE..d.....].........." .....L...V.......*..............................................-.....`.........................................p...X..............................H........... )..T............................)...............`..p............................text...1J.......L.................. ..`.rdata..>-...`.......P..............@..@.data................~..............@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................
                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                Entropy (8bit):7.9860965706726645
                                TrID:
                                • Win64 Executable GUI (202006/5) 92.65%
                                • Win64 Executable (generic) (12005/4) 5.51%
                                • Generic Win/DOS Executable (2004/3) 0.92%
                                • DOS Executable Generic (2002/1) 0.92%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:2a2d6bO44t.exe
                                File size:5'915'953 bytes
                                MD5:f6fb58ffdb5677fab17b5a8195c8d09b
                                SHA1:59b4a727b2899edc54586221cea97db5bbed0ba1
                                SHA256:401c641ff4f1215cf2b3624d13d0169dfa8848306f636d46d70f1733249c8461
                                SHA512:a77eb5126a56954501f26e985e36fe6f8aac6d9f87332114696d1811c8a3908ebe9120c3b79d65f55800f0c509b7ed6037364266898ded100a59649ae676bfaa
                                SSDEEP:98304:ubKq2B/JWHioVQWJuhswoYv5eO0zo0Ahd6y0Naxxv8fqDDAx06btVUJFaeV8+qws:uo0HiouWJysVYvsOaoyMxxvjDDAx0aln
                                TLSH:3456335462A00EE6FAF7913DD8A4C811D673B4270711E49B82A44A267F277F0EE39F71
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Xhc.Xhc.Xhc...`._hc...f..hc...g.Rhc.....[hc...`.Qhc...g.Ihc...f.phc...b.Shc.Xhb..hc.K.g.Ahc.K.a.Yhc.RichXhc.........PE..d..
                                Icon Hash:4a464cd47461e179
                                Entrypoint:0x14000c0d0
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x140000000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                Time Stamp:0x671D3371 [Sat Oct 26 18:22:41 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:456e8615ad4320c9f54e50319a19df9c
                                Instruction
                                dec eax
                                sub esp, 28h
                                call 00007FC11CB4435Ch
                                dec eax
                                add esp, 28h
                                jmp 00007FC11CB43F7Fh
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                dec eax
                                sub esp, 28h
                                call 00007FC11CB44728h
                                test eax, eax
                                je 00007FC11CB44123h
                                dec eax
                                mov eax, dword ptr [00000030h]
                                dec eax
                                mov ecx, dword ptr [eax+08h]
                                jmp 00007FC11CB44107h
                                dec eax
                                cmp ecx, eax
                                je 00007FC11CB44116h
                                xor eax, eax
                                dec eax
                                cmpxchg dword ptr [0003843Ch], ecx
                                jne 00007FC11CB440F0h
                                xor al, al
                                dec eax
                                add esp, 28h
                                ret
                                mov al, 01h
                                jmp 00007FC11CB440F9h
                                int3
                                int3
                                int3
                                dec eax
                                sub esp, 28h
                                test ecx, ecx
                                jne 00007FC11CB44109h
                                mov byte ptr [00038425h], 00000001h
                                call 00007FC11CB43855h
                                call 00007FC11CB44B40h
                                test al, al
                                jne 00007FC11CB44106h
                                xor al, al
                                jmp 00007FC11CB44116h
                                call 00007FC11CB5164Fh
                                test al, al
                                jne 00007FC11CB4410Bh
                                xor ecx, ecx
                                call 00007FC11CB44B50h
                                jmp 00007FC11CB440ECh
                                mov al, 01h
                                dec eax
                                add esp, 28h
                                ret
                                int3
                                int3
                                inc eax
                                push ebx
                                dec eax
                                sub esp, 20h
                                cmp byte ptr [000383ECh], 00000000h
                                mov ebx, ecx
                                jne 00007FC11CB44169h
                                cmp ecx, 01h
                                jnbe 00007FC11CB4416Ch
                                call 00007FC11CB4469Eh
                                test eax, eax
                                je 00007FC11CB4412Ah
                                test ebx, ebx
                                jne 00007FC11CB44126h
                                dec eax
                                lea ecx, dword ptr [000383D6h]
                                call 00007FC11CB51442h
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x3c76c0x78.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x490000xf41c.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x460000x2208.pdata
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x768.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x39dc00x1c.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x39c800x140.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x450.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x292100x29400aca64598002ecff9eefbc96554edf015False0.5511067708333334data6.4784482217419175IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x2b0000x126420x128000bdf0c88afc380ff6c182230bad9d958False0.5245196368243243data5.750860297006289IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x3e0000x73d80xe00d0a288978c66419b180b35f625b6dce7False0.13532366071428573data1.8378139998458343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .pdata0x460000x22080x240074cf3ea22e0a1756984435d6f80f7da5False0.4671223958333333data5.259201915045256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .rsrc0x490000xf41c0xf60067d67d1491ed1bb007b5d15c2f5a8a9cFalse0.8030837144308943data7.554978390832909IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x590000x7680x80071de9271648326ec88350e903470cf3eFalse0.5576171875data5.283119454571673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x492080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.585820895522388
                                RT_ICON0x4a0b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.7360108303249098
                                RT_ICON0x4a9580x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.755057803468208
                                RT_ICON0x4aec00x952cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9975384937676757
                                RT_ICON0x543ec0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.3887966804979253
                                RT_ICON0x569940x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.49530956848030017
                                RT_ICON0x57a3c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.7207446808510638
                                RT_GROUP_ICON0x57ea40x68data0.7019230769230769
                                RT_MANIFEST0x57f0c0x50dXML 1.0 document, ASCII text0.4694508894044857
                                DLLImport
                                USER32.dllCreateWindowExW, PostMessageW, GetMessageW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
                                COMCTL32.dll
                                KERNEL32.dllGetACP, IsValidCodePage, GetStringTypeW, GetFileAttributesExW, SetEnvironmentVariableW, FlushFileBuffers, GetCurrentDirectoryW, GetOEMCP, GetCPInfo, GetModuleHandleW, MulDiv, GetLastError, FormatMessageW, GetModuleFileNameW, SetDllDirectoryW, CreateSymbolicLinkW, GetProcAddress, CreateDirectoryW, GetCommandLineW, GetEnvironmentVariableW, ExpandEnvironmentStringsW, GetEnvironmentStringsW, FindClose, FindFirstFileW, FindNextFileW, GetDriveTypeW, RemoveDirectoryW, GetTempPathW, CloseHandle, WaitForSingleObject, Sleep, GetCurrentProcess, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LoadLibraryExW, LocalFree, SetConsoleCtrlHandler, K32EnumProcessModules, K32GetModuleFileNameExW, CreateFileW, FindFirstFileExW, GetFinalPathNameByHandleW, MultiByteToWideChar, WideCharToMultiByte, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, IsProcessorFeaturePresent, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, ReadFile, GetFullPathNameW, SetStdHandle, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW
                                ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
                                GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
                                No network behavior found

                                Click to jump to process

                                Click to jump to process

                                Click to jump to process

                                Target ID:0
                                Start time:23:24:56
                                Start date:29/10/2024
                                Path:C:\Users\user\Desktop\2a2d6bO44t.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\2a2d6bO44t.exe"
                                Imagebase:0x7ff733f60000
                                File size:5'915'953 bytes
                                MD5 hash:F6FB58FFDB5677FAB17B5A8195C8D09B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:1
                                Start time:23:24:57
                                Start date:29/10/2024
                                Path:C:\Users\user\Desktop\2a2d6bO44t.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\2a2d6bO44t.exe"
                                Imagebase:0x7ff733f60000
                                File size:5'915'953 bytes
                                MD5 hash:F6FB58FFDB5677FAB17B5A8195C8D09B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:9.5%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:19.6%
                                  Total number of Nodes:2000
                                  Total number of Limit Nodes:55
                                  execution_graph 19572 7ff733f7ec9c 19573 7ff733f7ee8e 19572->19573 19575 7ff733f7ecde _isindst 19572->19575 19574 7ff733f743f4 _get_daylight 11 API calls 19573->19574 19592 7ff733f7ee7e 19574->19592 19575->19573 19578 7ff733f7ed5e _isindst 19575->19578 19576 7ff733f6b870 _log10_special 8 API calls 19577 7ff733f7eea9 19576->19577 19593 7ff733f854a4 19578->19593 19583 7ff733f7eeba 19585 7ff733f79c10 _isindst 17 API calls 19583->19585 19586 7ff733f7eece 19585->19586 19590 7ff733f7edbb 19590->19592 19618 7ff733f854e8 19590->19618 19592->19576 19594 7ff733f854b3 19593->19594 19595 7ff733f7ed7c 19593->19595 19625 7ff733f7f5e8 EnterCriticalSection 19594->19625 19600 7ff733f848a8 19595->19600 19601 7ff733f848b1 19600->19601 19605 7ff733f7ed91 19600->19605 19602 7ff733f743f4 _get_daylight 11 API calls 19601->19602 19603 7ff733f848b6 19602->19603 19604 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 19603->19604 19604->19605 19605->19583 19606 7ff733f848d8 19605->19606 19607 7ff733f7eda2 19606->19607 19608 7ff733f848e1 19606->19608 19607->19583 19612 7ff733f84908 19607->19612 19609 7ff733f743f4 _get_daylight 11 API calls 19608->19609 19610 7ff733f848e6 19609->19610 19611 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 19610->19611 19611->19607 19613 7ff733f84911 19612->19613 19617 7ff733f7edb3 19612->19617 19614 7ff733f743f4 _get_daylight 11 API calls 19613->19614 19615 7ff733f84916 19614->19615 19616 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 19615->19616 19616->19617 19617->19583 19617->19590 19626 7ff733f7f5e8 EnterCriticalSection 19618->19626 19164 7ff733f74720 19165 7ff733f7472b 19164->19165 19173 7ff733f7e5b4 19165->19173 19186 7ff733f7f5e8 EnterCriticalSection 19173->19186 19213 7ff733f7b830 19224 7ff733f7f5e8 EnterCriticalSection 19213->19224 19011 7ff733f74938 19012 7ff733f74952 19011->19012 19013 7ff733f7496f 19011->19013 19014 7ff733f743d4 _fread_nolock 11 API calls 19012->19014 19013->19012 19015 7ff733f74982 CreateFileW 19013->19015 19016 7ff733f74957 19014->19016 19017 7ff733f749ec 19015->19017 19018 7ff733f749b6 19015->19018 19019 7ff733f743f4 _get_daylight 11 API calls 19016->19019 19062 7ff733f74f14 19017->19062 19036 7ff733f74a8c GetFileType 19018->19036 19022 7ff733f7495f 19019->19022 19027 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 19022->19027 19025 7ff733f749f5 19030 7ff733f74368 _fread_nolock 11 API calls 19025->19030 19026 7ff733f74a20 19083 7ff733f74cd4 19026->19083 19032 7ff733f7496a 19027->19032 19028 7ff733f749cb CloseHandle 19028->19032 19029 7ff733f749e1 CloseHandle 19029->19032 19035 7ff733f749ff 19030->19035 19035->19032 19037 7ff733f74ada 19036->19037 19038 7ff733f74b97 19036->19038 19041 7ff733f74b06 GetFileInformationByHandle 19037->19041 19046 7ff733f74e10 21 API calls 19037->19046 19039 7ff733f74bc1 19038->19039 19040 7ff733f74b9f 19038->19040 19045 7ff733f74be4 PeekNamedPipe 19039->19045 19050 7ff733f74b82 19039->19050 19042 7ff733f74ba3 19040->19042 19043 7ff733f74bb2 GetLastError 19040->19043 19041->19043 19044 7ff733f74b2f 19041->19044 19047 7ff733f743f4 _get_daylight 11 API calls 19042->19047 19049 7ff733f74368 _fread_nolock 11 API calls 19043->19049 19048 7ff733f74cd4 51 API calls 19044->19048 19045->19050 19051 7ff733f74af4 19046->19051 19047->19050 19052 7ff733f74b3a 19048->19052 19049->19050 19053 7ff733f6b870 _log10_special 8 API calls 19050->19053 19051->19041 19051->19050 19100 7ff733f74c34 19052->19100 19055 7ff733f749c4 19053->19055 19055->19028 19055->19029 19057 7ff733f74c34 10 API calls 19058 7ff733f74b59 19057->19058 19059 7ff733f74c34 10 API calls 19058->19059 19060 7ff733f74b6a 19059->19060 19060->19050 19061 7ff733f743f4 _get_daylight 11 API calls 19060->19061 19061->19050 19063 7ff733f74f4a 19062->19063 19064 7ff733f74fe2 __std_exception_destroy 19063->19064 19065 7ff733f743f4 _get_daylight 11 API calls 19063->19065 19066 7ff733f6b870 _log10_special 8 API calls 19064->19066 19067 7ff733f74f5c 19065->19067 19068 7ff733f749f1 19066->19068 19069 7ff733f743f4 _get_daylight 11 API calls 19067->19069 19068->19025 19068->19026 19070 7ff733f74f64 19069->19070 19071 7ff733f77118 45 API calls 19070->19071 19072 7ff733f74f79 19071->19072 19073 7ff733f74f8b 19072->19073 19074 7ff733f74f81 19072->19074 19076 7ff733f743f4 _get_daylight 11 API calls 19073->19076 19075 7ff733f743f4 _get_daylight 11 API calls 19074->19075 19079 7ff733f74f86 19075->19079 19077 7ff733f74f90 19076->19077 19077->19064 19078 7ff733f743f4 _get_daylight 11 API calls 19077->19078 19080 7ff733f74f9a 19078->19080 19079->19064 19082 7ff733f74fd4 GetDriveTypeW 19079->19082 19081 7ff733f77118 45 API calls 19080->19081 19081->19079 19082->19064 19085 7ff733f74cfc 19083->19085 19084 7ff733f74a2d 19093 7ff733f74e10 19084->19093 19085->19084 19107 7ff733f7ea34 19085->19107 19087 7ff733f74d90 19087->19084 19088 7ff733f7ea34 51 API calls 19087->19088 19089 7ff733f74da3 19088->19089 19089->19084 19090 7ff733f7ea34 51 API calls 19089->19090 19091 7ff733f74db6 19090->19091 19091->19084 19092 7ff733f7ea34 51 API calls 19091->19092 19092->19084 19094 7ff733f74e2a 19093->19094 19095 7ff733f74e61 19094->19095 19096 7ff733f74e3a 19094->19096 19097 7ff733f7e8c8 21 API calls 19095->19097 19098 7ff733f74368 _fread_nolock 11 API calls 19096->19098 19099 7ff733f74e4a 19096->19099 19097->19099 19098->19099 19099->19035 19101 7ff733f74c5d FileTimeToSystemTime 19100->19101 19102 7ff733f74c50 19100->19102 19103 7ff733f74c71 SystemTimeToTzSpecificLocalTime 19101->19103 19104 7ff733f74c58 19101->19104 19102->19101 19102->19104 19103->19104 19105 7ff733f6b870 _log10_special 8 API calls 19104->19105 19106 7ff733f74b49 19105->19106 19106->19057 19108 7ff733f7ea65 19107->19108 19109 7ff733f7ea41 19107->19109 19111 7ff733f7ea9f 19108->19111 19115 7ff733f7eabe 19108->19115 19109->19108 19110 7ff733f7ea46 19109->19110 19112 7ff733f743f4 _get_daylight 11 API calls 19110->19112 19114 7ff733f743f4 _get_daylight 11 API calls 19111->19114 19113 7ff733f7ea4b 19112->19113 19116 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 19113->19116 19117 7ff733f7eaa4 19114->19117 19118 7ff733f74178 45 API calls 19115->19118 19119 7ff733f7ea56 19116->19119 19120 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 19117->19120 19123 7ff733f7eacb 19118->19123 19119->19087 19121 7ff733f7eaaf 19120->19121 19121->19087 19122 7ff733f7f7ec 51 API calls 19122->19123 19123->19121 19123->19122 19904 7ff733f809c0 19915 7ff733f866f4 19904->19915 19916 7ff733f86701 19915->19916 19917 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19916->19917 19919 7ff733f8671d 19916->19919 19917->19916 19918 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19918->19919 19919->19918 19920 7ff733f809c9 19919->19920 19921 7ff733f7f5e8 EnterCriticalSection 19920->19921 15623 7ff733f6bf5c 15644 7ff733f6c12c 15623->15644 15626 7ff733f6c0a8 15767 7ff733f6c44c IsProcessorFeaturePresent 15626->15767 15627 7ff733f6bf78 __scrt_acquire_startup_lock 15629 7ff733f6c0b2 15627->15629 15635 7ff733f6bf96 __scrt_release_startup_lock 15627->15635 15630 7ff733f6c44c 7 API calls 15629->15630 15632 7ff733f6c0bd __CxxCallCatchBlock 15630->15632 15631 7ff733f6bfbb 15633 7ff733f6c041 15650 7ff733f6c594 15633->15650 15635->15631 15635->15633 15756 7ff733f78e44 15635->15756 15637 7ff733f6c046 15653 7ff733f61000 15637->15653 15642 7ff733f6c069 15642->15632 15763 7ff733f6c2b0 15642->15763 15645 7ff733f6c134 15644->15645 15646 7ff733f6c140 __scrt_dllmain_crt_thread_attach 15645->15646 15647 7ff733f6c14d 15646->15647 15649 7ff733f6bf70 15646->15649 15647->15649 15774 7ff733f6cba8 15647->15774 15649->15626 15649->15627 15801 7ff733f897e0 15650->15801 15654 7ff733f61009 15653->15654 15803 7ff733f74794 15654->15803 15656 7ff733f6352b 15810 7ff733f633e0 15656->15810 15659 7ff733f63538 16001 7ff733f6b870 15659->16001 15664 7ff733f6356c 15667 7ff733f61bf0 49 API calls 15664->15667 15665 7ff733f63736 16010 7ff733f63f70 15665->16010 15674 7ff733f63588 15667->15674 15669 7ff733f63785 15671 7ff733f625f0 53 API calls 15669->15671 15671->15659 15673 7ff733f63778 15676 7ff733f6377d 15673->15676 15677 7ff733f6379f 15673->15677 15872 7ff733f67e10 15674->15872 15675 7ff733f6365f __std_exception_destroy 15679 7ff733f63834 15675->15679 15682 7ff733f67e10 14 API calls 15675->15682 16029 7ff733f6f36c 15676->16029 15678 7ff733f61bf0 49 API calls 15677->15678 15681 7ff733f637be 15678->15681 15706 7ff733f63805 __std_exception_destroy 15679->15706 16033 7ff733f63e90 15679->16033 15690 7ff733f618f0 115 API calls 15681->15690 15684 7ff733f636ae 15682->15684 15885 7ff733f67f80 15684->15885 15685 7ff733f63852 15687 7ff733f63865 15685->15687 15688 7ff733f63871 15685->15688 16036 7ff733f63fe0 15687->16036 15689 7ff733f61bf0 49 API calls 15688->15689 15689->15706 15693 7ff733f637df 15690->15693 15691 7ff733f636bd 15694 7ff733f6380f 15691->15694 15698 7ff733f636cf 15691->15698 15693->15674 15697 7ff733f637ef 15693->15697 15894 7ff733f68400 15694->15894 15701 7ff733f625f0 53 API calls 15697->15701 15890 7ff733f61bf0 15698->15890 15700 7ff733f6389e SetDllDirectoryW 15708 7ff733f638c3 15700->15708 15701->15659 15705 7ff733f636fc 15990 7ff733f625f0 15705->15990 15945 7ff733f686b0 15706->15945 15710 7ff733f63a50 15708->15710 15950 7ff733f66560 15708->15950 15712 7ff733f63a7d 15710->15712 15713 7ff733f63a5a PostMessageW GetMessageW 15710->15713 16094 7ff733f63080 15712->16094 15713->15712 15716 7ff733f638ea 15718 7ff733f63947 15716->15718 15720 7ff733f63901 15716->15720 16039 7ff733f665a0 15716->16039 15718->15710 15724 7ff733f6395c 15718->15724 15732 7ff733f63905 15720->15732 16060 7ff733f66970 15720->16060 15970 7ff733f630e0 15724->15970 15728 7ff733f66780 FreeLibrary 15731 7ff733f63aa3 15728->15731 15732->15718 16076 7ff733f62870 15732->16076 15757 7ff733f78e7c 15756->15757 15758 7ff733f78e5b 15756->15758 18281 7ff733f796e8 15757->18281 15758->15633 15761 7ff733f6c5d8 GetModuleHandleW 15762 7ff733f6c5e9 15761->15762 15762->15642 15764 7ff733f6c2c1 15763->15764 15765 7ff733f6c080 15764->15765 15766 7ff733f6cba8 7 API calls 15764->15766 15765->15631 15766->15765 15768 7ff733f6c472 __CxxCallCatchBlock __scrt_get_show_window_mode 15767->15768 15769 7ff733f6c491 RtlCaptureContext RtlLookupFunctionEntry 15768->15769 15770 7ff733f6c4ba RtlVirtualUnwind 15769->15770 15771 7ff733f6c4f6 __scrt_get_show_window_mode 15769->15771 15770->15771 15772 7ff733f6c528 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15771->15772 15773 7ff733f6c576 __CxxCallCatchBlock 15772->15773 15773->15629 15775 7ff733f6cbba 15774->15775 15776 7ff733f6cbb0 15774->15776 15775->15649 15780 7ff733f6cf44 15776->15780 15781 7ff733f6cf53 15780->15781 15782 7ff733f6cbb5 15780->15782 15788 7ff733f6d180 15781->15788 15784 7ff733f6cfb0 15782->15784 15785 7ff733f6cfdb 15784->15785 15786 7ff733f6cfbe DeleteCriticalSection 15785->15786 15787 7ff733f6cfdf 15785->15787 15786->15785 15787->15775 15792 7ff733f6cfe8 15788->15792 15797 7ff733f6d0d2 TlsFree 15792->15797 15798 7ff733f6d02c __vcrt_InitializeCriticalSectionEx 15792->15798 15793 7ff733f6d05a LoadLibraryExW 15795 7ff733f6d07b GetLastError 15793->15795 15796 7ff733f6d0f9 15793->15796 15794 7ff733f6d119 GetProcAddress 15794->15797 15795->15798 15796->15794 15799 7ff733f6d110 FreeLibrary 15796->15799 15798->15793 15798->15794 15798->15797 15800 7ff733f6d09d LoadLibraryExW 15798->15800 15799->15794 15800->15796 15800->15798 15802 7ff733f6c5ab GetStartupInfoW 15801->15802 15802->15637 15806 7ff733f7e790 15803->15806 15804 7ff733f7e7e3 16107 7ff733f79b24 15804->16107 15806->15804 15807 7ff733f7e836 15806->15807 16117 7ff733f7e668 15807->16117 15809 7ff733f7e80c 15809->15656 16224 7ff733f6bb70 15810->16224 15812 7ff733f633ec GetModuleFileNameW 15813 7ff733f6341b 15812->15813 15814 7ff733f63438 15812->15814 16231 7ff733f629e0 15813->16231 16226 7ff733f685a0 FindFirstFileExW 15814->16226 15818 7ff733f6344b 16241 7ff733f68620 CreateFileW 15818->16241 15819 7ff733f634a5 16250 7ff733f68760 15819->16250 15821 7ff733f6b870 _log10_special 8 API calls 15823 7ff733f634dd 15821->15823 15823->15659 15832 7ff733f618f0 15823->15832 15825 7ff733f6342e 15825->15821 15826 7ff733f634b3 15826->15825 15829 7ff733f626c0 49 API calls 15826->15829 15827 7ff733f6345c 16244 7ff733f626c0 15827->16244 15828 7ff733f63474 __vcrt_InitializeCriticalSectionEx 15828->15819 15829->15825 15833 7ff733f63f70 108 API calls 15832->15833 15834 7ff733f61925 15833->15834 15835 7ff733f61bb6 15834->15835 15836 7ff733f676a0 83 API calls 15834->15836 15837 7ff733f6b870 _log10_special 8 API calls 15835->15837 15838 7ff733f6196b 15836->15838 15839 7ff733f61bd1 15837->15839 15871 7ff733f6199c 15838->15871 16655 7ff733f6f9f4 15838->16655 15839->15664 15839->15665 15841 7ff733f6f36c 74 API calls 15841->15835 15842 7ff733f61985 15843 7ff733f61989 15842->15843 15844 7ff733f619a1 15842->15844 16662 7ff733f62760 15843->16662 16659 7ff733f6f6bc 15844->16659 15848 7ff733f619d7 15851 7ff733f619ee 15848->15851 15852 7ff733f61a06 15848->15852 15849 7ff733f619bf 15850 7ff733f62760 53 API calls 15849->15850 15850->15871 15853 7ff733f62760 53 API calls 15851->15853 15854 7ff733f61bf0 49 API calls 15852->15854 15853->15871 15855 7ff733f61a1d 15854->15855 15856 7ff733f61bf0 49 API calls 15855->15856 15857 7ff733f61a68 15856->15857 15858 7ff733f6f9f4 73 API calls 15857->15858 15859 7ff733f61a8c 15858->15859 15860 7ff733f61ab9 15859->15860 15861 7ff733f61aa1 15859->15861 15862 7ff733f6f6bc _fread_nolock 53 API calls 15860->15862 15863 7ff733f62760 53 API calls 15861->15863 15864 7ff733f61ace 15862->15864 15863->15871 15865 7ff733f61aec 15864->15865 15866 7ff733f61ad4 15864->15866 16679 7ff733f6f430 15865->16679 15867 7ff733f62760 53 API calls 15866->15867 15867->15871 15870 7ff733f625f0 53 API calls 15870->15871 15871->15841 15873 7ff733f67e1a 15872->15873 15874 7ff733f686b0 2 API calls 15873->15874 15875 7ff733f67e39 GetEnvironmentVariableW 15874->15875 15876 7ff733f67e56 ExpandEnvironmentStringsW 15875->15876 15877 7ff733f67ea2 15875->15877 15876->15877 15878 7ff733f67e78 15876->15878 15879 7ff733f6b870 _log10_special 8 API calls 15877->15879 15880 7ff733f68760 2 API calls 15878->15880 15881 7ff733f67eb4 15879->15881 15882 7ff733f67e8a 15880->15882 15881->15675 15883 7ff733f6b870 _log10_special 8 API calls 15882->15883 15884 7ff733f67e9a 15883->15884 15884->15675 15886 7ff733f686b0 2 API calls 15885->15886 15887 7ff733f67f94 15886->15887 16888 7ff733f77548 15887->16888 15889 7ff733f67fa6 __std_exception_destroy 15889->15691 15891 7ff733f61c15 15890->15891 15892 7ff733f73ca4 49 API calls 15891->15892 15893 7ff733f61c38 15892->15893 15893->15705 15893->15706 15895 7ff733f68415 15894->15895 16906 7ff733f67b50 GetCurrentProcess OpenProcessToken 15895->16906 15898 7ff733f67b50 7 API calls 15899 7ff733f68441 15898->15899 15900 7ff733f6845a 15899->15900 15901 7ff733f68474 15899->15901 15902 7ff733f62590 48 API calls 15900->15902 15903 7ff733f62590 48 API calls 15901->15903 15904 7ff733f68472 15902->15904 15905 7ff733f68487 LocalFree LocalFree 15903->15905 15904->15905 15906 7ff733f684a3 15905->15906 15909 7ff733f684af 15905->15909 16916 7ff733f62940 15906->16916 15908 7ff733f6b870 _log10_special 8 API calls 15909->15908 15946 7ff733f686d2 MultiByteToWideChar 15945->15946 15948 7ff733f686f6 15945->15948 15946->15948 15949 7ff733f6870c __std_exception_destroy 15946->15949 15947 7ff733f68713 MultiByteToWideChar 15947->15949 15948->15947 15948->15949 15949->15700 15951 7ff733f66575 15950->15951 15952 7ff733f638d5 15951->15952 15953 7ff733f62760 53 API calls 15951->15953 15954 7ff733f66b00 15952->15954 15953->15952 15955 7ff733f66b30 15954->15955 15965 7ff733f66b4a __std_exception_destroy 15954->15965 15955->15965 17200 7ff733f61440 15955->17200 15957 7ff733f66b54 15958 7ff733f63fe0 49 API calls 15957->15958 15957->15965 15959 7ff733f66b76 15958->15959 15960 7ff733f63fe0 49 API calls 15959->15960 15962 7ff733f66b7b 15959->15962 15963 7ff733f66b9a 15960->15963 15961 7ff733f62870 53 API calls 15961->15965 15962->15961 15963->15962 15964 7ff733f63fe0 49 API calls 15963->15964 15966 7ff733f66bb6 15964->15966 15965->15716 15966->15962 15967 7ff733f66bbf 15966->15967 15981 7ff733f630ee __scrt_get_show_window_mode 15970->15981 15971 7ff733f6b870 _log10_special 8 API calls 15973 7ff733f6338e 15971->15973 15972 7ff733f632e7 15972->15971 15973->15659 15989 7ff733f683e0 LocalFree 15973->15989 15975 7ff733f61bf0 49 API calls 15975->15981 15976 7ff733f63309 15978 7ff733f625f0 53 API calls 15976->15978 15978->15972 15981->15972 15981->15975 15981->15976 15982 7ff733f632e9 15981->15982 15984 7ff733f62870 53 API calls 15981->15984 15987 7ff733f632f7 15981->15987 17261 7ff733f63f10 15981->17261 17267 7ff733f67530 15981->17267 17279 7ff733f615c0 15981->17279 17317 7ff733f668e0 15981->17317 17321 7ff733f63b40 15981->17321 17365 7ff733f63e00 15981->17365 15983 7ff733f625f0 53 API calls 15982->15983 15983->15972 15984->15981 15988 7ff733f625f0 53 API calls 15987->15988 15988->15972 15991 7ff733f6262a 15990->15991 15992 7ff733f73ca4 49 API calls 15991->15992 15993 7ff733f62652 15992->15993 15994 7ff733f686b0 2 API calls 15993->15994 15995 7ff733f6266a 15994->15995 15996 7ff733f6268e MessageBoxA 15995->15996 15997 7ff733f62677 MessageBoxW 15995->15997 16002 7ff733f6b879 16001->16002 16003 7ff733f6372a 16002->16003 16004 7ff733f6bc00 IsProcessorFeaturePresent 16002->16004 16003->15761 16005 7ff733f6bc18 16004->16005 17501 7ff733f6bdf8 RtlCaptureContext 16005->17501 16011 7ff733f63f7c 16010->16011 16012 7ff733f686b0 2 API calls 16011->16012 16013 7ff733f63fa4 16012->16013 16014 7ff733f686b0 2 API calls 16013->16014 16015 7ff733f63fb7 16014->16015 17506 7ff733f752a4 16015->17506 16018 7ff733f6b870 _log10_special 8 API calls 16019 7ff733f63746 16018->16019 16019->15669 16020 7ff733f676a0 16019->16020 16021 7ff733f676c4 16020->16021 16022 7ff733f6779b __std_exception_destroy 16021->16022 16023 7ff733f6f9f4 73 API calls 16021->16023 16022->15673 16024 7ff733f676e0 16023->16024 16024->16022 17897 7ff733f76bd8 16024->17897 16026 7ff733f6f9f4 73 API calls 16028 7ff733f676f5 16026->16028 16027 7ff733f6f6bc _fread_nolock 53 API calls 16027->16028 16028->16022 16028->16026 16028->16027 16030 7ff733f6f39c 16029->16030 17912 7ff733f6f148 16030->17912 16032 7ff733f6f3b5 16032->15669 16034 7ff733f61bf0 49 API calls 16033->16034 16035 7ff733f63ead 16034->16035 16035->15685 16037 7ff733f61bf0 49 API calls 16036->16037 16038 7ff733f64010 16037->16038 16038->15706 16057 7ff733f665bc 16039->16057 16040 7ff733f666df 16041 7ff733f6b870 _log10_special 8 API calls 16040->16041 16043 7ff733f666f1 16041->16043 16042 7ff733f617e0 45 API calls 16042->16057 16043->15720 16044 7ff733f6675d 16046 7ff733f625f0 53 API calls 16044->16046 16045 7ff733f61bf0 49 API calls 16045->16057 16046->16040 16047 7ff733f6674a 16048 7ff733f625f0 53 API calls 16047->16048 16048->16040 16049 7ff733f63f10 10 API calls 16049->16057 16050 7ff733f6670d 16052 7ff733f625f0 53 API calls 16050->16052 16051 7ff733f67530 52 API calls 16051->16057 16052->16040 16053 7ff733f62870 53 API calls 16053->16057 16054 7ff733f66737 16056 7ff733f625f0 53 API calls 16054->16056 16055 7ff733f615c0 118 API calls 16055->16057 16056->16040 16057->16040 16057->16042 16057->16044 16057->16045 16057->16047 16057->16049 16057->16050 16057->16051 16057->16053 16057->16054 16057->16055 16058 7ff733f66720 16057->16058 16059 7ff733f625f0 53 API calls 16058->16059 16059->16040 17923 7ff733f681a0 16060->17923 16062 7ff733f66989 16063 7ff733f681a0 3 API calls 16062->16063 16065 7ff733f6699c 16063->16065 16064 7ff733f669cf 16066 7ff733f625f0 53 API calls 16064->16066 16065->16064 16067 7ff733f669b4 16065->16067 16068 7ff733f63916 16066->16068 17927 7ff733f66ea0 GetProcAddress 16067->17927 16068->15732 16070 7ff733f66cd0 16068->16070 16071 7ff733f66ced 16070->16071 16077 7ff733f628aa 16076->16077 16078 7ff733f73ca4 49 API calls 16077->16078 16079 7ff733f628d2 16078->16079 16080 7ff733f686b0 2 API calls 16079->16080 16081 7ff733f628ea 16080->16081 16082 7ff733f6290e MessageBoxA 16081->16082 16083 7ff733f628f7 MessageBoxW 16081->16083 16084 7ff733f62920 16082->16084 16083->16084 16085 7ff733f6b870 _log10_special 8 API calls 16084->16085 16086 7ff733f62930 16085->16086 16087 7ff733f66780 16086->16087 16088 7ff733f668d6 16087->16088 16093 7ff733f66792 16087->16093 16088->15718 17992 7ff733f65af0 16094->17992 16102 7ff733f630b9 16103 7ff733f633a0 16102->16103 16104 7ff733f633ae 16103->16104 16105 7ff733f633bf 16104->16105 18280 7ff733f68180 FreeLibrary 16104->18280 16105->15728 16124 7ff733f7986c 16107->16124 16110 7ff733f79b5f 16110->15809 16223 7ff733f7477c EnterCriticalSection 16117->16223 16125 7ff733f79888 GetLastError 16124->16125 16126 7ff733f798c3 16124->16126 16127 7ff733f79898 16125->16127 16126->16110 16130 7ff733f798d8 16126->16130 16137 7ff733f7a6a0 16127->16137 16131 7ff733f7990c 16130->16131 16132 7ff733f798f4 GetLastError SetLastError 16130->16132 16131->16110 16133 7ff733f79c10 IsProcessorFeaturePresent 16131->16133 16132->16131 16134 7ff733f79c23 16133->16134 16215 7ff733f79924 16134->16215 16138 7ff733f7a6da FlsSetValue 16137->16138 16139 7ff733f7a6bf FlsGetValue 16137->16139 16141 7ff733f7a6e7 16138->16141 16142 7ff733f798b3 SetLastError 16138->16142 16140 7ff733f7a6d4 16139->16140 16139->16142 16140->16138 16154 7ff733f7dea8 16141->16154 16142->16126 16145 7ff733f7a714 FlsSetValue 16148 7ff733f7a732 16145->16148 16149 7ff733f7a720 FlsSetValue 16145->16149 16146 7ff733f7a704 FlsSetValue 16147 7ff733f7a70d 16146->16147 16161 7ff733f79c58 16147->16161 16167 7ff733f7a204 16148->16167 16149->16147 16159 7ff733f7deb9 _get_daylight 16154->16159 16155 7ff733f7df0a 16175 7ff733f743f4 16155->16175 16156 7ff733f7deee HeapAlloc 16157 7ff733f7a6f6 16156->16157 16156->16159 16157->16145 16157->16146 16159->16155 16159->16156 16172 7ff733f828a0 16159->16172 16162 7ff733f79c5d RtlFreeHeap 16161->16162 16163 7ff733f79c8c 16161->16163 16162->16163 16164 7ff733f79c78 GetLastError 16162->16164 16163->16142 16165 7ff733f79c85 Concurrency::details::SchedulerProxy::DeleteThis 16164->16165 16166 7ff733f743f4 _get_daylight 9 API calls 16165->16166 16166->16163 16201 7ff733f7a0dc 16167->16201 16178 7ff733f828e0 16172->16178 16184 7ff733f7a5d8 GetLastError 16175->16184 16177 7ff733f743fd 16177->16157 16183 7ff733f7f5e8 EnterCriticalSection 16178->16183 16185 7ff733f7a619 FlsSetValue 16184->16185 16191 7ff733f7a5fc 16184->16191 16186 7ff733f7a62b 16185->16186 16190 7ff733f7a609 16185->16190 16187 7ff733f7dea8 _get_daylight 5 API calls 16186->16187 16189 7ff733f7a63a 16187->16189 16188 7ff733f7a685 SetLastError 16188->16177 16192 7ff733f7a658 FlsSetValue 16189->16192 16193 7ff733f7a648 FlsSetValue 16189->16193 16190->16188 16191->16185 16191->16190 16195 7ff733f7a676 16192->16195 16196 7ff733f7a664 FlsSetValue 16192->16196 16194 7ff733f7a651 16193->16194 16197 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 16194->16197 16198 7ff733f7a204 _get_daylight 5 API calls 16195->16198 16196->16194 16197->16190 16199 7ff733f7a67e 16198->16199 16200 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 16199->16200 16200->16188 16213 7ff733f7f5e8 EnterCriticalSection 16201->16213 16216 7ff733f7995e __CxxCallCatchBlock __scrt_get_show_window_mode 16215->16216 16217 7ff733f79986 RtlCaptureContext RtlLookupFunctionEntry 16216->16217 16218 7ff733f799f6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16217->16218 16219 7ff733f799c0 RtlVirtualUnwind 16217->16219 16220 7ff733f79a48 __CxxCallCatchBlock 16218->16220 16219->16218 16221 7ff733f6b870 _log10_special 8 API calls 16220->16221 16222 7ff733f79a67 GetCurrentProcess TerminateProcess 16221->16222 16225 7ff733f6bb9a 16224->16225 16225->15812 16225->16225 16227 7ff733f685df FindClose 16226->16227 16228 7ff733f685f2 16226->16228 16227->16228 16229 7ff733f6b870 _log10_special 8 API calls 16228->16229 16230 7ff733f63442 16229->16230 16230->15818 16230->15819 16232 7ff733f6bb70 16231->16232 16233 7ff733f629fc GetLastError 16232->16233 16234 7ff733f62a29 16233->16234 16255 7ff733f73ef8 16234->16255 16239 7ff733f6b870 _log10_special 8 API calls 16240 7ff733f62ae5 16239->16240 16240->15825 16242 7ff733f63458 16241->16242 16243 7ff733f68660 GetFinalPathNameByHandleW CloseHandle 16241->16243 16242->15827 16242->15828 16243->16242 16245 7ff733f626fa 16244->16245 16246 7ff733f73ef8 48 API calls 16245->16246 16247 7ff733f62722 MessageBoxW 16246->16247 16248 7ff733f6b870 _log10_special 8 API calls 16247->16248 16249 7ff733f6274c 16248->16249 16249->15825 16251 7ff733f6878a WideCharToMultiByte 16250->16251 16252 7ff733f687b5 16250->16252 16251->16252 16254 7ff733f687cb __std_exception_destroy 16251->16254 16253 7ff733f687d2 WideCharToMultiByte 16252->16253 16252->16254 16253->16254 16254->15826 16258 7ff733f73f52 16255->16258 16256 7ff733f73f77 16257 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16256->16257 16261 7ff733f73fa1 16257->16261 16258->16256 16259 7ff733f73fb3 16258->16259 16277 7ff733f722b0 16259->16277 16262 7ff733f6b870 _log10_special 8 API calls 16261->16262 16264 7ff733f62a54 FormatMessageW 16262->16264 16263 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16263->16261 16273 7ff733f62590 16264->16273 16266 7ff733f740ba 16268 7ff733f74094 16266->16268 16269 7ff733f740c4 16266->16269 16267 7ff733f74060 16267->16268 16272 7ff733f74069 16267->16272 16268->16263 16271 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16269->16271 16270 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16270->16261 16271->16261 16272->16270 16274 7ff733f625b5 16273->16274 16275 7ff733f73ef8 48 API calls 16274->16275 16276 7ff733f625d8 MessageBoxW 16275->16276 16276->16239 16278 7ff733f722ee 16277->16278 16279 7ff733f722de 16277->16279 16280 7ff733f722f7 16278->16280 16284 7ff733f72325 16278->16284 16283 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16279->16283 16281 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16280->16281 16282 7ff733f7231d 16281->16282 16282->16266 16282->16267 16282->16268 16282->16272 16283->16282 16284->16279 16284->16282 16288 7ff733f72cc4 16284->16288 16321 7ff733f72710 16284->16321 16358 7ff733f71ea0 16284->16358 16289 7ff733f72d77 16288->16289 16290 7ff733f72d06 16288->16290 16291 7ff733f72d7c 16289->16291 16292 7ff733f72dd0 16289->16292 16293 7ff733f72d0c 16290->16293 16294 7ff733f72da1 16290->16294 16295 7ff733f72d7e 16291->16295 16296 7ff733f72db1 16291->16296 16299 7ff733f72de7 16292->16299 16300 7ff733f72dda 16292->16300 16306 7ff733f72ddf 16292->16306 16297 7ff733f72d11 16293->16297 16298 7ff733f72d40 16293->16298 16381 7ff733f71074 16294->16381 16309 7ff733f72d20 16295->16309 16310 7ff733f72d8d 16295->16310 16388 7ff733f70c64 16296->16388 16297->16299 16301 7ff733f72d17 16297->16301 16298->16301 16298->16306 16395 7ff733f739cc 16299->16395 16300->16294 16300->16306 16308 7ff733f72d52 16301->16308 16301->16309 16316 7ff733f72d3b 16301->16316 16319 7ff733f72e10 16306->16319 16399 7ff733f71484 16306->16399 16308->16319 16371 7ff733f737b4 16308->16371 16309->16319 16361 7ff733f73478 16309->16361 16310->16294 16311 7ff733f72d92 16310->16311 16311->16319 16377 7ff733f73878 16311->16377 16313 7ff733f6b870 _log10_special 8 API calls 16314 7ff733f7310a 16313->16314 16314->16284 16316->16319 16320 7ff733f72ffc 16316->16320 16406 7ff733f73ae0 16316->16406 16319->16313 16320->16319 16412 7ff733f7dd18 16320->16412 16322 7ff733f7271e 16321->16322 16323 7ff733f72734 16321->16323 16324 7ff733f72774 16322->16324 16326 7ff733f72d77 16322->16326 16327 7ff733f72d06 16322->16327 16323->16324 16325 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16323->16325 16324->16284 16325->16324 16328 7ff733f72d7c 16326->16328 16329 7ff733f72dd0 16326->16329 16330 7ff733f72d0c 16327->16330 16331 7ff733f72da1 16327->16331 16332 7ff733f72d7e 16328->16332 16333 7ff733f72db1 16328->16333 16336 7ff733f72de7 16329->16336 16338 7ff733f72dda 16329->16338 16343 7ff733f72ddf 16329->16343 16334 7ff733f72d11 16330->16334 16335 7ff733f72d40 16330->16335 16340 7ff733f71074 38 API calls 16331->16340 16337 7ff733f72d20 16332->16337 16347 7ff733f72d8d 16332->16347 16341 7ff733f70c64 38 API calls 16333->16341 16334->16336 16339 7ff733f72d17 16334->16339 16335->16339 16335->16343 16344 7ff733f739cc 45 API calls 16336->16344 16342 7ff733f73478 47 API calls 16337->16342 16357 7ff733f72e10 16337->16357 16338->16331 16338->16343 16339->16337 16345 7ff733f72d52 16339->16345 16354 7ff733f72d3b 16339->16354 16340->16354 16341->16354 16342->16354 16346 7ff733f71484 38 API calls 16343->16346 16343->16357 16344->16354 16348 7ff733f737b4 46 API calls 16345->16348 16345->16357 16346->16354 16347->16331 16349 7ff733f72d92 16347->16349 16348->16354 16352 7ff733f73878 37 API calls 16349->16352 16349->16357 16350 7ff733f6b870 _log10_special 8 API calls 16351 7ff733f7310a 16350->16351 16351->16284 16352->16354 16353 7ff733f73ae0 45 API calls 16356 7ff733f72ffc 16353->16356 16354->16353 16354->16356 16354->16357 16355 7ff733f7dd18 46 API calls 16355->16356 16356->16355 16356->16357 16357->16350 16638 7ff733f702e8 16358->16638 16362 7ff733f7349e 16361->16362 16424 7ff733f6fea0 16362->16424 16367 7ff733f73ae0 45 API calls 16368 7ff733f735e3 16367->16368 16368->16368 16369 7ff733f73ae0 45 API calls 16368->16369 16370 7ff733f73671 16368->16370 16369->16370 16370->16316 16372 7ff733f737e9 16371->16372 16373 7ff733f7382e 16372->16373 16374 7ff733f73807 16372->16374 16376 7ff733f73ae0 45 API calls 16372->16376 16373->16316 16375 7ff733f7dd18 46 API calls 16374->16375 16375->16373 16376->16374 16379 7ff733f73899 16377->16379 16378 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16380 7ff733f738ca 16378->16380 16379->16378 16379->16380 16380->16316 16382 7ff733f710a7 16381->16382 16383 7ff733f710d6 16382->16383 16385 7ff733f71193 16382->16385 16387 7ff733f71113 16383->16387 16570 7ff733f6ff48 16383->16570 16386 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16385->16386 16386->16387 16387->16316 16389 7ff733f70c97 16388->16389 16390 7ff733f70cc6 16389->16390 16393 7ff733f70d83 16389->16393 16391 7ff733f70d03 16390->16391 16392 7ff733f6ff48 12 API calls 16390->16392 16391->16316 16392->16391 16394 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16393->16394 16394->16391 16396 7ff733f73a0f 16395->16396 16397 7ff733f73a13 __crtLCMapStringW 16396->16397 16578 7ff733f73a68 16396->16578 16397->16316 16401 7ff733f714b7 16399->16401 16400 7ff733f714e6 16402 7ff733f6ff48 12 API calls 16400->16402 16405 7ff733f71523 16400->16405 16401->16400 16403 7ff733f715a3 16401->16403 16402->16405 16404 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16403->16404 16404->16405 16405->16316 16407 7ff733f73af7 16406->16407 16582 7ff733f7ccc8 16407->16582 16414 7ff733f7dd49 16412->16414 16421 7ff733f7dd57 16412->16421 16413 7ff733f7dd77 16416 7ff733f7dd88 16413->16416 16417 7ff733f7ddaf 16413->16417 16414->16413 16415 7ff733f73ae0 45 API calls 16414->16415 16414->16421 16415->16413 16628 7ff733f7f3b0 16416->16628 16419 7ff733f7de3a 16417->16419 16420 7ff733f7ddd9 16417->16420 16417->16421 16422 7ff733f7ebb0 _fread_nolock MultiByteToWideChar 16419->16422 16420->16421 16631 7ff733f7ebb0 16420->16631 16421->16320 16422->16421 16425 7ff733f6fed7 16424->16425 16431 7ff733f6fec6 16424->16431 16425->16431 16454 7ff733f7c90c 16425->16454 16428 7ff733f6ff18 16429 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16428->16429 16429->16431 16430 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16430->16428 16432 7ff733f7d880 16431->16432 16433 7ff733f7d89d 16432->16433 16434 7ff733f7d8d0 16432->16434 16435 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16433->16435 16434->16433 16436 7ff733f7d902 16434->16436 16444 7ff733f735c1 16435->16444 16442 7ff733f7da15 16436->16442 16449 7ff733f7d94a 16436->16449 16437 7ff733f7db07 16494 7ff733f7cd6c 16437->16494 16439 7ff733f7dacd 16487 7ff733f7d104 16439->16487 16441 7ff733f7da9c 16480 7ff733f7d3e4 16441->16480 16442->16437 16442->16439 16442->16441 16443 7ff733f7da5f 16442->16443 16446 7ff733f7da55 16442->16446 16470 7ff733f7d614 16443->16470 16444->16367 16444->16368 16446->16439 16448 7ff733f7da5a 16446->16448 16448->16441 16448->16443 16449->16444 16461 7ff733f797b4 16449->16461 16452 7ff733f79c10 _isindst 17 API calls 16453 7ff733f7db64 16452->16453 16455 7ff733f7c957 16454->16455 16459 7ff733f7c91b _get_daylight 16454->16459 16457 7ff733f743f4 _get_daylight 11 API calls 16455->16457 16456 7ff733f7c93e HeapAlloc 16458 7ff733f6ff04 16456->16458 16456->16459 16457->16458 16458->16428 16458->16430 16459->16455 16459->16456 16460 7ff733f828a0 _get_daylight 2 API calls 16459->16460 16460->16459 16462 7ff733f797c1 16461->16462 16464 7ff733f797cb 16461->16464 16462->16464 16468 7ff733f797e6 16462->16468 16463 7ff733f743f4 _get_daylight 11 API calls 16465 7ff733f797d2 16463->16465 16464->16463 16503 7ff733f79bf0 16465->16503 16467 7ff733f797de 16467->16444 16467->16452 16468->16467 16469 7ff733f743f4 _get_daylight 11 API calls 16468->16469 16469->16465 16506 7ff733f833bc 16470->16506 16474 7ff733f7d6bc 16475 7ff733f7d6c0 16474->16475 16476 7ff733f7d711 16474->16476 16477 7ff733f7d6dc 16474->16477 16475->16444 16559 7ff733f7d200 16476->16559 16555 7ff733f7d4bc 16477->16555 16481 7ff733f833bc 38 API calls 16480->16481 16482 7ff733f7d42e 16481->16482 16483 7ff733f82e04 37 API calls 16482->16483 16484 7ff733f7d47e 16483->16484 16485 7ff733f7d482 16484->16485 16486 7ff733f7d4bc 45 API calls 16484->16486 16485->16444 16486->16485 16488 7ff733f833bc 38 API calls 16487->16488 16489 7ff733f7d14f 16488->16489 16490 7ff733f82e04 37 API calls 16489->16490 16491 7ff733f7d1a7 16490->16491 16492 7ff733f7d1ab 16491->16492 16493 7ff733f7d200 45 API calls 16491->16493 16492->16444 16493->16492 16495 7ff733f7cde4 16494->16495 16496 7ff733f7cdb1 16494->16496 16498 7ff733f7cdfc 16495->16498 16501 7ff733f7ce7d 16495->16501 16497 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16496->16497 16500 7ff733f7cddd __scrt_get_show_window_mode 16497->16500 16499 7ff733f7d104 46 API calls 16498->16499 16499->16500 16500->16444 16501->16500 16502 7ff733f73ae0 45 API calls 16501->16502 16502->16500 16504 7ff733f79a88 _invalid_parameter_noinfo 37 API calls 16503->16504 16505 7ff733f79c09 16504->16505 16505->16467 16507 7ff733f8340f fegetenv 16506->16507 16508 7ff733f8713c 37 API calls 16507->16508 16512 7ff733f83462 16508->16512 16509 7ff733f8348f 16514 7ff733f797b4 __std_exception_copy 37 API calls 16509->16514 16510 7ff733f83552 16511 7ff733f8713c 37 API calls 16510->16511 16513 7ff733f8357c 16511->16513 16512->16510 16515 7ff733f8352c 16512->16515 16516 7ff733f8347d 16512->16516 16517 7ff733f8713c 37 API calls 16513->16517 16518 7ff733f8350d 16514->16518 16521 7ff733f797b4 __std_exception_copy 37 API calls 16515->16521 16516->16509 16516->16510 16519 7ff733f8358d 16517->16519 16520 7ff733f84634 16518->16520 16525 7ff733f83515 16518->16525 16522 7ff733f87330 20 API calls 16519->16522 16523 7ff733f79c10 _isindst 17 API calls 16520->16523 16521->16518 16533 7ff733f835f6 __scrt_get_show_window_mode 16522->16533 16524 7ff733f84649 16523->16524 16526 7ff733f6b870 _log10_special 8 API calls 16525->16526 16527 7ff733f7d661 16526->16527 16551 7ff733f82e04 16527->16551 16528 7ff733f83a93 memcpy_s __scrt_get_show_window_mode 16534 7ff733f83c8b 16528->16534 16543 7ff733f743f4 11 API calls _get_daylight 16528->16543 16547 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 16528->16547 16529 7ff733f8399f __scrt_get_show_window_mode 16530 7ff733f83cdf 16532 7ff733f82f20 37 API calls 16530->16532 16531 7ff733f83637 memcpy_s 16531->16528 16548 7ff733f83f7b memcpy_s __scrt_get_show_window_mode 16531->16548 16535 7ff733f843f7 16532->16535 16533->16529 16533->16531 16537 7ff733f743f4 _get_daylight 11 API calls 16533->16537 16534->16530 16536 7ff733f8464c memcpy_s 37 API calls 16534->16536 16540 7ff733f8464c memcpy_s 37 API calls 16535->16540 16550 7ff733f84452 16535->16550 16536->16530 16538 7ff733f83a70 16537->16538 16539 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 16538->16539 16539->16531 16540->16550 16541 7ff733f845d8 16542 7ff733f8713c 37 API calls 16541->16542 16542->16525 16543->16528 16544 7ff733f743f4 11 API calls _get_daylight 16544->16548 16545 7ff733f82f20 37 API calls 16545->16550 16546 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 16546->16548 16547->16528 16548->16530 16548->16534 16548->16544 16548->16546 16549 7ff733f8464c memcpy_s 37 API calls 16549->16550 16550->16541 16550->16545 16550->16549 16552 7ff733f82e23 16551->16552 16553 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16552->16553 16554 7ff733f82e4e memcpy_s 16552->16554 16553->16554 16554->16474 16556 7ff733f7d4e8 memcpy_s 16555->16556 16557 7ff733f73ae0 45 API calls 16556->16557 16558 7ff733f7d5a2 memcpy_s __scrt_get_show_window_mode 16556->16558 16557->16558 16558->16475 16560 7ff733f7d23b 16559->16560 16565 7ff733f7d288 memcpy_s 16559->16565 16561 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16560->16561 16562 7ff733f7d267 16561->16562 16562->16475 16563 7ff733f7d2f3 16564 7ff733f797b4 __std_exception_copy 37 API calls 16563->16564 16569 7ff733f7d335 memcpy_s 16564->16569 16565->16563 16566 7ff733f73ae0 45 API calls 16565->16566 16566->16563 16567 7ff733f79c10 _isindst 17 API calls 16568 7ff733f7d3e0 16567->16568 16569->16567 16571 7ff733f6ff6e 16570->16571 16572 7ff733f6ff7f 16570->16572 16571->16387 16572->16571 16573 7ff733f7c90c _fread_nolock 12 API calls 16572->16573 16574 7ff733f6ffb0 16573->16574 16575 7ff733f6ffc4 16574->16575 16576 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16574->16576 16577 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16575->16577 16576->16575 16577->16571 16579 7ff733f73a8e 16578->16579 16580 7ff733f73a86 16578->16580 16579->16397 16581 7ff733f73ae0 45 API calls 16580->16581 16581->16579 16583 7ff733f73b1f 16582->16583 16584 7ff733f7cce1 16582->16584 16586 7ff733f7cd34 16583->16586 16584->16583 16590 7ff733f82614 16584->16590 16587 7ff733f7cd4d 16586->16587 16589 7ff733f73b2f 16586->16589 16587->16589 16625 7ff733f81960 16587->16625 16589->16320 16602 7ff733f7a460 GetLastError 16590->16602 16593 7ff733f8266e 16593->16583 16603 7ff733f7a484 FlsGetValue 16602->16603 16604 7ff733f7a4a1 FlsSetValue 16602->16604 16605 7ff733f7a49b 16603->16605 16622 7ff733f7a491 16603->16622 16606 7ff733f7a4b3 16604->16606 16604->16622 16605->16604 16608 7ff733f7dea8 _get_daylight 11 API calls 16606->16608 16607 7ff733f7a50d SetLastError 16609 7ff733f7a52d 16607->16609 16610 7ff733f7a51a 16607->16610 16611 7ff733f7a4c2 16608->16611 16612 7ff733f79814 __CxxCallCatchBlock 38 API calls 16609->16612 16610->16593 16624 7ff733f7f5e8 EnterCriticalSection 16610->16624 16613 7ff733f7a4e0 FlsSetValue 16611->16613 16614 7ff733f7a4d0 FlsSetValue 16611->16614 16617 7ff733f7a532 16612->16617 16615 7ff733f7a4fe 16613->16615 16616 7ff733f7a4ec FlsSetValue 16613->16616 16618 7ff733f7a4d9 16614->16618 16619 7ff733f7a204 _get_daylight 11 API calls 16615->16619 16616->16618 16620 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16618->16620 16621 7ff733f7a506 16619->16621 16620->16622 16623 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16621->16623 16622->16607 16623->16607 16626 7ff733f7a460 __CxxCallCatchBlock 45 API calls 16625->16626 16627 7ff733f81969 16626->16627 16634 7ff733f86098 16628->16634 16633 7ff733f7ebb9 MultiByteToWideChar 16631->16633 16637 7ff733f860fc 16634->16637 16635 7ff733f6b870 _log10_special 8 API calls 16636 7ff733f7f3cd 16635->16636 16636->16421 16637->16635 16639 7ff733f7031d 16638->16639 16640 7ff733f7032f 16638->16640 16641 7ff733f743f4 _get_daylight 11 API calls 16639->16641 16643 7ff733f7033d 16640->16643 16646 7ff733f70379 16640->16646 16642 7ff733f70322 16641->16642 16644 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 16642->16644 16645 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16643->16645 16647 7ff733f7032d 16644->16647 16645->16647 16648 7ff733f706f5 16646->16648 16650 7ff733f743f4 _get_daylight 11 API calls 16646->16650 16647->16284 16648->16647 16649 7ff733f743f4 _get_daylight 11 API calls 16648->16649 16651 7ff733f70989 16649->16651 16652 7ff733f706ea 16650->16652 16653 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 16651->16653 16654 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 16652->16654 16653->16647 16654->16648 16656 7ff733f6fa24 16655->16656 16685 7ff733f6f784 16656->16685 16658 7ff733f6fa3d 16658->15842 16697 7ff733f6f6dc 16659->16697 16663 7ff733f6277c 16662->16663 16664 7ff733f743f4 _get_daylight 11 API calls 16663->16664 16665 7ff733f62799 16664->16665 16711 7ff733f73ca4 16665->16711 16670 7ff733f61bf0 49 API calls 16671 7ff733f62807 16670->16671 16672 7ff733f686b0 2 API calls 16671->16672 16673 7ff733f6281f 16672->16673 16674 7ff733f6282c MessageBoxW 16673->16674 16675 7ff733f62843 MessageBoxA 16673->16675 16676 7ff733f62855 16674->16676 16675->16676 16677 7ff733f6b870 _log10_special 8 API calls 16676->16677 16678 7ff733f62865 16677->16678 16678->15871 16680 7ff733f61b06 16679->16680 16681 7ff733f6f439 16679->16681 16680->15870 16680->15871 16682 7ff733f743f4 _get_daylight 11 API calls 16681->16682 16683 7ff733f6f43e 16682->16683 16684 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 16683->16684 16684->16680 16686 7ff733f6f7ee 16685->16686 16687 7ff733f6f7ae 16685->16687 16686->16687 16689 7ff733f6f7fa 16686->16689 16688 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16687->16688 16695 7ff733f6f7d5 16688->16695 16696 7ff733f7477c EnterCriticalSection 16689->16696 16695->16658 16698 7ff733f619b9 16697->16698 16699 7ff733f6f706 16697->16699 16698->15848 16698->15849 16699->16698 16700 7ff733f6f715 __scrt_get_show_window_mode 16699->16700 16701 7ff733f6f752 16699->16701 16704 7ff733f743f4 _get_daylight 11 API calls 16700->16704 16710 7ff733f7477c EnterCriticalSection 16701->16710 16706 7ff733f6f72a 16704->16706 16708 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 16706->16708 16708->16698 16712 7ff733f73cfe 16711->16712 16713 7ff733f73d23 16712->16713 16715 7ff733f73d5f 16712->16715 16714 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16713->16714 16717 7ff733f73d4d 16714->16717 16741 7ff733f71f30 16715->16741 16719 7ff733f6b870 _log10_special 8 API calls 16717->16719 16718 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16718->16717 16722 7ff733f627d8 16719->16722 16721 7ff733f73e3c 16721->16718 16729 7ff733f74480 16722->16729 16723 7ff733f73e11 16727 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16723->16727 16724 7ff733f73e60 16724->16721 16726 7ff733f73e6a 16724->16726 16725 7ff733f73e08 16725->16721 16725->16723 16728 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16726->16728 16727->16717 16728->16717 16730 7ff733f7a5d8 _get_daylight 11 API calls 16729->16730 16731 7ff733f74497 16730->16731 16732 7ff733f744d7 16731->16732 16733 7ff733f7dea8 _get_daylight 11 API calls 16731->16733 16738 7ff733f627df 16731->16738 16732->16738 16879 7ff733f7df30 16732->16879 16734 7ff733f744cc 16733->16734 16735 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16734->16735 16735->16732 16738->16670 16739 7ff733f79c10 _isindst 17 API calls 16740 7ff733f7451c 16739->16740 16742 7ff733f71f6e 16741->16742 16743 7ff733f71f5e 16741->16743 16744 7ff733f71f77 16742->16744 16751 7ff733f71fa5 16742->16751 16747 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16743->16747 16745 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16744->16745 16746 7ff733f71f9d 16745->16746 16746->16721 16746->16723 16746->16724 16746->16725 16747->16746 16748 7ff733f73ae0 45 API calls 16748->16751 16749 7ff733f72254 16753 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16749->16753 16751->16743 16751->16746 16751->16748 16751->16749 16755 7ff733f728c0 16751->16755 16781 7ff733f72588 16751->16781 16811 7ff733f71e10 16751->16811 16753->16743 16756 7ff733f72975 16755->16756 16757 7ff733f72902 16755->16757 16760 7ff733f7297a 16756->16760 16761 7ff733f729cf 16756->16761 16758 7ff733f72908 16757->16758 16759 7ff733f7299f 16757->16759 16767 7ff733f7290d 16758->16767 16770 7ff733f729de 16758->16770 16828 7ff733f70e70 16759->16828 16762 7ff733f7297c 16760->16762 16763 7ff733f729af 16760->16763 16761->16759 16761->16770 16779 7ff733f72938 16761->16779 16764 7ff733f7291d 16762->16764 16769 7ff733f7298b 16762->16769 16835 7ff733f70a60 16763->16835 16780 7ff733f72a0d 16764->16780 16814 7ff733f73224 16764->16814 16767->16764 16771 7ff733f72950 16767->16771 16767->16779 16769->16759 16773 7ff733f72990 16769->16773 16770->16780 16842 7ff733f71280 16770->16842 16771->16780 16824 7ff733f736e0 16771->16824 16776 7ff733f73878 37 API calls 16773->16776 16773->16780 16775 7ff733f6b870 _log10_special 8 API calls 16777 7ff733f72ca3 16775->16777 16776->16779 16777->16751 16779->16780 16849 7ff733f7db68 16779->16849 16780->16775 16782 7ff733f725a9 16781->16782 16783 7ff733f72593 16781->16783 16784 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16782->16784 16785 7ff733f725e7 16782->16785 16783->16785 16786 7ff733f72975 16783->16786 16787 7ff733f72902 16783->16787 16784->16785 16785->16751 16790 7ff733f7297a 16786->16790 16791 7ff733f729cf 16786->16791 16788 7ff733f72908 16787->16788 16789 7ff733f7299f 16787->16789 16798 7ff733f7290d 16788->16798 16801 7ff733f729de 16788->16801 16795 7ff733f70e70 38 API calls 16789->16795 16792 7ff733f7297c 16790->16792 16793 7ff733f729af 16790->16793 16791->16789 16791->16801 16809 7ff733f72938 16791->16809 16794 7ff733f7291d 16792->16794 16799 7ff733f7298b 16792->16799 16796 7ff733f70a60 38 API calls 16793->16796 16797 7ff733f73224 47 API calls 16794->16797 16810 7ff733f72a0d 16794->16810 16795->16809 16796->16809 16797->16809 16798->16794 16800 7ff733f72950 16798->16800 16798->16809 16799->16789 16803 7ff733f72990 16799->16803 16804 7ff733f736e0 47 API calls 16800->16804 16800->16810 16802 7ff733f71280 38 API calls 16801->16802 16801->16810 16802->16809 16806 7ff733f73878 37 API calls 16803->16806 16803->16810 16804->16809 16805 7ff733f6b870 _log10_special 8 API calls 16807 7ff733f72ca3 16805->16807 16806->16809 16807->16751 16808 7ff733f7db68 47 API calls 16808->16809 16809->16808 16809->16810 16810->16805 16862 7ff733f70034 16811->16862 16815 7ff733f73246 16814->16815 16816 7ff733f6fea0 12 API calls 16815->16816 16817 7ff733f7328e 16816->16817 16818 7ff733f7d880 46 API calls 16817->16818 16819 7ff733f73361 16818->16819 16820 7ff733f73383 16819->16820 16821 7ff733f73ae0 45 API calls 16819->16821 16822 7ff733f73ae0 45 API calls 16820->16822 16823 7ff733f7340c 16820->16823 16821->16820 16822->16823 16823->16779 16825 7ff733f73760 16824->16825 16826 7ff733f736f8 16824->16826 16825->16779 16826->16825 16827 7ff733f7db68 47 API calls 16826->16827 16827->16825 16829 7ff733f70ea3 16828->16829 16830 7ff733f70ed2 16829->16830 16832 7ff733f70f8f 16829->16832 16831 7ff733f6fea0 12 API calls 16830->16831 16834 7ff733f70f0f 16830->16834 16831->16834 16833 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16832->16833 16833->16834 16834->16779 16836 7ff733f70a93 16835->16836 16837 7ff733f70ac2 16836->16837 16839 7ff733f70b7f 16836->16839 16838 7ff733f6fea0 12 API calls 16837->16838 16841 7ff733f70aff 16837->16841 16838->16841 16840 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16839->16840 16840->16841 16841->16779 16843 7ff733f712b3 16842->16843 16844 7ff733f712e2 16843->16844 16846 7ff733f7139f 16843->16846 16845 7ff733f6fea0 12 API calls 16844->16845 16848 7ff733f7131f 16844->16848 16845->16848 16847 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16846->16847 16847->16848 16848->16779 16850 7ff733f7db90 16849->16850 16851 7ff733f7dbd5 16850->16851 16852 7ff733f73ae0 45 API calls 16850->16852 16854 7ff733f7dbbe __scrt_get_show_window_mode 16850->16854 16858 7ff733f7db95 __scrt_get_show_window_mode 16850->16858 16851->16854 16851->16858 16859 7ff733f7faf8 16851->16859 16852->16851 16853 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16853->16858 16854->16853 16854->16858 16858->16779 16861 7ff733f7fb1c WideCharToMultiByte 16859->16861 16863 7ff733f70073 16862->16863 16864 7ff733f70061 16862->16864 16866 7ff733f700bd 16863->16866 16868 7ff733f70080 16863->16868 16865 7ff733f743f4 _get_daylight 11 API calls 16864->16865 16867 7ff733f70066 16865->16867 16871 7ff733f70166 16866->16871 16873 7ff733f743f4 _get_daylight 11 API calls 16866->16873 16869 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 16867->16869 16870 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 16868->16870 16877 7ff733f70071 16869->16877 16870->16877 16872 7ff733f743f4 _get_daylight 11 API calls 16871->16872 16871->16877 16874 7ff733f70210 16872->16874 16875 7ff733f7015b 16873->16875 16876 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 16874->16876 16878 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 16875->16878 16876->16877 16877->16751 16878->16871 16881 7ff733f7df4d 16879->16881 16880 7ff733f743f4 _get_daylight 11 API calls 16882 7ff733f7df5c 16880->16882 16883 7ff733f744fd 16881->16883 16884 7ff733f7df52 16881->16884 16886 7ff733f7df9c 16881->16886 16885 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 16882->16885 16883->16738 16883->16739 16884->16880 16884->16883 16885->16883 16886->16883 16887 7ff733f743f4 _get_daylight 11 API calls 16886->16887 16887->16882 16889 7ff733f77568 16888->16889 16890 7ff733f77555 16888->16890 16898 7ff733f771cc 16889->16898 16891 7ff733f743f4 _get_daylight 11 API calls 16890->16891 16893 7ff733f7755a 16891->16893 16895 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 16893->16895 16897 7ff733f77566 16895->16897 16897->15889 16905 7ff733f7f5e8 EnterCriticalSection 16898->16905 16907 7ff733f67c13 __std_exception_destroy 16906->16907 16908 7ff733f67b91 GetTokenInformation 16906->16908 16911 7ff733f67c2c 16907->16911 16912 7ff733f67c26 CloseHandle 16907->16912 16909 7ff733f67bbd 16908->16909 16910 7ff733f67bb2 GetLastError 16908->16910 16909->16907 16913 7ff733f67bd9 GetTokenInformation 16909->16913 16910->16907 16910->16909 16911->15898 16912->16911 16913->16907 16914 7ff733f67bfc 16913->16914 16914->16907 16915 7ff733f67c06 ConvertSidToStringSidW 16914->16915 16915->16907 16917 7ff733f6297a 16916->16917 17201 7ff733f63f70 108 API calls 17200->17201 17202 7ff733f61463 17201->17202 17203 7ff733f6148c 17202->17203 17204 7ff733f6146b 17202->17204 17206 7ff733f6f9f4 73 API calls 17203->17206 17205 7ff733f625f0 53 API calls 17204->17205 17207 7ff733f6147b 17205->17207 17208 7ff733f614a1 17206->17208 17207->15957 17209 7ff733f614a5 17208->17209 17210 7ff733f614c1 17208->17210 17211 7ff733f62760 53 API calls 17209->17211 17212 7ff733f614f1 17210->17212 17213 7ff733f614d1 17210->17213 17219 7ff733f614bc __std_exception_destroy 17211->17219 17215 7ff733f614f7 17212->17215 17221 7ff733f6150a 17212->17221 17214 7ff733f62760 53 API calls 17213->17214 17214->17219 17224 7ff733f611f0 17215->17224 17216 7ff733f6f36c 74 API calls 17218 7ff733f61584 17216->17218 17218->15957 17219->17216 17220 7ff733f6f6bc _fread_nolock 53 API calls 17220->17221 17221->17219 17221->17220 17222 7ff733f61596 17221->17222 17223 7ff733f62760 53 API calls 17222->17223 17223->17219 17225 7ff733f61248 17224->17225 17226 7ff733f61277 17225->17226 17227 7ff733f6124f 17225->17227 17230 7ff733f612ad 17226->17230 17231 7ff733f61291 17226->17231 17228 7ff733f625f0 53 API calls 17227->17228 17229 7ff733f61262 17228->17229 17229->17219 17233 7ff733f612bf 17230->17233 17240 7ff733f612db memcpy_s 17230->17240 17232 7ff733f62760 53 API calls 17231->17232 17236 7ff733f612a8 __std_exception_destroy 17232->17236 17234 7ff733f62760 53 API calls 17233->17234 17234->17236 17235 7ff733f6f6bc _fread_nolock 53 API calls 17235->17240 17236->17219 17237 7ff733f6139f 17240->17235 17240->17236 17240->17237 17262 7ff733f63f1a 17261->17262 17263 7ff733f686b0 2 API calls 17262->17263 17264 7ff733f63f3f 17263->17264 17265 7ff733f6b870 _log10_special 8 API calls 17264->17265 17266 7ff733f63f67 17265->17266 17266->15981 17268 7ff733f6753e 17267->17268 17269 7ff733f67662 17268->17269 17270 7ff733f61bf0 49 API calls 17268->17270 17271 7ff733f6b870 _log10_special 8 API calls 17269->17271 17275 7ff733f675c5 17270->17275 17272 7ff733f67693 17271->17272 17272->15981 17273 7ff733f61bf0 49 API calls 17273->17275 17274 7ff733f63f10 10 API calls 17274->17275 17275->17269 17275->17273 17275->17274 17276 7ff733f6761b 17275->17276 17277 7ff733f686b0 2 API calls 17276->17277 17278 7ff733f67633 CreateDirectoryW 17277->17278 17278->17269 17278->17275 17280 7ff733f615f7 17279->17280 17281 7ff733f615d3 17279->17281 17282 7ff733f63f70 108 API calls 17280->17282 17368 7ff733f61050 17281->17368 17284 7ff733f6160b 17282->17284 17286 7ff733f6163b 17284->17286 17287 7ff733f61613 17284->17287 17285 7ff733f615d8 17288 7ff733f615ee 17285->17288 17291 7ff733f625f0 53 API calls 17285->17291 17290 7ff733f63f70 108 API calls 17286->17290 17289 7ff733f62760 53 API calls 17287->17289 17288->15981 17292 7ff733f6162a 17289->17292 17293 7ff733f6164f 17290->17293 17291->17288 17292->15981 17294 7ff733f61657 17293->17294 17295 7ff733f61671 17293->17295 17296 7ff733f625f0 53 API calls 17294->17296 17297 7ff733f6f9f4 73 API calls 17295->17297 17298 7ff733f61667 17296->17298 17299 7ff733f61686 17297->17299 17318 7ff733f66904 17317->17318 17320 7ff733f6694b 17317->17320 17318->17320 17407 7ff733f74250 17318->17407 17320->15981 17322 7ff733f63b51 17321->17322 17323 7ff733f63e90 49 API calls 17322->17323 17324 7ff733f63b8b 17323->17324 17325 7ff733f63e90 49 API calls 17324->17325 17326 7ff733f63b9b 17325->17326 17327 7ff733f63bec 17326->17327 17328 7ff733f63bbd 17326->17328 17330 7ff733f63ac0 51 API calls 17327->17330 17438 7ff733f63ac0 17328->17438 17331 7ff733f63bea 17330->17331 17366 7ff733f61bf0 49 API calls 17365->17366 17367 7ff733f63e24 17366->17367 17367->15981 17369 7ff733f63f70 108 API calls 17368->17369 17370 7ff733f6108b 17369->17370 17371 7ff733f610a8 17370->17371 17372 7ff733f61093 17370->17372 17373 7ff733f6f9f4 73 API calls 17371->17373 17374 7ff733f625f0 53 API calls 17372->17374 17375 7ff733f610bd 17373->17375 17379 7ff733f610a3 __std_exception_destroy 17374->17379 17376 7ff733f610dd 17375->17376 17377 7ff733f610c1 17375->17377 17379->17285 17408 7ff733f7425d 17407->17408 17409 7ff733f7428a 17407->17409 17411 7ff733f743f4 _get_daylight 11 API calls 17408->17411 17418 7ff733f74214 17408->17418 17410 7ff733f742ad 17409->17410 17413 7ff733f742c9 17409->17413 17412 7ff733f743f4 _get_daylight 11 API calls 17410->17412 17414 7ff733f74267 17411->17414 17415 7ff733f742b2 17412->17415 17422 7ff733f74178 17413->17422 17417 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 17414->17417 17419 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 17415->17419 17420 7ff733f74272 17417->17420 17418->17318 17421 7ff733f742bd 17419->17421 17420->17318 17421->17318 17423 7ff733f7419c 17422->17423 17429 7ff733f74197 17422->17429 17424 7ff733f7a460 __CxxCallCatchBlock 45 API calls 17423->17424 17423->17429 17425 7ff733f741b7 17424->17425 17430 7ff733f7cc94 17425->17430 17429->17421 17439 7ff733f63ae6 17438->17439 17502 7ff733f6be12 RtlLookupFunctionEntry 17501->17502 17503 7ff733f6be28 RtlVirtualUnwind 17502->17503 17504 7ff733f6bc2b 17502->17504 17503->17502 17503->17504 17505 7ff733f6bbc0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17504->17505 17507 7ff733f751d8 17506->17507 17508 7ff733f751fe 17507->17508 17510 7ff733f75231 17507->17510 17509 7ff733f743f4 _get_daylight 11 API calls 17508->17509 17511 7ff733f75203 17509->17511 17512 7ff733f75237 17510->17512 17513 7ff733f75244 17510->17513 17514 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 17511->17514 17515 7ff733f743f4 _get_daylight 11 API calls 17512->17515 17525 7ff733f79f38 17513->17525 17524 7ff733f63fc6 17514->17524 17515->17524 17524->16018 17538 7ff733f7f5e8 EnterCriticalSection 17525->17538 17898 7ff733f76c08 17897->17898 17901 7ff733f766e4 17898->17901 17900 7ff733f76c21 17900->16028 17902 7ff733f7672e 17901->17902 17903 7ff733f766ff 17901->17903 17911 7ff733f7477c EnterCriticalSection 17902->17911 17904 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 17903->17904 17910 7ff733f7671f 17904->17910 17910->17900 17913 7ff733f6f163 17912->17913 17914 7ff733f6f191 17912->17914 17915 7ff733f79b24 _invalid_parameter_noinfo 37 API calls 17913->17915 17921 7ff733f6f183 17914->17921 17922 7ff733f7477c EnterCriticalSection 17914->17922 17915->17921 17921->16032 17924 7ff733f686b0 2 API calls 17923->17924 17925 7ff733f681b4 LoadLibraryExW 17924->17925 17926 7ff733f681d3 __std_exception_destroy 17925->17926 17926->16062 17928 7ff733f66ec9 17927->17928 17929 7ff733f66ef3 GetProcAddress 17927->17929 17931 7ff733f629e0 51 API calls 17928->17931 17929->17928 17930 7ff733f66f18 GetProcAddress 17929->17930 17930->17928 17932 7ff733f66f3d GetProcAddress 17930->17932 17933 7ff733f66ee3 17931->17933 17932->17928 17933->16068 17993 7ff733f65b05 17992->17993 17994 7ff733f61bf0 49 API calls 17993->17994 17995 7ff733f65b41 17994->17995 17996 7ff733f65b6d 17995->17996 17997 7ff733f65b4a 17995->17997 17999 7ff733f63fe0 49 API calls 17996->17999 17998 7ff733f625f0 53 API calls 17997->17998 18016 7ff733f65b63 17998->18016 18000 7ff733f65b85 17999->18000 18001 7ff733f65ba3 18000->18001 18002 7ff733f625f0 53 API calls 18000->18002 18003 7ff733f63f10 10 API calls 18001->18003 18002->18001 18005 7ff733f65bad 18003->18005 18004 7ff733f6b870 _log10_special 8 API calls 18006 7ff733f6308e 18004->18006 18007 7ff733f65bbb 18005->18007 18008 7ff733f681a0 3 API calls 18005->18008 18006->16102 18023 7ff733f65c80 18006->18023 18009 7ff733f63fe0 49 API calls 18007->18009 18008->18007 18010 7ff733f65bd4 18009->18010 18011 7ff733f65bf9 18010->18011 18012 7ff733f65bd9 18010->18012 18014 7ff733f681a0 3 API calls 18011->18014 18013 7ff733f625f0 53 API calls 18012->18013 18013->18016 18015 7ff733f65c06 18014->18015 18016->18004 18162 7ff733f64c80 18023->18162 18025 7ff733f65cba 18026 7ff733f65cd3 18025->18026 18027 7ff733f65cc2 18025->18027 18169 7ff733f64450 18026->18169 18028 7ff733f625f0 53 API calls 18027->18028 18164 7ff733f64cac 18162->18164 18163 7ff733f64cb4 18163->18025 18164->18163 18167 7ff733f64e54 18164->18167 18200 7ff733f75db4 18164->18200 18165 7ff733f65017 __std_exception_destroy 18165->18025 18166 7ff733f64180 47 API calls 18166->18167 18167->18165 18167->18166 18201 7ff733f75de4 18200->18201 18204 7ff733f752b0 18201->18204 18205 7ff733f752f3 18204->18205 18206 7ff733f752e1 18204->18206 18280->16105 18282 7ff733f7a460 __CxxCallCatchBlock 45 API calls 18281->18282 18283 7ff733f796f1 18282->18283 18286 7ff733f79814 18283->18286 18295 7ff733f82960 18286->18295 18321 7ff733f82918 18295->18321 18326 7ff733f7f5e8 EnterCriticalSection 18321->18326 18383 7ff733f7fbd8 18384 7ff733f7fbfc 18383->18384 18388 7ff733f7fc0c 18383->18388 18385 7ff733f743f4 _get_daylight 11 API calls 18384->18385 18386 7ff733f7fc01 18385->18386 18387 7ff733f7feec 18390 7ff733f743f4 _get_daylight 11 API calls 18387->18390 18388->18387 18389 7ff733f7fc2e 18388->18389 18391 7ff733f7fc4f 18389->18391 18514 7ff733f80294 18389->18514 18392 7ff733f7fef1 18390->18392 18395 7ff733f7fcc1 18391->18395 18396 7ff733f7fc75 18391->18396 18397 7ff733f7fcb5 18391->18397 18394 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18392->18394 18394->18386 18398 7ff733f7dea8 _get_daylight 11 API calls 18395->18398 18411 7ff733f7fc84 18395->18411 18529 7ff733f789d8 18396->18529 18408 7ff733f7fd6e 18397->18408 18397->18411 18535 7ff733f8643c 18397->18535 18401 7ff733f7fcd7 18398->18401 18404 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18401->18404 18403 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18403->18386 18409 7ff733f7fce5 18404->18409 18405 7ff733f7fc7f 18410 7ff733f743f4 _get_daylight 11 API calls 18405->18410 18406 7ff733f7fddd 18406->18411 18416 7ff733f826ec 40 API calls 18406->18416 18407 7ff733f7fd8b 18412 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18407->18412 18408->18406 18408->18407 18409->18397 18409->18411 18417 7ff733f7dea8 _get_daylight 11 API calls 18409->18417 18410->18411 18411->18403 18414 7ff733f7fd94 18412->18414 18413 7ff733f7fc9d 18413->18397 18415 7ff733f80294 45 API calls 18413->18415 18422 7ff733f7fd99 18414->18422 18571 7ff733f826ec 18414->18571 18415->18397 18418 7ff733f7fe1a 18416->18418 18419 7ff733f7fd07 18417->18419 18420 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18418->18420 18425 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18419->18425 18426 7ff733f7fe24 18420->18426 18423 7ff733f7fee0 18422->18423 18429 7ff733f7dea8 _get_daylight 11 API calls 18422->18429 18428 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18423->18428 18424 7ff733f7fdc5 18427 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18424->18427 18425->18397 18426->18411 18426->18422 18427->18422 18428->18386 18430 7ff733f7fe68 18429->18430 18431 7ff733f7fe79 18430->18431 18432 7ff733f7fe70 18430->18432 18434 7ff733f797b4 __std_exception_copy 37 API calls 18431->18434 18433 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18432->18433 18435 7ff733f7fe77 18433->18435 18436 7ff733f7fe88 18434->18436 18440 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18435->18440 18437 7ff733f7ff1b 18436->18437 18438 7ff733f7fe90 18436->18438 18439 7ff733f79c10 _isindst 17 API calls 18437->18439 18580 7ff733f86554 18438->18580 18442 7ff733f7ff2f 18439->18442 18440->18386 18444 7ff733f7ff58 18442->18444 18453 7ff733f7ff68 18442->18453 18447 7ff733f743f4 _get_daylight 11 API calls 18444->18447 18445 7ff733f7fed8 18448 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18445->18448 18446 7ff733f7feb7 18449 7ff733f743f4 _get_daylight 11 API calls 18446->18449 18476 7ff733f7ff5d 18447->18476 18448->18423 18450 7ff733f7febc 18449->18450 18451 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18450->18451 18451->18435 18452 7ff733f8024b 18455 7ff733f743f4 _get_daylight 11 API calls 18452->18455 18453->18452 18454 7ff733f7ff8a 18453->18454 18456 7ff733f7ffa7 18454->18456 18599 7ff733f8037c 18454->18599 18457 7ff733f80250 18455->18457 18460 7ff733f8001b 18456->18460 18462 7ff733f7ffcf 18456->18462 18466 7ff733f8000f 18456->18466 18459 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18457->18459 18459->18476 18464 7ff733f80043 18460->18464 18467 7ff733f7dea8 _get_daylight 11 API calls 18460->18467 18481 7ff733f7ffde 18460->18481 18461 7ff733f800ce 18475 7ff733f800eb 18461->18475 18482 7ff733f8013e 18461->18482 18614 7ff733f78a14 18462->18614 18464->18466 18469 7ff733f7dea8 _get_daylight 11 API calls 18464->18469 18464->18481 18466->18461 18466->18481 18620 7ff733f862fc 18466->18620 18471 7ff733f80035 18467->18471 18474 7ff733f80065 18469->18474 18470 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18470->18476 18477 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18471->18477 18472 7ff733f7ffd9 18478 7ff733f743f4 _get_daylight 11 API calls 18472->18478 18473 7ff733f7fff7 18473->18466 18484 7ff733f8037c 45 API calls 18473->18484 18479 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18474->18479 18480 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18475->18480 18477->18464 18478->18481 18479->18466 18483 7ff733f800f4 18480->18483 18481->18470 18482->18481 18485 7ff733f826ec 40 API calls 18482->18485 18487 7ff733f826ec 40 API calls 18483->18487 18490 7ff733f800fa 18483->18490 18484->18466 18486 7ff733f8017c 18485->18486 18488 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18486->18488 18489 7ff733f80126 18487->18489 18492 7ff733f80186 18488->18492 18493 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18489->18493 18491 7ff733f8023f 18490->18491 18495 7ff733f7dea8 _get_daylight 11 API calls 18490->18495 18494 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18491->18494 18492->18481 18492->18490 18493->18490 18494->18476 18496 7ff733f801cb 18495->18496 18497 7ff733f801dc 18496->18497 18498 7ff733f801d3 18496->18498 18500 7ff733f7f784 37 API calls 18497->18500 18499 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18498->18499 18501 7ff733f801da 18499->18501 18502 7ff733f801ea 18500->18502 18506 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18501->18506 18503 7ff733f801f2 SetEnvironmentVariableW 18502->18503 18504 7ff733f8027f 18502->18504 18507 7ff733f80237 18503->18507 18508 7ff733f80216 18503->18508 18505 7ff733f79c10 _isindst 17 API calls 18504->18505 18509 7ff733f80293 18505->18509 18506->18476 18510 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18507->18510 18511 7ff733f743f4 _get_daylight 11 API calls 18508->18511 18510->18491 18512 7ff733f8021b 18511->18512 18513 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18512->18513 18513->18501 18515 7ff733f802c9 18514->18515 18516 7ff733f802b1 18514->18516 18517 7ff733f7dea8 _get_daylight 11 API calls 18515->18517 18516->18391 18523 7ff733f802ed 18517->18523 18518 7ff733f8034e 18520 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18518->18520 18519 7ff733f79814 __CxxCallCatchBlock 45 API calls 18521 7ff733f80378 18519->18521 18520->18516 18522 7ff733f7dea8 _get_daylight 11 API calls 18522->18523 18523->18518 18523->18522 18524 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18523->18524 18525 7ff733f797b4 __std_exception_copy 37 API calls 18523->18525 18526 7ff733f8035d 18523->18526 18528 7ff733f80372 18523->18528 18524->18523 18525->18523 18527 7ff733f79c10 _isindst 17 API calls 18526->18527 18527->18528 18528->18519 18530 7ff733f789f1 18529->18530 18531 7ff733f789e8 18529->18531 18530->18405 18530->18413 18531->18530 18644 7ff733f784b0 18531->18644 18536 7ff733f86449 18535->18536 18537 7ff733f85564 18535->18537 18540 7ff733f74178 45 API calls 18536->18540 18538 7ff733f855a7 18537->18538 18539 7ff733f85571 18537->18539 18541 7ff733f855d1 18538->18541 18547 7ff733f855f6 18538->18547 18542 7ff733f743f4 _get_daylight 11 API calls 18539->18542 18559 7ff733f85518 18539->18559 18544 7ff733f8647d 18540->18544 18543 7ff733f743f4 _get_daylight 11 API calls 18541->18543 18546 7ff733f8557b 18542->18546 18549 7ff733f855d6 18543->18549 18545 7ff733f86482 18544->18545 18550 7ff733f86493 18544->18550 18553 7ff733f864aa 18544->18553 18545->18397 18548 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 18546->18548 18556 7ff733f74178 45 API calls 18547->18556 18561 7ff733f855e1 18547->18561 18551 7ff733f85586 18548->18551 18552 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 18549->18552 18554 7ff733f743f4 _get_daylight 11 API calls 18550->18554 18551->18397 18552->18561 18557 7ff733f864c6 18553->18557 18558 7ff733f864b4 18553->18558 18555 7ff733f86498 18554->18555 18560 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 18555->18560 18556->18561 18563 7ff733f864ee 18557->18563 18564 7ff733f864d7 18557->18564 18562 7ff733f743f4 _get_daylight 11 API calls 18558->18562 18559->18397 18560->18545 18561->18397 18565 7ff733f864b9 18562->18565 18876 7ff733f8825c 18563->18876 18867 7ff733f855b4 18564->18867 18568 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 18565->18568 18568->18545 18570 7ff733f743f4 _get_daylight 11 API calls 18570->18545 18572 7ff733f8270e 18571->18572 18573 7ff733f8272b 18571->18573 18572->18573 18574 7ff733f8271c 18572->18574 18575 7ff733f82735 18573->18575 18916 7ff733f86f48 18573->18916 18576 7ff733f743f4 _get_daylight 11 API calls 18574->18576 18923 7ff733f86f84 18575->18923 18579 7ff733f82721 __scrt_get_show_window_mode 18576->18579 18579->18424 18581 7ff733f74178 45 API calls 18580->18581 18582 7ff733f865ba 18581->18582 18583 7ff733f865c8 18582->18583 18935 7ff733f7e234 18582->18935 18938 7ff733f747bc 18583->18938 18587 7ff733f866b4 18590 7ff733f866c5 18587->18590 18591 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18587->18591 18588 7ff733f74178 45 API calls 18589 7ff733f86637 18588->18589 18593 7ff733f7e234 5 API calls 18589->18593 18595 7ff733f86640 18589->18595 18592 7ff733f7feb3 18590->18592 18594 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18590->18594 18591->18590 18592->18445 18592->18446 18593->18595 18594->18592 18596 7ff733f747bc 14 API calls 18595->18596 18597 7ff733f8669b 18596->18597 18597->18587 18598 7ff733f866a3 SetEnvironmentVariableW 18597->18598 18598->18587 18600 7ff733f803bc 18599->18600 18601 7ff733f8039f 18599->18601 18602 7ff733f7dea8 _get_daylight 11 API calls 18600->18602 18601->18456 18607 7ff733f803e0 18602->18607 18603 7ff733f80441 18605 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18603->18605 18604 7ff733f79814 __CxxCallCatchBlock 45 API calls 18606 7ff733f8046a 18604->18606 18605->18601 18607->18603 18608 7ff733f7dea8 _get_daylight 11 API calls 18607->18608 18609 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18607->18609 18610 7ff733f7f784 37 API calls 18607->18610 18611 7ff733f80450 18607->18611 18613 7ff733f80464 18607->18613 18608->18607 18609->18607 18610->18607 18612 7ff733f79c10 _isindst 17 API calls 18611->18612 18612->18613 18613->18604 18615 7ff733f78a24 18614->18615 18618 7ff733f78a2d 18614->18618 18615->18618 18960 7ff733f78524 18615->18960 18618->18472 18618->18473 18621 7ff733f86309 18620->18621 18626 7ff733f86336 18620->18626 18622 7ff733f8630e 18621->18622 18621->18626 18624 7ff733f743f4 _get_daylight 11 API calls 18622->18624 18623 7ff733f8636e __crtLCMapStringW 18623->18466 18627 7ff733f86313 18624->18627 18625 7ff733f8637a 18630 7ff733f743f4 _get_daylight 11 API calls 18625->18630 18626->18623 18626->18625 18628 7ff733f86399 18626->18628 18629 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 18627->18629 18631 7ff733f863b5 18628->18631 18632 7ff733f863a3 18628->18632 18633 7ff733f8631e 18629->18633 18634 7ff733f8637f 18630->18634 18636 7ff733f74178 45 API calls 18631->18636 18635 7ff733f743f4 _get_daylight 11 API calls 18632->18635 18633->18466 18637 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 18634->18637 18638 7ff733f863a8 18635->18638 18639 7ff733f863c2 18636->18639 18637->18623 18640 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 18638->18640 18639->18623 19007 7ff733f87e18 18639->19007 18640->18623 18643 7ff733f743f4 _get_daylight 11 API calls 18643->18623 18645 7ff733f784c9 18644->18645 18654 7ff733f784c5 18644->18654 18667 7ff733f81900 18645->18667 18650 7ff733f784db 18652 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18650->18652 18651 7ff733f784e7 18693 7ff733f78594 18651->18693 18652->18654 18654->18530 18659 7ff733f78804 18654->18659 18656 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18657 7ff733f7850e 18656->18657 18658 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18657->18658 18658->18654 18660 7ff733f7882d 18659->18660 18663 7ff733f78846 18659->18663 18660->18530 18661 7ff733f7faf8 WideCharToMultiByte 18661->18663 18662 7ff733f7dea8 _get_daylight 11 API calls 18662->18663 18663->18660 18663->18661 18663->18662 18664 7ff733f788d6 18663->18664 18666 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18663->18666 18665 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18664->18665 18665->18660 18666->18663 18668 7ff733f8190d 18667->18668 18669 7ff733f784ce 18667->18669 18712 7ff733f7a534 18668->18712 18673 7ff733f81c3c GetEnvironmentStringsW 18669->18673 18674 7ff733f784d3 18673->18674 18676 7ff733f81c6c 18673->18676 18674->18650 18674->18651 18675 7ff733f7faf8 WideCharToMultiByte 18678 7ff733f81cbd 18675->18678 18676->18675 18677 7ff733f81cc4 FreeEnvironmentStringsW 18677->18674 18678->18677 18679 7ff733f7c90c _fread_nolock 12 API calls 18678->18679 18680 7ff733f81cd7 18679->18680 18681 7ff733f81ce8 18680->18681 18682 7ff733f81cdf 18680->18682 18684 7ff733f7faf8 WideCharToMultiByte 18681->18684 18683 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18682->18683 18685 7ff733f81ce6 18683->18685 18686 7ff733f81d0b 18684->18686 18685->18677 18687 7ff733f81d19 18686->18687 18688 7ff733f81d0f 18686->18688 18689 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18687->18689 18690 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18688->18690 18691 7ff733f81d17 FreeEnvironmentStringsW 18689->18691 18690->18691 18691->18674 18694 7ff733f785b9 18693->18694 18695 7ff733f7dea8 _get_daylight 11 API calls 18694->18695 18705 7ff733f785ef 18695->18705 18696 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18697 7ff733f784ef 18696->18697 18697->18656 18698 7ff733f7866a 18699 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18698->18699 18699->18697 18700 7ff733f7dea8 _get_daylight 11 API calls 18700->18705 18701 7ff733f78659 18861 7ff733f787c0 18701->18861 18703 7ff733f797b4 __std_exception_copy 37 API calls 18703->18705 18705->18698 18705->18700 18705->18701 18705->18703 18707 7ff733f7868f 18705->18707 18708 7ff733f785f7 18705->18708 18710 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18705->18710 18706 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18706->18708 18709 7ff733f79c10 _isindst 17 API calls 18707->18709 18708->18696 18711 7ff733f786a2 18709->18711 18710->18705 18713 7ff733f7a545 FlsGetValue 18712->18713 18714 7ff733f7a560 FlsSetValue 18712->18714 18715 7ff733f7a55a 18713->18715 18716 7ff733f7a552 18713->18716 18714->18716 18717 7ff733f7a56d 18714->18717 18715->18714 18718 7ff733f7a558 18716->18718 18719 7ff733f79814 __CxxCallCatchBlock 45 API calls 18716->18719 18720 7ff733f7dea8 _get_daylight 11 API calls 18717->18720 18732 7ff733f815d4 18718->18732 18721 7ff733f7a5d5 18719->18721 18722 7ff733f7a57c 18720->18722 18723 7ff733f7a59a FlsSetValue 18722->18723 18724 7ff733f7a58a FlsSetValue 18722->18724 18726 7ff733f7a5b8 18723->18726 18727 7ff733f7a5a6 FlsSetValue 18723->18727 18725 7ff733f7a593 18724->18725 18728 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18725->18728 18729 7ff733f7a204 _get_daylight 11 API calls 18726->18729 18727->18725 18728->18716 18730 7ff733f7a5c0 18729->18730 18731 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18730->18731 18731->18718 18755 7ff733f81844 18732->18755 18734 7ff733f81609 18770 7ff733f812d4 18734->18770 18737 7ff733f81626 18737->18669 18738 7ff733f7c90c _fread_nolock 12 API calls 18739 7ff733f81637 18738->18739 18740 7ff733f8163f 18739->18740 18742 7ff733f8164e 18739->18742 18741 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18740->18741 18741->18737 18742->18742 18777 7ff733f8197c 18742->18777 18745 7ff733f8174a 18746 7ff733f743f4 _get_daylight 11 API calls 18745->18746 18747 7ff733f8174f 18746->18747 18751 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18747->18751 18748 7ff733f817a5 18750 7ff733f8180c 18748->18750 18788 7ff733f81104 18748->18788 18749 7ff733f81764 18749->18748 18752 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18749->18752 18754 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18750->18754 18751->18737 18752->18748 18754->18737 18756 7ff733f81867 18755->18756 18757 7ff733f81871 18756->18757 18803 7ff733f7f5e8 EnterCriticalSection 18756->18803 18760 7ff733f818e3 18757->18760 18761 7ff733f79814 __CxxCallCatchBlock 45 API calls 18757->18761 18760->18734 18763 7ff733f818fb 18761->18763 18766 7ff733f7a534 50 API calls 18763->18766 18769 7ff733f81952 18763->18769 18767 7ff733f8193c 18766->18767 18768 7ff733f815d4 65 API calls 18767->18768 18768->18769 18769->18734 18771 7ff733f74178 45 API calls 18770->18771 18772 7ff733f812e8 18771->18772 18773 7ff733f81306 18772->18773 18774 7ff733f812f4 GetOEMCP 18772->18774 18775 7ff733f8130b GetACP 18773->18775 18776 7ff733f8131b 18773->18776 18774->18776 18775->18776 18776->18737 18776->18738 18778 7ff733f812d4 47 API calls 18777->18778 18780 7ff733f819a9 18778->18780 18779 7ff733f81aff 18781 7ff733f6b870 _log10_special 8 API calls 18779->18781 18780->18779 18782 7ff733f819e6 IsValidCodePage 18780->18782 18784 7ff733f81a00 __scrt_get_show_window_mode 18780->18784 18785 7ff733f81741 18781->18785 18782->18779 18783 7ff733f819f7 18782->18783 18783->18784 18786 7ff733f81a26 GetCPInfo 18783->18786 18804 7ff733f813ec 18784->18804 18785->18745 18785->18749 18786->18779 18786->18784 18860 7ff733f7f5e8 EnterCriticalSection 18788->18860 18805 7ff733f81429 GetCPInfo 18804->18805 18814 7ff733f8151f 18804->18814 18810 7ff733f8143c 18805->18810 18805->18814 18806 7ff733f6b870 _log10_special 8 API calls 18807 7ff733f815be 18806->18807 18807->18779 18808 7ff733f82150 48 API calls 18809 7ff733f814b3 18808->18809 18815 7ff733f86e94 18809->18815 18810->18808 18813 7ff733f86e94 54 API calls 18813->18814 18814->18806 18816 7ff733f74178 45 API calls 18815->18816 18817 7ff733f86eb9 18816->18817 18820 7ff733f86b60 18817->18820 18821 7ff733f86ba1 18820->18821 18822 7ff733f7ebb0 _fread_nolock MultiByteToWideChar 18821->18822 18825 7ff733f86beb 18822->18825 18823 7ff733f86e69 18824 7ff733f6b870 _log10_special 8 API calls 18823->18824 18826 7ff733f814e6 18824->18826 18825->18823 18827 7ff733f7c90c _fread_nolock 12 API calls 18825->18827 18828 7ff733f86d21 18825->18828 18830 7ff733f86c23 18825->18830 18826->18813 18827->18830 18828->18823 18829 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18828->18829 18829->18823 18830->18828 18831 7ff733f7ebb0 _fread_nolock MultiByteToWideChar 18830->18831 18832 7ff733f86c96 18831->18832 18832->18828 18851 7ff733f7e3f4 18832->18851 18835 7ff733f86d32 18837 7ff733f7c90c _fread_nolock 12 API calls 18835->18837 18839 7ff733f86e04 18835->18839 18841 7ff733f86d50 18835->18841 18836 7ff733f86ce1 18836->18828 18838 7ff733f7e3f4 __crtLCMapStringW 6 API calls 18836->18838 18837->18841 18838->18828 18839->18828 18840 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18839->18840 18840->18828 18841->18828 18842 7ff733f7e3f4 __crtLCMapStringW 6 API calls 18841->18842 18843 7ff733f86dd0 18842->18843 18843->18839 18844 7ff733f86e06 18843->18844 18845 7ff733f86df0 18843->18845 18847 7ff733f7faf8 WideCharToMultiByte 18844->18847 18846 7ff733f7faf8 WideCharToMultiByte 18845->18846 18848 7ff733f86dfe 18846->18848 18847->18848 18848->18839 18849 7ff733f86e1e 18848->18849 18849->18828 18850 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18849->18850 18850->18828 18852 7ff733f7e020 __crtLCMapStringW 5 API calls 18851->18852 18853 7ff733f7e432 18852->18853 18856 7ff733f7e43a 18853->18856 18857 7ff733f7e4e0 18853->18857 18855 7ff733f7e4a3 LCMapStringW 18855->18856 18856->18828 18856->18835 18856->18836 18858 7ff733f7e020 __crtLCMapStringW 5 API calls 18857->18858 18859 7ff733f7e50e __crtLCMapStringW 18858->18859 18859->18855 18865 7ff733f787c5 18861->18865 18866 7ff733f78661 18861->18866 18862 7ff733f787ee 18864 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18862->18864 18863 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18863->18865 18864->18866 18865->18862 18865->18863 18866->18706 18868 7ff733f855e8 18867->18868 18869 7ff733f855d1 18867->18869 18868->18869 18871 7ff733f855f6 18868->18871 18870 7ff733f743f4 _get_daylight 11 API calls 18869->18870 18872 7ff733f855d6 18870->18872 18874 7ff733f74178 45 API calls 18871->18874 18875 7ff733f855e1 18871->18875 18873 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 18872->18873 18873->18875 18874->18875 18875->18545 18877 7ff733f74178 45 API calls 18876->18877 18878 7ff733f88281 18877->18878 18881 7ff733f87ed8 18878->18881 18884 7ff733f87f26 18881->18884 18882 7ff733f6b870 _log10_special 8 API calls 18883 7ff733f86515 18882->18883 18883->18545 18883->18570 18885 7ff733f87fad 18884->18885 18887 7ff733f87f98 GetCPInfo 18884->18887 18890 7ff733f87fb1 18884->18890 18886 7ff733f7ebb0 _fread_nolock MultiByteToWideChar 18885->18886 18885->18890 18888 7ff733f88045 18886->18888 18887->18885 18887->18890 18889 7ff733f7c90c _fread_nolock 12 API calls 18888->18889 18888->18890 18891 7ff733f8807c 18888->18891 18889->18891 18890->18882 18891->18890 18892 7ff733f7ebb0 _fread_nolock MultiByteToWideChar 18891->18892 18893 7ff733f880ea 18892->18893 18894 7ff733f881cc 18893->18894 18895 7ff733f7ebb0 _fread_nolock MultiByteToWideChar 18893->18895 18894->18890 18896 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18894->18896 18897 7ff733f88110 18895->18897 18896->18890 18897->18894 18898 7ff733f7c90c _fread_nolock 12 API calls 18897->18898 18899 7ff733f8813d 18897->18899 18898->18899 18899->18894 18900 7ff733f7ebb0 _fread_nolock MultiByteToWideChar 18899->18900 18901 7ff733f881b4 18900->18901 18902 7ff733f881d4 18901->18902 18903 7ff733f881ba 18901->18903 18910 7ff733f7e278 18902->18910 18903->18894 18905 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18903->18905 18905->18894 18907 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18908 7ff733f88213 18907->18908 18908->18890 18909 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18908->18909 18909->18890 18911 7ff733f7e020 __crtLCMapStringW 5 API calls 18910->18911 18912 7ff733f7e2b6 18911->18912 18913 7ff733f7e2be 18912->18913 18914 7ff733f7e4e0 __crtLCMapStringW 5 API calls 18912->18914 18913->18907 18913->18908 18915 7ff733f7e327 CompareStringW 18914->18915 18915->18913 18917 7ff733f86f6a HeapSize 18916->18917 18918 7ff733f86f51 18916->18918 18919 7ff733f743f4 _get_daylight 11 API calls 18918->18919 18920 7ff733f86f56 18919->18920 18921 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 18920->18921 18922 7ff733f86f61 18921->18922 18922->18575 18924 7ff733f86f99 18923->18924 18925 7ff733f86fa3 18923->18925 18926 7ff733f7c90c _fread_nolock 12 API calls 18924->18926 18927 7ff733f86fa8 18925->18927 18933 7ff733f86faf _get_daylight 18925->18933 18931 7ff733f86fa1 18926->18931 18930 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18927->18930 18928 7ff733f86fb5 18932 7ff733f743f4 _get_daylight 11 API calls 18928->18932 18929 7ff733f86fe2 HeapReAlloc 18929->18931 18929->18933 18930->18931 18931->18579 18932->18931 18933->18928 18933->18929 18934 7ff733f828a0 _get_daylight 2 API calls 18933->18934 18934->18933 18936 7ff733f7e020 __crtLCMapStringW 5 API calls 18935->18936 18937 7ff733f7e254 18936->18937 18937->18583 18939 7ff733f7480a 18938->18939 18940 7ff733f747e6 18938->18940 18941 7ff733f74864 18939->18941 18942 7ff733f7480f 18939->18942 18944 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18940->18944 18945 7ff733f747f5 18940->18945 18943 7ff733f7ebb0 _fread_nolock MultiByteToWideChar 18941->18943 18942->18945 18946 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18942->18946 18951 7ff733f74824 18942->18951 18948 7ff733f74880 18943->18948 18944->18945 18945->18587 18945->18588 18946->18951 18947 7ff733f7c90c _fread_nolock 12 API calls 18947->18945 18949 7ff733f74887 GetLastError 18948->18949 18950 7ff733f748c2 18948->18950 18954 7ff733f748b5 18948->18954 18957 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18948->18957 18952 7ff733f74368 _fread_nolock 11 API calls 18949->18952 18950->18945 18955 7ff733f7ebb0 _fread_nolock MultiByteToWideChar 18950->18955 18951->18947 18953 7ff733f74894 18952->18953 18956 7ff733f743f4 _get_daylight 11 API calls 18953->18956 18958 7ff733f7c90c _fread_nolock 12 API calls 18954->18958 18959 7ff733f74906 18955->18959 18956->18945 18957->18954 18958->18950 18959->18945 18959->18949 18961 7ff733f7853d 18960->18961 18962 7ff733f78539 18960->18962 18981 7ff733f81d4c GetEnvironmentStringsW 18961->18981 18962->18618 18973 7ff733f788e4 18962->18973 18965 7ff733f7854a 18967 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18965->18967 18966 7ff733f78556 18988 7ff733f786a4 18966->18988 18967->18962 18970 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18971 7ff733f7857d 18970->18971 18972 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18971->18972 18972->18962 18974 7ff733f78907 18973->18974 18979 7ff733f7891e 18973->18979 18974->18618 18975 7ff733f7ebb0 MultiByteToWideChar _fread_nolock 18975->18979 18976 7ff733f7dea8 _get_daylight 11 API calls 18976->18979 18977 7ff733f78992 18978 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18977->18978 18978->18974 18979->18974 18979->18975 18979->18976 18979->18977 18980 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18979->18980 18980->18979 18982 7ff733f78542 18981->18982 18983 7ff733f81d70 18981->18983 18982->18965 18982->18966 18984 7ff733f7c90c _fread_nolock 12 API calls 18983->18984 18985 7ff733f81da7 memcpy_s 18984->18985 18986 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18985->18986 18987 7ff733f81dc7 FreeEnvironmentStringsW 18986->18987 18987->18982 18989 7ff733f786cc 18988->18989 18990 7ff733f7dea8 _get_daylight 11 API calls 18989->18990 19003 7ff733f78707 18990->19003 18991 7ff733f7870f 18992 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18991->18992 18993 7ff733f7855e 18992->18993 18993->18970 18994 7ff733f78789 18995 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18994->18995 18995->18993 18996 7ff733f7dea8 _get_daylight 11 API calls 18996->19003 18997 7ff733f78778 18998 7ff733f787c0 11 API calls 18997->18998 19000 7ff733f78780 18998->19000 18999 7ff733f7f784 37 API calls 18999->19003 19001 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19000->19001 19001->18991 19002 7ff733f787ac 19005 7ff733f79c10 _isindst 17 API calls 19002->19005 19003->18991 19003->18994 19003->18996 19003->18997 19003->18999 19003->19002 19004 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19003->19004 19004->19003 19006 7ff733f787be 19005->19006 19008 7ff733f87e41 __crtLCMapStringW 19007->19008 19009 7ff733f863fe 19008->19009 19010 7ff733f7e278 6 API calls 19008->19010 19009->18623 19009->18643 19010->19009 19305 7ff733f79060 19308 7ff733f78fe4 19305->19308 19315 7ff733f7f5e8 EnterCriticalSection 19308->19315 19998 7ff733f7a2e0 19999 7ff733f7a2e5 19998->19999 20000 7ff733f7a2fa 19998->20000 20004 7ff733f7a300 19999->20004 20005 7ff733f7a34a 20004->20005 20006 7ff733f7a342 20004->20006 20008 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20005->20008 20007 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20006->20007 20007->20005 20009 7ff733f7a357 20008->20009 20010 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20009->20010 20011 7ff733f7a364 20010->20011 20012 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20011->20012 20013 7ff733f7a371 20012->20013 20014 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20013->20014 20015 7ff733f7a37e 20014->20015 20016 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20015->20016 20017 7ff733f7a38b 20016->20017 20018 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20017->20018 20019 7ff733f7a398 20018->20019 20020 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20019->20020 20021 7ff733f7a3a5 20020->20021 20022 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20021->20022 20023 7ff733f7a3b5 20022->20023 20024 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20023->20024 20025 7ff733f7a3c5 20024->20025 20030 7ff733f7a1a4 20025->20030 20044 7ff733f7f5e8 EnterCriticalSection 20030->20044 20088 7ff733f89ef3 20091 7ff733f89f03 20088->20091 20092 7ff733f74788 LeaveCriticalSection 20091->20092 19383 7ff733f6be70 19384 7ff733f6be80 19383->19384 19400 7ff733f78ec0 19384->19400 19386 7ff733f6be8c 19406 7ff733f6c168 19386->19406 19388 7ff733f6bef9 19389 7ff733f6c44c 7 API calls 19388->19389 19399 7ff733f6bf15 19388->19399 19391 7ff733f6bf25 19389->19391 19390 7ff733f6bea4 _RTC_Initialize 19390->19388 19411 7ff733f6c318 19390->19411 19393 7ff733f6beb9 19414 7ff733f7832c 19393->19414 19401 7ff733f78ed1 19400->19401 19402 7ff733f78ed9 19401->19402 19403 7ff733f743f4 _get_daylight 11 API calls 19401->19403 19402->19386 19404 7ff733f78ee8 19403->19404 19405 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 19404->19405 19405->19402 19407 7ff733f6c179 19406->19407 19410 7ff733f6c17e __scrt_acquire_startup_lock 19406->19410 19408 7ff733f6c44c 7 API calls 19407->19408 19407->19410 19409 7ff733f6c1f2 19408->19409 19410->19390 19439 7ff733f6c2dc 19411->19439 19413 7ff733f6c321 19413->19393 19415 7ff733f7834c 19414->19415 19416 7ff733f6bec5 19414->19416 19417 7ff733f7836a GetModuleFileNameW 19415->19417 19418 7ff733f78354 19415->19418 19416->19388 19438 7ff733f6c3ec InitializeSListHead 19416->19438 19422 7ff733f78395 19417->19422 19419 7ff733f743f4 _get_daylight 11 API calls 19418->19419 19420 7ff733f78359 19419->19420 19421 7ff733f79bf0 _invalid_parameter_noinfo 37 API calls 19420->19421 19421->19416 19454 7ff733f782cc 19422->19454 19425 7ff733f783dd 19426 7ff733f743f4 _get_daylight 11 API calls 19425->19426 19427 7ff733f783e2 19426->19427 19428 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19427->19428 19428->19416 19429 7ff733f783f5 19430 7ff733f78417 19429->19430 19432 7ff733f7845c 19429->19432 19433 7ff733f78443 19429->19433 19431 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19430->19431 19431->19416 19435 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19432->19435 19434 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19433->19434 19436 7ff733f7844c 19434->19436 19435->19430 19437 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19436->19437 19437->19416 19440 7ff733f6c2f6 19439->19440 19442 7ff733f6c2ef 19439->19442 19443 7ff733f794fc 19440->19443 19442->19413 19446 7ff733f79138 19443->19446 19453 7ff733f7f5e8 EnterCriticalSection 19446->19453 19455 7ff733f782e4 19454->19455 19456 7ff733f7831c 19454->19456 19455->19456 19457 7ff733f7dea8 _get_daylight 11 API calls 19455->19457 19456->19425 19456->19429 19458 7ff733f78312 19457->19458 19459 7ff733f79c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19458->19459 19459->19456 18330 7ff733f78c79 18331 7ff733f796e8 45 API calls 18330->18331 18332 7ff733f78c7e 18331->18332 18333 7ff733f78ca5 GetModuleHandleW 18332->18333 18334 7ff733f78cef 18332->18334 18333->18334 18340 7ff733f78cb2 18333->18340 18342 7ff733f78b7c 18334->18342 18340->18334 18356 7ff733f78da0 GetModuleHandleExW 18340->18356 18362 7ff733f7f5e8 EnterCriticalSection 18342->18362 18357 7ff733f78dfd 18356->18357 18358 7ff733f78dd4 GetProcAddress 18356->18358 18360 7ff733f78e09 18357->18360 18361 7ff733f78e02 FreeLibrary 18357->18361 18359 7ff733f78de6 18358->18359 18359->18357 18360->18334 18361->18360 19479 7ff733f8a079 19482 7ff733f74788 LeaveCriticalSection 19479->19482 19124 7ff733f6ae00 19125 7ff733f6ae2e 19124->19125 19126 7ff733f6ae15 19124->19126 19126->19125 19128 7ff733f7c90c 12 API calls 19126->19128 19127 7ff733f6ae8e 19128->19127 20178 7ff733f8a10e 20179 7ff733f8a127 20178->20179 20180 7ff733f8a11d 20178->20180 20182 7ff733f7f648 LeaveCriticalSection 20180->20182

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 7ff733f61000-7ff733f63536 call 7ff733f6f138 call 7ff733f6f140 call 7ff733f6bb70 call 7ff733f74700 call 7ff733f74794 call 7ff733f633e0 14 7ff733f63538-7ff733f6353f 0->14 15 7ff733f63544-7ff733f63566 call 7ff733f618f0 0->15 16 7ff733f6371a-7ff733f63735 call 7ff733f6b870 14->16 21 7ff733f6356c-7ff733f63583 call 7ff733f61bf0 15->21 22 7ff733f63736-7ff733f6374c call 7ff733f63f70 15->22 26 7ff733f63588-7ff733f635c1 21->26 29 7ff733f6374e-7ff733f6377b call 7ff733f676a0 22->29 30 7ff733f63785-7ff733f6379a call 7ff733f625f0 22->30 27 7ff733f635c7-7ff733f635cb 26->27 28 7ff733f63653-7ff733f6366d call 7ff733f67e10 26->28 31 7ff733f635cd-7ff733f635e5 call 7ff733f74560 27->31 32 7ff733f63638-7ff733f6364d call 7ff733f618e0 27->32 42 7ff733f63695-7ff733f6369c 28->42 43 7ff733f6366f-7ff733f63675 28->43 45 7ff733f6377d-7ff733f63780 call 7ff733f6f36c 29->45 46 7ff733f6379f-7ff733f637be call 7ff733f61bf0 29->46 44 7ff733f63712 30->44 48 7ff733f635e7-7ff733f635eb 31->48 49 7ff733f635f2-7ff733f6360a call 7ff733f74560 31->49 32->27 32->28 53 7ff733f63844-7ff733f63863 call 7ff733f63e90 42->53 54 7ff733f636a2-7ff733f636c0 call 7ff733f67e10 call 7ff733f67f80 42->54 50 7ff733f63677-7ff733f63680 43->50 51 7ff733f63682-7ff733f63690 call 7ff733f7415c 43->51 44->16 45->30 61 7ff733f637c1-7ff733f637ca 46->61 48->49 66 7ff733f6360c-7ff733f63610 49->66 67 7ff733f63617-7ff733f6362f call 7ff733f74560 49->67 50->51 51->42 69 7ff733f63865-7ff733f6386f call 7ff733f63fe0 53->69 70 7ff733f63871-7ff733f63882 call 7ff733f61bf0 53->70 79 7ff733f636c6-7ff733f636c9 54->79 80 7ff733f6380f-7ff733f6381e call 7ff733f68400 54->80 61->61 65 7ff733f637cc-7ff733f637e9 call 7ff733f618f0 61->65 65->26 84 7ff733f637ef-7ff733f63800 call 7ff733f625f0 65->84 66->67 67->32 85 7ff733f63631 67->85 76 7ff733f63887-7ff733f638a1 call 7ff733f686b0 69->76 70->76 94 7ff733f638a3 76->94 95 7ff733f638af-7ff733f638c1 SetDllDirectoryW 76->95 79->80 86 7ff733f636cf-7ff733f636f6 call 7ff733f61bf0 79->86 92 7ff733f6382c-7ff733f6382f call 7ff733f67c40 80->92 93 7ff733f63820 80->93 84->44 85->32 97 7ff733f636fc-7ff733f63703 call 7ff733f625f0 86->97 98 7ff733f63805-7ff733f6380d call 7ff733f7415c 86->98 103 7ff733f63834-7ff733f63836 92->103 93->92 94->95 100 7ff733f638c3-7ff733f638ca 95->100 101 7ff733f638d0-7ff733f638ec call 7ff733f66560 call 7ff733f66b00 95->101 107 7ff733f63708-7ff733f6370a 97->107 98->76 100->101 104 7ff733f63a50-7ff733f63a58 100->104 118 7ff733f638ee-7ff733f638f4 101->118 119 7ff733f63947-7ff733f6394a call 7ff733f66510 101->119 103->76 110 7ff733f63838 103->110 108 7ff733f63a7d-7ff733f63aaf call 7ff733f633d0 call 7ff733f63080 call 7ff733f633a0 call 7ff733f66780 call 7ff733f66510 104->108 109 7ff733f63a5a-7ff733f63a77 PostMessageW GetMessageW 104->109 107->44 109->108 110->53 122 7ff733f6390e-7ff733f63918 call 7ff733f66970 118->122 123 7ff733f638f6-7ff733f63903 call 7ff733f665a0 118->123 125 7ff733f6394f-7ff733f63956 119->125 134 7ff733f6391a-7ff733f63921 122->134 135 7ff733f63923-7ff733f63931 call 7ff733f66cd0 122->135 123->122 132 7ff733f63905-7ff733f6390c 123->132 125->104 129 7ff733f6395c-7ff733f63966 call 7ff733f630e0 125->129 129->107 141 7ff733f6396c-7ff733f63980 call 7ff733f683e0 129->141 137 7ff733f6393a-7ff733f63942 call 7ff733f62870 call 7ff733f66780 132->137 134->137 135->125 147 7ff733f63933 135->147 137->119 151 7ff733f639a5-7ff733f639e1 call 7ff733f67f20 call 7ff733f67fc0 call 7ff733f66780 call 7ff733f66510 call 7ff733f67ec0 141->151 152 7ff733f63982-7ff733f6399f PostMessageW GetMessageW 141->152 147->137 162 7ff733f639e6-7ff733f639e8 151->162 152->151 163 7ff733f63a3d-7ff733f63a4b call 7ff733f618a0 162->163 164 7ff733f639ea-7ff733f63a00 call 7ff733f681f0 call 7ff733f67ec0 162->164 163->107 164->163 171 7ff733f63a02-7ff733f63a10 164->171 172 7ff733f63a12-7ff733f63a2c call 7ff733f625f0 call 7ff733f618a0 171->172 173 7ff733f63a31-7ff733f63a38 call 7ff733f62870 171->173 172->107 173->163
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FileModuleName
                                  • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$ERROR: failed to remove temporary directory: %s$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$MEI$PYINSTALLER_STRICT_UNPACK_MODE$Path exceeds PYI_PATH_MAX limit.$WARNING: failed to remove temporary directory: %s$_MEIPASS2$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-runtime-tmpdir
                                  • API String ID: 514040917-585287483
                                  • Opcode ID: 0a04b38bed04a14b463916ac8b6dd5067d5cff25c4ec1f8a055a289e318ab9ad
                                  • Instruction ID: d706a917ba471e89090486f15826967039176175e2c89b18d124083d96b9a066
                                  • Opcode Fuzzy Hash: 0a04b38bed04a14b463916ac8b6dd5067d5cff25c4ec1f8a055a289e318ab9ad
                                  • Instruction Fuzzy Hash: 82F18021A08683B1FBB8FB21D5552F9E351AF54780FC44032DA5DA72E6EF2CE558E360

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 335 7ff733f85c74-7ff733f85ce7 call 7ff733f859a8 338 7ff733f85ce9-7ff733f85cf2 call 7ff733f743d4 335->338 339 7ff733f85d01-7ff733f85d0b call 7ff733f77830 335->339 344 7ff733f85cf5-7ff733f85cfc call 7ff733f743f4 338->344 345 7ff733f85d0d-7ff733f85d24 call 7ff733f743d4 call 7ff733f743f4 339->345 346 7ff733f85d26-7ff733f85d8f CreateFileW 339->346 361 7ff733f86042-7ff733f86062 344->361 345->344 347 7ff733f85e0c-7ff733f85e17 GetFileType 346->347 348 7ff733f85d91-7ff733f85d97 346->348 354 7ff733f85e6a-7ff733f85e71 347->354 355 7ff733f85e19-7ff733f85e54 GetLastError call 7ff733f74368 CloseHandle 347->355 351 7ff733f85dd9-7ff733f85e07 GetLastError call 7ff733f74368 348->351 352 7ff733f85d99-7ff733f85d9d 348->352 351->344 352->351 359 7ff733f85d9f-7ff733f85dd7 CreateFileW 352->359 357 7ff733f85e79-7ff733f85e7c 354->357 358 7ff733f85e73-7ff733f85e77 354->358 355->344 370 7ff733f85e5a-7ff733f85e65 call 7ff733f743f4 355->370 365 7ff733f85e82-7ff733f85ed7 call 7ff733f77748 357->365 366 7ff733f85e7e 357->366 358->365 359->347 359->351 373 7ff733f85ed9-7ff733f85ee5 call 7ff733f85bb0 365->373 374 7ff733f85ef6-7ff733f85f27 call 7ff733f85728 365->374 366->365 370->344 373->374 382 7ff733f85ee7 373->382 380 7ff733f85f2d-7ff733f85f6f 374->380 381 7ff733f85f29-7ff733f85f2b 374->381 384 7ff733f85f91-7ff733f85f9c 380->384 385 7ff733f85f71-7ff733f85f75 380->385 383 7ff733f85ee9-7ff733f85ef1 call 7ff733f79dd0 381->383 382->383 383->361 387 7ff733f85fa2-7ff733f85fa6 384->387 388 7ff733f86040 384->388 385->384 386 7ff733f85f77-7ff733f85f8c 385->386 386->384 387->388 390 7ff733f85fac-7ff733f85ff1 CloseHandle CreateFileW 387->390 388->361 392 7ff733f86026-7ff733f8603b 390->392 393 7ff733f85ff3-7ff733f86021 GetLastError call 7ff733f74368 call 7ff733f77970 390->393 392->388 393->392
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                  • String ID:
                                  • API String ID: 1617910340-0
                                  • Opcode ID: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                  • Instruction ID: c79fa004885b77c81de0045d36f9e69ac0f3bd074958a51a98f2ee174d58f3c7
                                  • Opcode Fuzzy Hash: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                  • Instruction Fuzzy Hash: 24C1D032B28A4296EBA4DF68C4806BC7761FB49B98B801235DE2E7B794CF38D451D310

                                  Control-flow Graph

                                  APIs
                                  • FindFirstFileW.KERNELBASE(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67A1B
                                  • RemoveDirectoryW.KERNEL32(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67A9E
                                  • DeleteFileW.KERNELBASE(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67ABD
                                  • FindNextFileW.KERNELBASE(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67ACB
                                  • FindClose.KERNEL32(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67ADC
                                  • RemoveDirectoryW.KERNELBASE(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67AE5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                                  • String ID: %s\*
                                  • API String ID: 1057558799-766152087
                                  • Opcode ID: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                  • Instruction ID: ba42741f2ca969c2a5e2c75f745a78450b22403dcc208d44858e036b50afe489
                                  • Opcode Fuzzy Hash: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                  • Instruction Fuzzy Hash: 9541A621A0C983A1EAB0BB24E8545B9A360FF94754FC00232E59E676E4DF3DDA4ED710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirst
                                  • String ID:
                                  • API String ID: 2295610775-0
                                  • Opcode ID: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                  • Instruction ID: f06a048bcc97a945bdbb15d6f174d6b4e69bdd896cf70585fb999ead8d2bd566
                                  • Opcode Fuzzy Hash: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                  • Instruction Fuzzy Hash: AFF0C832A1864796F7F09B60B549766B390AB84328FC40339D96E166D4DF3CD4599B00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CurrentFeaturePresentProcessProcessor
                                  • String ID:
                                  • API String ID: 1010374628-0
                                  • Opcode ID: a8238ebacfbb29389201daedac3868d1c225100c6328c8ae619a1fe2ce119bc6
                                  • Instruction ID: 7572f64434817685b6ea410b491d67b326046350850e7b3e96284046edb78dd8
                                  • Opcode Fuzzy Hash: a8238ebacfbb29389201daedac3868d1c225100c6328c8ae619a1fe2ce119bc6
                                  • Instruction Fuzzy Hash: E802CF21A1DB8371FEF5BB21940127AE680AF45BE1FD44635ED6D7A3D2DE3CA441A320

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 179 7ff733f618f0-7ff733f6192b call 7ff733f63f70 182 7ff733f61bc1-7ff733f61be5 call 7ff733f6b870 179->182 183 7ff733f61931-7ff733f61971 call 7ff733f676a0 179->183 188 7ff733f61bae-7ff733f61bb1 call 7ff733f6f36c 183->188 189 7ff733f61977-7ff733f61987 call 7ff733f6f9f4 183->189 193 7ff733f61bb6-7ff733f61bbe 188->193 194 7ff733f61989-7ff733f6199c call 7ff733f62760 189->194 195 7ff733f619a1-7ff733f619bd call 7ff733f6f6bc 189->195 193->182 194->188 200 7ff733f619d7-7ff733f619ec call 7ff733f74154 195->200 201 7ff733f619bf-7ff733f619d2 call 7ff733f62760 195->201 206 7ff733f619ee-7ff733f61a01 call 7ff733f62760 200->206 207 7ff733f61a06-7ff733f61a87 call 7ff733f61bf0 * 2 call 7ff733f6f9f4 200->207 201->188 206->188 215 7ff733f61a8c-7ff733f61a9f call 7ff733f74170 207->215 218 7ff733f61ab9-7ff733f61ad2 call 7ff733f6f6bc 215->218 219 7ff733f61aa1-7ff733f61ab4 call 7ff733f62760 215->219 224 7ff733f61aec-7ff733f61b08 call 7ff733f6f430 218->224 225 7ff733f61ad4-7ff733f61ae7 call 7ff733f62760 218->225 219->188 230 7ff733f61b1b-7ff733f61b29 224->230 231 7ff733f61b0a-7ff733f61b16 call 7ff733f625f0 224->231 225->188 230->188 233 7ff733f61b2f-7ff733f61b3e 230->233 231->188 235 7ff733f61b40-7ff733f61b46 233->235 236 7ff733f61b48-7ff733f61b55 235->236 237 7ff733f61b60-7ff733f61b6f 235->237 238 7ff733f61b71-7ff733f61b7a 236->238 237->237 237->238 239 7ff733f61b7c-7ff733f61b7f 238->239 240 7ff733f61b8f 238->240 239->240 241 7ff733f61b81-7ff733f61b84 239->241 242 7ff733f61b91-7ff733f61bac 240->242 241->240 243 7ff733f61b86-7ff733f61b89 241->243 242->188 242->235 243->240 244 7ff733f61b8b-7ff733f61b8d 243->244 244->242
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _fread_nolock$Message
                                  • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                  • API String ID: 677216364-3497178890
                                  • Opcode ID: 6a8a7597683d49c9470c6fd86126268f702b141aa565d418604a71569c4ea044
                                  • Instruction ID: a8d2b55761b153be60d5fd9e00cae964e9dc34fc28c84e06052e6f5d98e3f2a4
                                  • Opcode Fuzzy Hash: 6a8a7597683d49c9470c6fd86126268f702b141aa565d418604a71569c4ea044
                                  • Instruction Fuzzy Hash: CC71E431B08687A5EBB4FB25D4402F9A3A0FF48784FC44135E98D67799EE3CE545AB20

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 245 7ff733f615c0-7ff733f615d1 246 7ff733f615f7-7ff733f61611 call 7ff733f63f70 245->246 247 7ff733f615d3-7ff733f615dc call 7ff733f61050 245->247 252 7ff733f6163b-7ff733f61655 call 7ff733f63f70 246->252 253 7ff733f61613-7ff733f6163a call 7ff733f62760 246->253 254 7ff733f615ee-7ff733f615f6 247->254 255 7ff733f615de-7ff733f615e9 call 7ff733f625f0 247->255 261 7ff733f61657-7ff733f6166c call 7ff733f625f0 252->261 262 7ff733f61671-7ff733f61688 call 7ff733f6f9f4 252->262 255->254 267 7ff733f617c5-7ff733f617c8 call 7ff733f6f36c 261->267 268 7ff733f616ab-7ff733f616af 262->268 269 7ff733f6168a-7ff733f616a6 call 7ff733f62760 262->269 275 7ff733f617cd-7ff733f617df 267->275 271 7ff733f616c9-7ff733f616e9 call 7ff733f74170 268->271 272 7ff733f616b1-7ff733f616bd call 7ff733f611f0 268->272 278 7ff733f617bd-7ff733f617c0 call 7ff733f6f36c 269->278 282 7ff733f6170c-7ff733f61717 271->282 283 7ff733f616eb-7ff733f61707 call 7ff733f62760 271->283 279 7ff733f616c2-7ff733f616c4 272->279 278->267 279->278 285 7ff733f6171d-7ff733f61726 282->285 286 7ff733f617a6-7ff733f617ae call 7ff733f7415c 282->286 290 7ff733f617b3-7ff733f617b8 283->290 289 7ff733f61730-7ff733f61752 call 7ff733f6f6bc 285->289 286->290 294 7ff733f61754-7ff733f6176c call 7ff733f6fdfc 289->294 295 7ff733f61785-7ff733f6178c 289->295 290->278 300 7ff733f6176e-7ff733f61771 294->300 301 7ff733f61775-7ff733f61783 294->301 297 7ff733f61793-7ff733f6179c call 7ff733f62760 295->297 304 7ff733f617a1 297->304 300->289 303 7ff733f61773 300->303 301->297 303->304 304->286
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                  • API String ID: 2030045667-1550345328
                                  • Opcode ID: adbc31a2fe2fde7fb3735bf1b18c6ca33e7db29dbdacf29e2c2b8f7993e137ca
                                  • Instruction ID: 77d7af44cc823f2da87c29d51b630c651658d860286cd1fc53bd906e64ca019d
                                  • Opcode Fuzzy Hash: adbc31a2fe2fde7fb3735bf1b18c6ca33e7db29dbdacf29e2c2b8f7993e137ca
                                  • Instruction Fuzzy Hash: D651D121B08643B2EAB4BB11E9101B9A3A0BF44794FC44131ED5C2B7A6EF3CE945B720

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                  • String ID: CreateProcessW$Failed to create child process!
                                  • API String ID: 2895956056-699529898
                                  • Opcode ID: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                  • Instruction ID: fb3e0cb77ddc591f6c653f027e898d611701c11693a8953553ee14884d9578ba
                                  • Opcode Fuzzy Hash: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                  • Instruction Fuzzy Hash: 41412D32A18B8291EA70AB24F4452AAB3A1FBC5360FD00335E6AD577E5DF7CD4459B10

                                  Control-flow Graph

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                  • API String ID: 2030045667-2813020118
                                  • Opcode ID: bb86d4b09916ff62f83bc664640a5bb88bf9c2c6ab5ccf9a34b792e00a5b311f
                                  • Instruction ID: 1b43d0ddc1256e16730c599045681265c1a6f3be219be1b9ec5bec275f78db03
                                  • Opcode Fuzzy Hash: bb86d4b09916ff62f83bc664640a5bb88bf9c2c6ab5ccf9a34b792e00a5b311f
                                  • Instruction Fuzzy Hash: 7351F822A08643A1EAB0BB12A4503BAE251FF85794FC44135ED8E67BD5EF3CE541E720

                                  Control-flow Graph

                                  APIs
                                  • FreeLibrary.KERNEL32(?,?,?,00007FF733F7E3BA,?,?,-00000018,00007FF733F7A063,?,?,?,00007FF733F79F5A,?,?,?,00007FF733F7524E), ref: 00007FF733F7E19C
                                  • GetProcAddress.KERNEL32(?,?,?,00007FF733F7E3BA,?,?,-00000018,00007FF733F7A063,?,?,?,00007FF733F79F5A,?,?,?,00007FF733F7524E), ref: 00007FF733F7E1A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressFreeLibraryProc
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3013587201-537541572
                                  • Opcode ID: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                  • Instruction ID: 2e079c796433af1a702f68cdfc3f7262db39fb952d3a8f7453a149568ca971ea
                                  • Opcode Fuzzy Hash: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                  • Instruction Fuzzy Hash: 87412631B19A03A1FAB5AB12AC00675E392BF54BD4FC80136ED1D777A4EE7CE405A320

                                  Control-flow Graph

                                  APIs
                                  • GetTempPathW.KERNEL32(?,?,FFFFFFFF,00007FF733F63834), ref: 00007FF733F67CE4
                                  • CreateDirectoryW.KERNELBASE(?,?,FFFFFFFF,00007FF733F63834), ref: 00007FF733F67D2C
                                    • Part of subcall function 00007FF733F67E10: GetEnvironmentVariableW.KERNEL32(00007FF733F6365F), ref: 00007FF733F67E47
                                    • Part of subcall function 00007FF733F67E10: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF733F67E69
                                    • Part of subcall function 00007FF733F77548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F77561
                                    • Part of subcall function 00007FF733F626C0: MessageBoxW.USER32 ref: 00007FF733F62736
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Environment$CreateDirectoryExpandMessagePathStringsTempVariable_invalid_parameter_noinfo
                                  • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                                  • API String ID: 740614611-1339014028
                                  • Opcode ID: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
                                  • Instruction ID: e880b1f9b66444cc5369ada3a98a3dc9eddd0b02431a84f277655a472f1d5bf9
                                  • Opcode Fuzzy Hash: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
                                  • Instruction Fuzzy Hash: 7241BF11B19A4760FAB5BB6299512F9D351AF857C0FC00131FD1D7B7A6EE3CE508A320

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 572 7ff733f7ad6c-7ff733f7ad92 573 7ff733f7adad-7ff733f7adb1 572->573 574 7ff733f7ad94-7ff733f7ada8 call 7ff733f743d4 call 7ff733f743f4 572->574 576 7ff733f7b187-7ff733f7b193 call 7ff733f743d4 call 7ff733f743f4 573->576 577 7ff733f7adb7-7ff733f7adbe 573->577 590 7ff733f7b19e 574->590 596 7ff733f7b199 call 7ff733f79bf0 576->596 577->576 579 7ff733f7adc4-7ff733f7adf2 577->579 579->576 582 7ff733f7adf8-7ff733f7adff 579->582 585 7ff733f7ae18-7ff733f7ae1b 582->585 586 7ff733f7ae01-7ff733f7ae13 call 7ff733f743d4 call 7ff733f743f4 582->586 588 7ff733f7b183-7ff733f7b185 585->588 589 7ff733f7ae21-7ff733f7ae27 585->589 586->596 593 7ff733f7b1a1-7ff733f7b1b8 588->593 589->588 594 7ff733f7ae2d-7ff733f7ae30 589->594 590->593 594->586 598 7ff733f7ae32-7ff733f7ae57 594->598 596->590 601 7ff733f7ae8a-7ff733f7ae91 598->601 602 7ff733f7ae59-7ff733f7ae5b 598->602 603 7ff733f7ae66-7ff733f7ae7d call 7ff733f743d4 call 7ff733f743f4 call 7ff733f79bf0 601->603 604 7ff733f7ae93-7ff733f7aebb call 7ff733f7c90c call 7ff733f79c58 * 2 601->604 605 7ff733f7ae5d-7ff733f7ae64 602->605 606 7ff733f7ae82-7ff733f7ae88 602->606 638 7ff733f7b010 603->638 633 7ff733f7aebd-7ff733f7aed3 call 7ff733f743f4 call 7ff733f743d4 604->633 634 7ff733f7aed8-7ff733f7af03 call 7ff733f7b594 604->634 605->603 605->606 609 7ff733f7af08-7ff733f7af1f 606->609 610 7ff733f7af9a-7ff733f7afa4 call 7ff733f82c2c 609->610 611 7ff733f7af21-7ff733f7af29 609->611 624 7ff733f7b02e 610->624 625 7ff733f7afaa-7ff733f7afbf 610->625 611->610 614 7ff733f7af2b-7ff733f7af2d 611->614 614->610 618 7ff733f7af2f-7ff733f7af45 614->618 618->610 622 7ff733f7af47-7ff733f7af53 618->622 622->610 627 7ff733f7af55-7ff733f7af57 622->627 629 7ff733f7b033-7ff733f7b053 ReadFile 624->629 625->624 630 7ff733f7afc1-7ff733f7afd3 GetConsoleMode 625->630 627->610 632 7ff733f7af59-7ff733f7af71 627->632 635 7ff733f7b14d-7ff733f7b156 GetLastError 629->635 636 7ff733f7b059-7ff733f7b061 629->636 630->624 637 7ff733f7afd5-7ff733f7afdd 630->637 632->610 642 7ff733f7af73-7ff733f7af7f 632->642 633->638 634->609 639 7ff733f7b158-7ff733f7b16e call 7ff733f743f4 call 7ff733f743d4 635->639 640 7ff733f7b173-7ff733f7b176 635->640 636->635 644 7ff733f7b067 636->644 637->629 646 7ff733f7afdf-7ff733f7b001 ReadConsoleW 637->646 641 7ff733f7b013-7ff733f7b01d call 7ff733f79c58 638->641 639->638 652 7ff733f7b17c-7ff733f7b17e 640->652 653 7ff733f7b009-7ff733f7b00b call 7ff733f74368 640->653 641->593 642->610 651 7ff733f7af81-7ff733f7af83 642->651 655 7ff733f7b06e-7ff733f7b083 644->655 647 7ff733f7b003 GetLastError 646->647 648 7ff733f7b022-7ff733f7b02c 646->648 647->653 648->655 651->610 660 7ff733f7af85-7ff733f7af95 651->660 652->641 653->638 655->641 662 7ff733f7b085-7ff733f7b090 655->662 660->610 665 7ff733f7b0b7-7ff733f7b0bf 662->665 666 7ff733f7b092-7ff733f7b0ab call 7ff733f7a984 662->666 667 7ff733f7b13b-7ff733f7b148 call 7ff733f7a7c4 665->667 668 7ff733f7b0c1-7ff733f7b0d3 665->668 671 7ff733f7b0b0-7ff733f7b0b2 666->671 667->671 672 7ff733f7b12e-7ff733f7b136 668->672 673 7ff733f7b0d5 668->673 671->641 672->641 676 7ff733f7b0da-7ff733f7b0e1 673->676 677 7ff733f7b11d-7ff733f7b128 676->677 678 7ff733f7b0e3-7ff733f7b0e7 676->678 677->672 679 7ff733f7b0e9-7ff733f7b0f0 678->679 680 7ff733f7b103 678->680 679->680 681 7ff733f7b0f2-7ff733f7b0f6 679->681 682 7ff733f7b109-7ff733f7b119 680->682 681->680 683 7ff733f7b0f8-7ff733f7b101 681->683 682->676 684 7ff733f7b11b 682->684 683->682 684->672
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: 7e4b6968f21da67f115f2b5899b729ebe27c21aa0167ab1df282e77588440d71
                                  • Instruction ID: fbb662e8dcabc13431d522c6a7f4ace926a0dbcd8f3e28efce4eecbf66b42511
                                  • Opcode Fuzzy Hash: 7e4b6968f21da67f115f2b5899b729ebe27c21aa0167ab1df282e77588440d71
                                  • Instruction Fuzzy Hash: E1C1E222A0C68761EBF1AB1594002BEB750EF91BC1FD50131FA5E23791CEBDE855A720

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                  • String ID:
                                  • API String ID: 995526605-0
                                  • Opcode ID: 748b97fd960fc4e5004671791fa0bd5d217265360f36ca399a643c65045a3ab9
                                  • Instruction ID: 1d9d2ffab3d85de53c04902c5d891f8ff300bb22b1251b39fb4dddd3b0bbe515
                                  • Opcode Fuzzy Hash: 748b97fd960fc4e5004671791fa0bd5d217265360f36ca399a643c65045a3ab9
                                  • Instruction Fuzzy Hash: AF218531A0CA4351EBB0AB65E44022AE3A1FF857A4FD00235EA7D67BE4DF7CD8499710

                                  Control-flow Graph

                                  APIs
                                  • GetModuleFileNameW.KERNEL32(?,00007FF733F63534), ref: 00007FF733F63411
                                    • Part of subcall function 00007FF733F629E0: GetLastError.KERNEL32(?,?,?,00007FF733F6342E,?,00007FF733F63534), ref: 00007FF733F62A14
                                    • Part of subcall function 00007FF733F629E0: FormatMessageW.KERNEL32(?,?,?,00007FF733F6342E), ref: 00007FF733F62A7D
                                    • Part of subcall function 00007FF733F629E0: MessageBoxW.USER32 ref: 00007FF733F62ACF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message$ErrorFileFormatLastModuleName
                                  • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                  • API String ID: 517058245-2863816727
                                  • Opcode ID: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                  • Instruction ID: 976e5697552e0a8c3d0460734add27d143f8cb50d8b8c5fb292f3c9d70ba34df
                                  • Opcode Fuzzy Hash: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                  • Instruction Fuzzy Hash: CD21A161B0C543B1FAB5BB25E8513B9D2A0BF48395FC00137E65DA65F5EE2CE504E720

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00007FF733F67B50: GetCurrentProcess.KERNEL32 ref: 00007FF733F67B70
                                    • Part of subcall function 00007FF733F67B50: OpenProcessToken.ADVAPI32 ref: 00007FF733F67B83
                                    • Part of subcall function 00007FF733F67B50: GetTokenInformation.KERNELBASE ref: 00007FF733F67BA8
                                    • Part of subcall function 00007FF733F67B50: GetLastError.KERNEL32 ref: 00007FF733F67BB2
                                    • Part of subcall function 00007FF733F67B50: GetTokenInformation.KERNELBASE ref: 00007FF733F67BF2
                                    • Part of subcall function 00007FF733F67B50: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF733F67C0E
                                    • Part of subcall function 00007FF733F67B50: CloseHandle.KERNEL32 ref: 00007FF733F67C26
                                  • LocalFree.KERNEL32(?,00007FF733F63814), ref: 00007FF733F6848C
                                  • LocalFree.KERNEL32(?,00007FF733F63814), ref: 00007FF733F68495
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                  • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                                  • API String ID: 6828938-1529539262
                                  • Opcode ID: 3b4c49a148c6d93be49ada6c8446d085e6d181d97aae771454943d90599d7390
                                  • Instruction ID: 54653d06eb61d8c3b2acdc7475a727a2249e41243b58a9cde377dca619eaa1de
                                  • Opcode Fuzzy Hash: 3b4c49a148c6d93be49ada6c8446d085e6d181d97aae771454943d90599d7390
                                  • Instruction Fuzzy Hash: DB216231A08643A2F6A4BB11E5157E9A3A0FF88780FC44435EA4D67796DF3CD844D760

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 819 7ff733f7c270-7ff733f7c295 820 7ff733f7c29b-7ff733f7c29e 819->820 821 7ff733f7c563 819->821 823 7ff733f7c2d7-7ff733f7c303 820->823 824 7ff733f7c2a0-7ff733f7c2d2 call 7ff733f79b24 820->824 822 7ff733f7c565-7ff733f7c575 821->822 825 7ff733f7c30e-7ff733f7c314 823->825 826 7ff733f7c305-7ff733f7c30c 823->826 824->822 828 7ff733f7c316-7ff733f7c31f call 7ff733f7b630 825->828 829 7ff733f7c324-7ff733f7c339 call 7ff733f82c2c 825->829 826->824 826->825 828->829 834 7ff733f7c453-7ff733f7c45c 829->834 835 7ff733f7c33f-7ff733f7c348 829->835 836 7ff733f7c45e-7ff733f7c464 834->836 837 7ff733f7c4b0-7ff733f7c4d5 WriteFile 834->837 835->834 838 7ff733f7c34e-7ff733f7c352 835->838 841 7ff733f7c49c-7ff733f7c4ae call 7ff733f7bd28 836->841 842 7ff733f7c466-7ff733f7c469 836->842 839 7ff733f7c4d7-7ff733f7c4dd GetLastError 837->839 840 7ff733f7c4e0 837->840 843 7ff733f7c354-7ff733f7c35c call 7ff733f73ae0 838->843 844 7ff733f7c363-7ff733f7c36e 838->844 839->840 846 7ff733f7c4e3 840->846 862 7ff733f7c440-7ff733f7c447 841->862 847 7ff733f7c46b-7ff733f7c46e 842->847 848 7ff733f7c488-7ff733f7c49a call 7ff733f7bf48 842->848 843->844 850 7ff733f7c370-7ff733f7c379 844->850 851 7ff733f7c37f-7ff733f7c394 GetConsoleMode 844->851 855 7ff733f7c4e8 846->855 856 7ff733f7c4f4-7ff733f7c4fe 847->856 857 7ff733f7c474-7ff733f7c486 call 7ff733f7be2c 847->857 848->862 850->834 850->851 852 7ff733f7c44c 851->852 853 7ff733f7c39a-7ff733f7c3a0 851->853 852->834 860 7ff733f7c429-7ff733f7c43b call 7ff733f7b8b0 853->860 861 7ff733f7c3a6-7ff733f7c3a9 853->861 863 7ff733f7c4ed 855->863 864 7ff733f7c55c-7ff733f7c561 856->864 865 7ff733f7c500-7ff733f7c505 856->865 857->862 860->862 869 7ff733f7c3ab-7ff733f7c3ae 861->869 870 7ff733f7c3b4-7ff733f7c3c2 861->870 862->855 863->856 864->822 871 7ff733f7c507-7ff733f7c50a 865->871 872 7ff733f7c533-7ff733f7c53d 865->872 869->863 869->870 876 7ff733f7c3c4 870->876 877 7ff733f7c420-7ff733f7c424 870->877 878 7ff733f7c50c-7ff733f7c51b 871->878 879 7ff733f7c523-7ff733f7c52e call 7ff733f743b0 871->879 874 7ff733f7c544-7ff733f7c553 872->874 875 7ff733f7c53f-7ff733f7c542 872->875 874->864 875->821 875->874 880 7ff733f7c3c8-7ff733f7c3df call 7ff733f82cf8 876->880 877->846 878->879 879->872 885 7ff733f7c417-7ff733f7c41d GetLastError 880->885 886 7ff733f7c3e1-7ff733f7c3ed 880->886 885->877 887 7ff733f7c40c-7ff733f7c413 886->887 888 7ff733f7c3ef-7ff733f7c401 call 7ff733f82cf8 886->888 887->877 890 7ff733f7c415 887->890 888->885 892 7ff733f7c403-7ff733f7c40a 888->892 890->880 892->887
                                  APIs
                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF733F7C25B), ref: 00007FF733F7C38C
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF733F7C25B), ref: 00007FF733F7C417
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ConsoleErrorLastMode
                                  • String ID:
                                  • API String ID: 953036326-0
                                  • Opcode ID: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
                                  • Instruction ID: 9bdbd287cf07a033e1af24227b8acfea9862b672d82515007b2c1179dedd0a68
                                  • Opcode Fuzzy Hash: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
                                  • Instruction Fuzzy Hash: B791C622F08653A5F7B0AF6594406BDABA0BB04BC9FD44135EE4E76A94CF3CD441E720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 1279662727-0
                                  • Opcode ID: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                  • Instruction ID: cb595081b3302e43052096e4c93030019ab954c5e7e3fbea7b8b271c0722e8c0
                                  • Opcode Fuzzy Hash: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                  • Instruction Fuzzy Hash: 4A41D622D18B8393F3A4AF209500379B260FB947A5F909334F69C17AD1EF7CA5E09710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 3251591375-0
                                  • Opcode ID: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                  • Instruction ID: ebcc8ae1de9e1be13af78bb234ed50a3ab403a435930c4d7ae538728f0915642
                                  • Opcode Fuzzy Hash: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                  • Instruction Fuzzy Hash: 21316D11E0CA4376FAF4BBA594127B993819F41384FC45034E99EBB6E3DF2DA844A631
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                  • Instruction ID: 441531795a00e1440621135173b080aa4ea4a4a3fa96ab675fdc3cc46d00601c
                                  • Opcode Fuzzy Hash: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                  • Instruction Fuzzy Hash: 38D06711F18607A6EAB83B715C5A17992115F5C792FD01438E85F3A3A3CD2CAC096360
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: 9ca15b9002a87b72fd1966d073ee072d8ab2af6885046d3198ed673a4b76404c
                                  • Instruction ID: 5b6501a3862ed970077b0254ff80342dcd561805b6b06936aec950baf4c08b57
                                  • Opcode Fuzzy Hash: 9ca15b9002a87b72fd1966d073ee072d8ab2af6885046d3198ed673a4b76404c
                                  • Instruction Fuzzy Hash: 0251E521B0D38366FAB8BE29941067AA391BF44BB4FD44734DD6D677D9CE3CD800A620
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID:
                                  • API String ID: 2976181284-0
                                  • Opcode ID: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                  • Instruction ID: b7871627909b0bd662c007faacb3043c702c00497d9c48e13a1b1d41ed88af61
                                  • Opcode Fuzzy Hash: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                  • Instruction Fuzzy Hash: 1B11C461718B8291DAB0AF25A804179A361AB45BF4FD40331FEBD2B7E9CF7CD4509700
                                  APIs
                                  • RtlFreeHeap.NTDLL(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C6E
                                  • GetLastError.KERNEL32(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C78
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 485612231-0
                                  • Opcode ID: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                  • Instruction ID: d8db6e2c19018e44d838d7ef9e3ae872f94ab67068ce48e4b71747614855c20d
                                  • Opcode Fuzzy Hash: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                  • Instruction Fuzzy Hash: 66E08610F0864362FFF87BF1644407992915F94782FC04030E91DB7261DE2C68856230
                                  APIs
                                  • CloseHandle.KERNELBASE(?,?,?,00007FF733F79CE5,?,?,00000000,00007FF733F79D9A), ref: 00007FF733F79ED6
                                  • GetLastError.KERNEL32(?,?,?,00007FF733F79CE5,?,?,00000000,00007FF733F79D9A), ref: 00007FF733F79EE0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CloseErrorHandleLast
                                  • String ID:
                                  • API String ID: 918212764-0
                                  • Opcode ID: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                  • Instruction ID: 602db3f9891e3ff6548462b155741a727a1d85acc7ba0a7525285ec73bf74bb5
                                  • Opcode Fuzzy Hash: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                  • Instruction Fuzzy Hash: 8C21C611F2C64361FEF4B764A44077EA2919F847D1FC45235F92E677D1CE6CA485A320
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                  • Instruction ID: 8e9d17b03a1de68589f742f6754e814a56e1fdc22e0774ab9d0b6e335f68dca4
                                  • Opcode Fuzzy Hash: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                  • Instruction Fuzzy Hash: BF41E532909203A7EAB4AB19A54117DB7A0EB567C2FD40131E68EA36D0CF7CE902D770
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _fread_nolock
                                  • String ID:
                                  • API String ID: 840049012-0
                                  • Opcode ID: 23984c9b0e92b3499d0e452eca00665f4f26c6b08eca85ad94915f629dbeb913
                                  • Instruction ID: 3e42c8414daa1b80c95ae3d4cfaeab6b80da632adec5416931db4ca08ff7ffd2
                                  • Opcode Fuzzy Hash: 23984c9b0e92b3499d0e452eca00665f4f26c6b08eca85ad94915f629dbeb913
                                  • Instruction Fuzzy Hash: EB21A321B1965366FAB4BA16A9043BAE641BF45BD4FCC4430FE0D2B786CE7DE045E720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                  • Instruction ID: b7d9474693699b5386815685c14a47a7802aed693088439e22859ca8b07b672e
                                  • Opcode Fuzzy Hash: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                  • Instruction Fuzzy Hash: 3431A321A18A53A2FBE17B59944137DA650AF50BE2FD20235F96D233D2CF7DE481A730
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: HandleModule$AddressFreeLibraryProc
                                  • String ID:
                                  • API String ID: 3947729631-0
                                  • Opcode ID: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                  • Instruction ID: 3e3e913d254885d7e9a0e6db828fed5d98de27a1aa64f3a102e6c8a7be462d71
                                  • Opcode Fuzzy Hash: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                  • Instruction Fuzzy Hash: 6921AE32A157069AEBB4AF64C4412EC73A4FB0475AFD4063AE62C26AD5EF38D444DB60
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                  • Instruction ID: 701348c931bb1ca4f06cf7dbc4b220915017cf00a5c0659eb457b517cfd3df70
                                  • Opcode Fuzzy Hash: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                  • Instruction Fuzzy Hash: 15116321A1D68391FAF0BF51940027EE2A4AF95BC1FD44435FA8C67A96CF7CD441E760
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                  • Instruction ID: eadd2560de96c7cb0acc45c496cd90b3bc7a0cbee17b9b070f12026b5a735f6d
                                  • Opcode Fuzzy Hash: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                  • Instruction Fuzzy Hash: 4621A432A18A8397DBB5AF18D440379B6A1FB84B94FE44234EA5D6B6D9DF3CD400DB10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                  • Instruction ID: 5cf72152970863cdac84408bb0220d16d4a8b2783303b97d539cc6819691d907
                                  • Opcode Fuzzy Hash: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                  • Instruction Fuzzy Hash: 67010821A0874351EAA4FB569900069E695BF45FE0FC84230EE5C23BD6DE3CD0029310
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: bb049028caba5e04dba667320418798f18563eb801bd7df1d5910388d10efff1
                                  • Instruction ID: 0288885633c43a21c93af520ba81063a5b00a18707fe67e0fc0d2de97dbac31b
                                  • Opcode Fuzzy Hash: bb049028caba5e04dba667320418798f18563eb801bd7df1d5910388d10efff1
                                  • Instruction Fuzzy Hash: A101C020E2D68361FEF0BBA16901139D290AF457D5FC40138F97C727C2DF2CA494EA20
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: c51c900cc97cfaa1f2463de7ded10a88eb35566439d91f89b12c497efef6b613
                                  • Instruction ID: 3695cba76bff737aa30951af7013327c491ca7a8ab803d65225640344d56e67c
                                  • Opcode Fuzzy Hash: c51c900cc97cfaa1f2463de7ded10a88eb35566439d91f89b12c497efef6b613
                                  • Instruction Fuzzy Hash: 2AE0EC90E58647A2FBF47BA8458267A91119F683C2FD05030F94C663C3DD1C7888B631
                                  APIs
                                  • HeapAlloc.KERNEL32(?,?,00000000,00007FF733F7A63A,?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A), ref: 00007FF733F7DEFD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AllocHeap
                                  • String ID:
                                  • API String ID: 4292702814-0
                                  • Opcode ID: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                  • Instruction ID: 5a2d720112e50f4379810cd4e93f400b48663de3d7159bce2950777c5881bc05
                                  • Opcode Fuzzy Hash: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                  • Instruction Fuzzy Hash: 66F06D00B1A247B0FEF9776299213B5D2945F98BC1FC84430F90EA62D1DE6CE882A330
                                  APIs
                                  • HeapAlloc.KERNEL32(?,?,?,00007FF733F6FFB0,?,?,?,00007FF733F7161A,?,?,?,?,?,00007FF733F72E09), ref: 00007FF733F7C94A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AllocHeap
                                  • String ID:
                                  • API String ID: 4292702814-0
                                  • Opcode ID: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                  • Instruction ID: 3139ee93b1c791d27f77db29d9538a196d9c086623d57f5e90e18325b6ee4142
                                  • Opcode Fuzzy Hash: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                  • Instruction Fuzzy Hash: 9EF05800B19247A4FEF876B1681127996A05F88BE2FC80630E86EA62C1DE2CE580A130
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                  • API String ID: 190572456-3427451314
                                  • Opcode ID: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                  • Instruction ID: 9575ff883b39dffedbdfcf89874e211dea2990049979ca5e5bda6cfbc1f2a196
                                  • Opcode Fuzzy Hash: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                  • Instruction Fuzzy Hash: 3BE1566591DB43B0FAFDBB14A8501B4E3A5AF54750FD81136E81E3A2A4EF3CA548B370
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 808467561-2761157908
                                  • Opcode ID: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
                                  • Instruction ID: e59a4ddb76433a0cdfdff71decbf1bea5df29284c66ee04b657b3c96254d37da
                                  • Opcode Fuzzy Hash: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
                                  • Instruction Fuzzy Hash: EFB2F376A086839BE7B99E24D4407FDB7A1FB54388FC01136DA0D7BA94DB38E940DB50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                                  • API String ID: 0-2665694366
                                  • Opcode ID: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
                                  • Instruction ID: f2b27cfed0c652bf9526d844bf5de617935bcf268b4dd7121dec7ce56f5db44f
                                  • Opcode Fuzzy Hash: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
                                  • Instruction Fuzzy Hash: 0B52F472B146A75BDBA49F14C458B7EBBA9FB84340F814239EA4E93780DB3DD840DB10
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                  • String ID:
                                  • API String ID: 3140674995-0
                                  • Opcode ID: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                  • Instruction ID: fdf377b78755e2c09ebd229f32d795bb1970d9d5890fe2ce69ef55d67edafe5b
                                  • Opcode Fuzzy Hash: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                  • Instruction Fuzzy Hash: 00312F72609B8296EBB49F60E8407EEB364FB84744F84403ADA4E67B95DF38D548D720
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message$ErrorFormatLast
                                  • String ID: %ls%ls: %ls$<FormatMessageW failed.>$Error
                                  • API String ID: 3971115935-1149178304
                                  • Opcode ID: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
                                  • Instruction ID: 5c012e89528b3e50fc4895e2d5fe36e3d6d776fd57d3bc56691246e5afe2cb2e
                                  • Opcode Fuzzy Hash: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
                                  • Instruction Fuzzy Hash: C2219632608B82A1E770AB10F4506DAB364FB88784FC00136EBCD63A68DF3CD546C750
                                  APIs
                                  • _get_daylight.LIBCMT ref: 00007FF733F84F55
                                    • Part of subcall function 00007FF733F848A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F848BC
                                    • Part of subcall function 00007FF733F79C58: RtlFreeHeap.NTDLL(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C6E
                                    • Part of subcall function 00007FF733F79C58: GetLastError.KERNEL32(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C78
                                    • Part of subcall function 00007FF733F79C10: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF733F79BEF,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F79C19
                                    • Part of subcall function 00007FF733F79C10: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF733F79BEF,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F79C3E
                                  • _get_daylight.LIBCMT ref: 00007FF733F84F44
                                    • Part of subcall function 00007FF733F84908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F8491C
                                  • _get_daylight.LIBCMT ref: 00007FF733F851BA
                                  • _get_daylight.LIBCMT ref: 00007FF733F851CB
                                  • _get_daylight.LIBCMT ref: 00007FF733F851DC
                                  • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF733F8541C), ref: 00007FF733F85203
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                  • String ID:
                                  • API String ID: 4070488512-0
                                  • Opcode ID: 0d3b627969e88128c8faa99a2c0e5d438b7f33ec3044a67c5b643e0657b8cf50
                                  • Instruction ID: 4e5ee6a617a029fafcccc5e82ba99899628f902e1c576c51404c78b0f3a14301
                                  • Opcode Fuzzy Hash: 0d3b627969e88128c8faa99a2c0e5d438b7f33ec3044a67c5b643e0657b8cf50
                                  • Instruction Fuzzy Hash: EED1D326A08643A6EBB8FF21D8411B9A7A1FF84784FC44035EA4D7B695DF3CE441E760
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                  • String ID:
                                  • API String ID: 1239891234-0
                                  • Opcode ID: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                  • Instruction ID: 7968258588225b65a02af474f071d059f96aa0888dcb2147850bc239a1a5f7ef
                                  • Opcode Fuzzy Hash: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                  • Instruction Fuzzy Hash: 51318532608B8295E774DF25E8402AEB3A0FB88794FD00135EA9D57B65DF3CD545C710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FileFindFirst_invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 2227656907-0
                                  • Opcode ID: fe4d16d24a501c342f9bdefd2dbf7b3c8df5536519bece05b709b84cd6c1ed58
                                  • Instruction ID: e63895f76e75986c39280f225fa5729acc57a5d89f49807f5b46736d40bd8432
                                  • Opcode Fuzzy Hash: fe4d16d24a501c342f9bdefd2dbf7b3c8df5536519bece05b709b84cd6c1ed58
                                  • Instruction Fuzzy Hash: E9B1B522B1879362EAB4AB2198005BAE390EF45BE4FC45131ED5D3BB95DF3CE441D310
                                  APIs
                                  • _get_daylight.LIBCMT ref: 00007FF733F851BA
                                    • Part of subcall function 00007FF733F84908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F8491C
                                  • _get_daylight.LIBCMT ref: 00007FF733F851CB
                                    • Part of subcall function 00007FF733F848A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F848BC
                                  • _get_daylight.LIBCMT ref: 00007FF733F851DC
                                    • Part of subcall function 00007FF733F848D8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F848EC
                                    • Part of subcall function 00007FF733F79C58: RtlFreeHeap.NTDLL(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C6E
                                    • Part of subcall function 00007FF733F79C58: GetLastError.KERNEL32(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C78
                                  • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF733F8541C), ref: 00007FF733F85203
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                  • String ID:
                                  • API String ID: 3458911817-0
                                  • Opcode ID: ae64d4b013316384daf219013b3406c3cfe35626df30cbdeb691f729cbc9c9de
                                  • Instruction ID: 100b4b8b25653b31d6f72f6fc234e454512ecd5e5518659b4da688b163ea494f
                                  • Opcode Fuzzy Hash: ae64d4b013316384daf219013b3406c3cfe35626df30cbdeb691f729cbc9c9de
                                  • Instruction Fuzzy Hash: 90519132A08643A6E7B4FF21E8815B9E761FB88784FC05135EA4D6B695DF3CE440D760
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                  • Instruction ID: c316d20cd5a0da224ab1a50293ecffd0794f29b1361c3616a30ee2636ab98967
                                  • Opcode Fuzzy Hash: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                  • Instruction Fuzzy Hash: BB11A022B14F029AEB50DF60E8442B873A0FB58718F840E30DA2D667B4EF3CD0688390
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: memcpy_s
                                  • String ID:
                                  • API String ID: 1502251526-0
                                  • Opcode ID: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
                                  • Instruction ID: 767424b033e473caa2947d47e58d71835aa100917177891b0341f3e583ed7699
                                  • Opcode Fuzzy Hash: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
                                  • Instruction Fuzzy Hash: 0BC11376B1868697EB789F19A04866AF791F784B84FC48136DB4E6B754DF3CE801CB00
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $header crc mismatch$unknown header flags set
                                  • API String ID: 0-1127688429
                                  • Opcode ID: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
                                  • Instruction ID: 8ab997d8e44a1c9c8fd63fcdeaab65470e31383a109f6068e5c78046faa0e018
                                  • Opcode Fuzzy Hash: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
                                  • Instruction Fuzzy Hash: 9EF19D72A182C65BEBE5AB19C088A3FBAA9EF44740F855538DA4D27390CB38D540E750
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ExceptionRaise_clrfp
                                  • String ID:
                                  • API String ID: 15204871-0
                                  • Opcode ID: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
                                  • Instruction ID: ac70c211cf264753879daa0f272656b603c65f445887a2bb4b469dfe772fcd13
                                  • Opcode Fuzzy Hash: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
                                  • Instruction Fuzzy Hash: 17B1A073604B868BE769CF29C84636C7BE0F784B48F548821DB6D977A8CB39D451C710
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $
                                  • API String ID: 0-227171996
                                  • Opcode ID: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
                                  • Instruction ID: 4d09f92d7d90b73a2da028129881a5324e7d9a0c5be019f1d27f097c0f270c8b
                                  • Opcode Fuzzy Hash: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
                                  • Instruction Fuzzy Hash: CBE1C532A18643B1EBF8AE258150179A360FF45BC9FD41136EA4E276A4DF3DE842E750
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: incorrect header check$invalid window size
                                  • API String ID: 0-900081337
                                  • Opcode ID: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
                                  • Instruction ID: 141f9d6f27c9ef87dab0689dc46b1ea409a4d0c081a577c92be8b618af921b2b
                                  • Opcode Fuzzy Hash: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
                                  • Instruction Fuzzy Hash: 1B91A5B2A182C757EBF49B18C458A3FBAA9FB44340FD14239DA4E56780CB39E540DB10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: e+000$gfff
                                  • API String ID: 0-3030954782
                                  • Opcode ID: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
                                  • Instruction ID: 5e46d74b63b21f6bac3948c6e0f868c1391ddecc44a6a8809055792b86898102
                                  • Opcode Fuzzy Hash: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
                                  • Instruction Fuzzy Hash: 86517822B1C2C256E7B49E359801769EB91FB44BD4FC89231EB9C5BAC1CE3DD441D710
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: gfffffff
                                  • API String ID: 0-1523873471
                                  • Opcode ID: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
                                  • Instruction ID: 314b8056374f1b187a549df6f19ad1d41159c2ff166cb4b33770b8f43ffa52a7
                                  • Opcode Fuzzy Hash: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
                                  • Instruction Fuzzy Hash: 0DA14662B087C696EB71DF29A4007ADBB91AB54BC4FC08032EE8D57799DA3DD502D321
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: TMP
                                  • API String ID: 3215553584-3125297090
                                  • Opcode ID: ab01c8f9f33d9f34f1c73768ca5f7e92e4f1b42dfcb743eef36c8d357443a917
                                  • Instruction ID: 1cc2d3d3904523baaf60b89aff992c09a7dca6e4b22122fc7e5aa660fb8abbdd
                                  • Opcode Fuzzy Hash: ab01c8f9f33d9f34f1c73768ca5f7e92e4f1b42dfcb743eef36c8d357443a917
                                  • Instruction Fuzzy Hash: E851E011B1874371FAF8BB2A59041BAD291AF84BC5FD84434FE0D677D5EE3CE44AA220
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: HeapProcess
                                  • String ID:
                                  • API String ID: 54951025-0
                                  • Opcode ID: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
                                  • Instruction ID: 18341d474d1941cc0c4fc9ffeaa72a43f9a9232f11cb1251d1dcf49dd0b33135
                                  • Opcode Fuzzy Hash: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
                                  • Instruction Fuzzy Hash: 9EB09220E07A87E2EA983B116C8622462A87F88B00FE88038C45D65330DE2C24A56B20
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
                                  • Instruction ID: cf3c7dc65f150de3f64faf1534e906eda5947de6e7067a1cb3663c0e9d9b59c0
                                  • Opcode Fuzzy Hash: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
                                  • Instruction Fuzzy Hash: 25D1E422A08643B5FBB8AF29844467DA3A0FB05BD9FD40235EE0D27795DF39D841E360
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
                                  • Instruction ID: ddf6b1cdb289d51f9bce07b65b372b96ade3d23d9ac05c29ac624e541e512787
                                  • Opcode Fuzzy Hash: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
                                  • Instruction Fuzzy Hash: 66C1C3722142F24FD299FB29E45957A73E1F79830ABD4402AEB8747B85CA3CE414D7A0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
                                  • Instruction ID: 5785739ff94b550a08646145115d189c2d6235aeb3385f6bea56e9ca9f4d41ff
                                  • Opcode Fuzzy Hash: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
                                  • Instruction Fuzzy Hash: 68B18D72908786A5E7B5AF29C05423CBBA0F749B89FE40135EB4E673A5CF39D441E720
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
                                  • Instruction ID: abdaefb04b6bd396a44621b02ef661d98ca84781c393874a135e72b29bc6d3ea
                                  • Opcode Fuzzy Hash: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
                                  • Instruction Fuzzy Hash: 2B81F472A0C78256EBB4DF19904036AA6A1FF897D4FD44235FA8D53B95CF3DE4009B10
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: 7a9558e86fa8b462753dac68b64cf5067dc6b1cda5ab5f882eee36bb89ede29b
                                  • Instruction ID: ebf7266756b9e5993946865b0d96f291a00cfa8069a4e37ddfc898dfd73294d4
                                  • Opcode Fuzzy Hash: 7a9558e86fa8b462753dac68b64cf5067dc6b1cda5ab5f882eee36bb89ede29b
                                  • Instruction Fuzzy Hash: F6610B22E0C29367F7FCAA28841423DE681AF407B0FD5463AD65D7A6D4DF7DE801A720
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                  • Instruction ID: af1e484af7a57f2e7b8538998664eec26794465e1cf1ee306efe106f50b42d1d
                                  • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                  • Instruction Fuzzy Hash: A351F836A1865392E7B4AB29C040238B3A4EB44F99FE44131EE4C677E4CF7AE847D750
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                  • Instruction ID: 99cf346fde87f38de59f28e83d71434c8f2463b64ffbb451223f37216d4576e4
                                  • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                  • Instruction Fuzzy Hash: 2651A132A1865397E7B49B28C040239B3A0EF44BA9FA44135EE4C67795CF3EE843D790
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                  • Instruction ID: bc4329d0334c1f4970c9c69a3dbdbcd0d919fb15737eb97535a52618b3d8cf5e
                                  • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                  • Instruction Fuzzy Hash: D451B676A1865292E7B4AF29C04023873A1EB45BD9FE44131EE4D27794CF3AE847D750
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                  • Instruction ID: 6679ab986c370a429814be1972dd8a93e03b6d8bfb862e75989392332560629b
                                  • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                  • Instruction Fuzzy Hash: C551D236A2865396E7B49B29C04027CB7A1EF44B99FE44031EE4C677A4CB3EE843D750
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                  • Instruction ID: e6bf099af56daf6e37c032cc0309eee39d2eb64be8527dca55043cb2fc908bd3
                                  • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                  • Instruction Fuzzy Hash: ED51AF32A1865392E7B49B29C044229B7A0EF44B9DFE44131EE4C67798CB3EE947D750
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                  • Instruction ID: 7f4dde03a402bef177738879783a3e6e77945a2920ed7dc2f7523d50854e3b6e
                                  • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                  • Instruction Fuzzy Hash: B451C432A1865291E7B4AF29C04023CB7A1EB45B99FE44131EE4C67798CF3AE846E750
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                  • Instruction ID: 5871effb3f143c1510d63cf4761b0ff94b47fa8fb1bb951e0e5e6c5134752f2f
                                  • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                  • Instruction Fuzzy Hash: C941E656D4D78B24E9F5992805107B4A680EF12BE3DE822B4FDAD333D3CD0D6D86E260
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 485612231-0
                                  • Opcode ID: 8d7eb27f456b44a91f9c68f162ea9965681a4a0d7ad24d9c24e3bfc258020ebf
                                  • Instruction ID: d14750cac757d2b811197d1236bca716024b498809480fec2352280808eb4efb
                                  • Opcode Fuzzy Hash: 8d7eb27f456b44a91f9c68f162ea9965681a4a0d7ad24d9c24e3bfc258020ebf
                                  • Instruction Fuzzy Hash: CF412A72714A5692EF94DF2AD91457AB391F748FD4BC99032EE0DA7B64EE3CD0419300
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d47bd74fb6a019277da3c6b3819bfc69269ba7720235d09fb044e88388ffaf66
                                  • Instruction ID: e0cc3ae04c2545c05281f2d3ca230e60590130264e5baa9df5abb273a7d4f77b
                                  • Opcode Fuzzy Hash: d47bd74fb6a019277da3c6b3819bfc69269ba7720235d09fb044e88388ffaf66
                                  • Instruction Fuzzy Hash: 6B31D232618B8381EBB4AF25644013EAAD4AB84BE0FD44238FA9D63B95DF3CD0116710
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
                                  • Instruction ID: 8cf200f7f0310f725ffa8cc7b6fe5e6b0b3b1e61e1d1f1d7c57fef11e1a6d62d
                                  • Opcode Fuzzy Hash: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
                                  • Instruction Fuzzy Hash: F3F06271B282969EDBE89F69A802639B7E1F748380FC09039E6DD93B04D67D90609F14
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
                                  • Instruction ID: 9e290008dd50ddf9d9b5a3f010663b81ed011ea172e8efc93ca96d2e2dcd2c62
                                  • Opcode Fuzzy Hash: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
                                  • Instruction Fuzzy Hash: E2A00121918867E0E6A9AB44A850125A220BB64310BC09071D05D650B09F2DA800A364
                                  APIs
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F650C0
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F65101
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F65126
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F6514B
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F65173
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F6519B
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F651C3
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F651EB
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F65213
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                  • API String ID: 190572456-2007157414
                                  • Opcode ID: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                  • Instruction ID: d541cbf37c498ec45317d65d8dd11a7dd4b483298579d6d4248c2420812bea8f
                                  • Opcode Fuzzy Hash: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                  • Instruction Fuzzy Hash: 3812666494EF43B1FAF9BB15B8601B4E3A1AF44750BD42536C81E3A760EF7CB548B260
                                  APIs
                                    • Part of subcall function 00007FF733F686B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF733F63FA4,00000000,00007FF733F61925), ref: 00007FF733F686E9
                                  • ExpandEnvironmentStringsW.KERNEL32(?,00007FF733F67C97,?,?,FFFFFFFF,00007FF733F63834), ref: 00007FF733F6782C
                                    • Part of subcall function 00007FF733F626C0: MessageBoxW.USER32 ref: 00007FF733F62736
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                  • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                                  • API String ID: 1662231829-930877121
                                  • Opcode ID: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                  • Instruction ID: 688a45f93d64741bf09f5e0a04090a71da137e557c4cc2da0fb5e51ad85254c9
                                  • Opcode Fuzzy Hash: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                  • Instruction Fuzzy Hash: B541D521B2C643B0FAF4BB25D9516B9E3A1AF84784FD01431F54E766A5EE2CE508A720
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                  • String ID: P%
                                  • API String ID: 2147705588-2959514604
                                  • Opcode ID: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
                                  • Instruction ID: b27c0c9c1a2cf7cfde1d73e663e12067b6d25d5be4d6bb937c693641e8d0e979
                                  • Opcode Fuzzy Hash: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
                                  • Instruction Fuzzy Hash: 5B513726608BA286D6789F22A4085BAF7A1F798B61F404131EBDE53791DF3CD045DB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: -$:$f$p$p
                                  • API String ID: 3215553584-2013873522
                                  • Opcode ID: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
                                  • Instruction ID: 83abd9071d99db7882dee70bb14afe094560922efdce89418a477355e7910297
                                  • Opcode Fuzzy Hash: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
                                  • Instruction Fuzzy Hash: DE12B361E0C243A6FBB0BA14D0586B9F261FB40792FD44036F69D676C4DB3CE994AB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: f$f$p$p$f
                                  • API String ID: 3215553584-1325933183
                                  • Opcode ID: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
                                  • Instruction ID: 03d21e556df17629ef4213ec1dac635d3f5835c8f02905ba787719da183a861b
                                  • Opcode Fuzzy Hash: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
                                  • Instruction Fuzzy Hash: BB128362E1C143A7FBB0BA14E4546BAF261FF80795FC84036F69D566C4DB7CE480AB60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                  • API String ID: 2030045667-3659356012
                                  • Opcode ID: 13b283e47d001d0ab3171adc0de6fd131dc6445b0413af453990f9875fb5be0d
                                  • Instruction ID: 00c264f48185211ffcaa204d0e8525f3ad7f8085bb7631d60c2fbaa2dc497599
                                  • Opcode Fuzzy Hash: 13b283e47d001d0ab3171adc0de6fd131dc6445b0413af453990f9875fb5be0d
                                  • Instruction Fuzzy Hash: EA41B321B0864372FAB4BB12A9405BAE3A4BF44BC4FC44131DD9D2B796DE3CE445A720
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                  • API String ID: 2030045667-3659356012
                                  • Opcode ID: 1fec75a7a2eead9af1f1dd0893e9f937b3761287506d9b310f4ea8fdf1d5c513
                                  • Instruction ID: a9997d657fc47e318a52439ed26cc1ad5c55c6e43b0ba9c5330bcdf748d26e63
                                  • Opcode Fuzzy Hash: 1fec75a7a2eead9af1f1dd0893e9f937b3761287506d9b310f4ea8fdf1d5c513
                                  • Instruction Fuzzy Hash: 7841B421B08643A1EEB4BB15A9505BAE3A0FF447D4FC44032DE9D27B95EF3CE945A710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
                                  • Instruction ID: 914f0950f6b9e363b7953ee909139cb53caaf78f16b4a3c368c8d678a6593f15
                                  • Opcode Fuzzy Hash: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
                                  • Instruction Fuzzy Hash: 32D18132A08742A6EBB0AB25D5403ADB7A0FB65788FD00135EE4D677A6CF3CE455E710
                                  APIs
                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF733F6D29A,?,?,?,00007FF733F6CF8C,?,?,?,00007FF733F6CB89), ref: 00007FF733F6D06D
                                  • GetLastError.KERNEL32(?,?,?,00007FF733F6D29A,?,?,?,00007FF733F6CF8C,?,?,?,00007FF733F6CB89), ref: 00007FF733F6D07B
                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF733F6D29A,?,?,?,00007FF733F6CF8C,?,?,?,00007FF733F6CB89), ref: 00007FF733F6D0A5
                                  • FreeLibrary.KERNEL32(?,?,?,00007FF733F6D29A,?,?,?,00007FF733F6CF8C,?,?,?,00007FF733F6CB89), ref: 00007FF733F6D113
                                  • GetProcAddress.KERNEL32(?,?,?,00007FF733F6D29A,?,?,?,00007FF733F6CF8C,?,?,?,00007FF733F6CB89), ref: 00007FF733F6D11F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                  • String ID: api-ms-
                                  • API String ID: 2559590344-2084034818
                                  • Opcode ID: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                  • Instruction ID: a61f8fc7a720c75d46e82c89cb95a78c1e2941876351e57457c215b8ecb68f96
                                  • Opcode Fuzzy Hash: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                  • Instruction Fuzzy Hash: C331C82161EE43F1EEB5AB12A800575A394BF04BA0FD90635ED2D3B368DF3CE4429324
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Value$ErrorLast
                                  • String ID:
                                  • API String ID: 2506987500-0
                                  • Opcode ID: 67217a7fc91f5e25160bb9a3b2c8204a3bd01eab0ccbfeeabb81ecf6e12f005c
                                  • Instruction ID: b572e648bfa7ae32c1284adb24854739b06ebab66b5828afc231970407de4768
                                  • Opcode Fuzzy Hash: 67217a7fc91f5e25160bb9a3b2c8204a3bd01eab0ccbfeeabb81ecf6e12f005c
                                  • Instruction Fuzzy Hash: 6421A920A0C24362FEF877315685939E1925F587F6FD40734F83E26BE6DE2EA4506320
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                  • String ID: CONOUT$
                                  • API String ID: 3230265001-3130406586
                                  • Opcode ID: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                  • Instruction ID: 4cc02c6ca7853e07924fdd92f94a7b287edf3a4cf937ceaa24599e1c26a2fa4d
                                  • Opcode Fuzzy Hash: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                  • Instruction Fuzzy Hash: 5811B921B18F4396E7A49B02E844325E2A0FB58FE4FC40234EA5EAB7A4DF3CD804C750
                                  APIs
                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F6821D
                                  • K32EnumProcessModules.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F6827A
                                    • Part of subcall function 00007FF733F686B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF733F63FA4,00000000,00007FF733F61925), ref: 00007FF733F686E9
                                  • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F68305
                                  • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F68364
                                  • FreeLibrary.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F68375
                                  • FreeLibrary.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F6838A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                                  • String ID:
                                  • API String ID: 3462794448-0
                                  • Opcode ID: bfcefcadc4499c1de8e385cb70073816e38e2b1c8d4e625d2f32d7c46dc3e7cf
                                  • Instruction ID: 127c4985ae82bcade05f9dcece5e2bf8dcebcacf038a66d4f5def909ec200f42
                                  • Opcode Fuzzy Hash: bfcefcadc4499c1de8e385cb70073816e38e2b1c8d4e625d2f32d7c46dc3e7cf
                                  • Instruction Fuzzy Hash: 3741E862A1968391EAB0AB12A5012BAB394FF85BC5FC40139DF9D67789DF3CD401D710
                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A5E7
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A61D
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A64A
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A65B
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A66C
                                  • SetLastError.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A687
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Value$ErrorLast
                                  • String ID:
                                  • API String ID: 2506987500-0
                                  • Opcode ID: ef20b32075126869ce53cf62fbcb139ef3f5263cb698c8c2b5617054fce20239
                                  • Instruction ID: 71373358e908a90168074b3e4640e7681ce41a184669075ca2532e7a33cc10a7
                                  • Opcode Fuzzy Hash: ef20b32075126869ce53cf62fbcb139ef3f5263cb698c8c2b5617054fce20239
                                  • Instruction Fuzzy Hash: CC118C20A0C24362FEF873219A81139E2825F587F5FD54334F83E267E6DE2CA4516721
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                  • String ID: Unhandled exception in script
                                  • API String ID: 3081866767-2699770090
                                  • Opcode ID: 43e0e9fc7257205e5ba4956726e7fb7afbd4954ec96d29d9005c09c1dc537ba6
                                  • Instruction ID: 62c4f2a70e33314c6c86f62075b6c96047128620ad8bffca1f1979d95223dbb9
                                  • Opcode Fuzzy Hash: 43e0e9fc7257205e5ba4956726e7fb7afbd4954ec96d29d9005c09c1dc537ba6
                                  • Instruction Fuzzy Hash: 79315E32608A83A9EB74AF61E8552F9A360FF88784FC40135EA4D6BB69DF3CD504D710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message$ByteCharMultiWide
                                  • String ID: %s%s: %s$Error$Error/warning (ANSI fallback)
                                  • API String ID: 1878133881-640379615
                                  • Opcode ID: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
                                  • Instruction ID: c44cbcfe159336e147c2880705502320c68b89c4bbf5ec16738649c1a1943f9d
                                  • Opcode Fuzzy Hash: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
                                  • Instruction Fuzzy Hash: 7A217172628B87A1E6B0AB10F4517EAA364FF84784FC01036EACC276A9DF7CD645D750
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                  • Instruction ID: 50dfdac6b36d14276ae87a113e627a7b96d504acd995eabf71d25e6ee50c947a
                                  • Opcode Fuzzy Hash: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                  • Instruction Fuzzy Hash: 95F0C821619707A1EAB46B24E4457399320AF497A2FD40635D57D691F4CF2CD445E320
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _set_statfp
                                  • String ID:
                                  • API String ID: 1156100317-0
                                  • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                  • Instruction ID: e732df3242199706d2416e67c00cb830c5709a3f3d7767493264369fc2b661a6
                                  • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                  • Instruction Fuzzy Hash: 4A11E332E1CA1B61FAFC3568D45637981507F54376FD50634EA6EBE6D6CE2CA840A130
                                  APIs
                                  • FlsGetValue.KERNEL32(?,?,?,00007FF733F798B3,?,?,00000000,00007FF733F79B4E,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F7A6BF
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F798B3,?,?,00000000,00007FF733F79B4E,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F7A6DE
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F798B3,?,?,00000000,00007FF733F79B4E,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F7A706
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F798B3,?,?,00000000,00007FF733F79B4E,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F7A717
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F798B3,?,?,00000000,00007FF733F79B4E,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F7A728
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: f2276611a630934bbdb354ef1537d91ff3ed6de03a5f5a99dae5237b5b9f36a7
                                  • Instruction ID: 1722a60fb13c39e38f1e3a1bd63acae9c428f64370a41e0a9169df50994b0cff
                                  • Opcode Fuzzy Hash: f2276611a630934bbdb354ef1537d91ff3ed6de03a5f5a99dae5237b5b9f36a7
                                  • Instruction Fuzzy Hash: 7811AF20A0C24322FEF8732555815B9E1915FA83F1FD44334F83D267E6DE2CE852A720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: a5817a23bb51f76ee1afbfff857c957b5c6e4c237a472a6b6273a3da914e048f
                                  • Instruction ID: 72003bf37c3cee9c15ba18dc83a276cde5b74d6e6415c80d575aba204629b212
                                  • Opcode Fuzzy Hash: a5817a23bb51f76ee1afbfff857c957b5c6e4c237a472a6b6273a3da914e048f
                                  • Instruction Fuzzy Hash: 93114820A0820322FEF87321049157AA2920F593F6ED81734F93E2A3E2ED2DB4907331
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: verbose
                                  • API String ID: 3215553584-579935070
                                  • Opcode ID: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                  • Instruction ID: d7d90758f7aca1b777f345628fe6c929d519709113003fee419328733711b7a7
                                  • Opcode Fuzzy Hash: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                  • Instruction Fuzzy Hash: EC91B232A08647A1F7F1AF25D45077DB292AB00BDAFC44136EA5D663D5DE3CE445A320
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                  • API String ID: 3215553584-1196891531
                                  • Opcode ID: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                  • Instruction ID: e244920903333fe87551f4e4a82de5673e5a7682d20df7f3b32f77e43d2d11fb
                                  • Opcode Fuzzy Hash: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                  • Instruction Fuzzy Hash: 7B81C572E08343A5F7F4AF25C110278A6A0AB117CAFD58135EA1DB77A5DF2DE801B721
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 2395640692-1018135373
                                  • Opcode ID: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                  • Instruction ID: f09b2880f5278a1c1969c7b4bc78e4f5769b867669785e20fe265740188b627e
                                  • Opcode Fuzzy Hash: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                  • Instruction Fuzzy Hash: E451C032B19643AADBA4EF15E814A7CB791EB44B88FD08134DA8D53789DF7CE841D710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                  • Instruction ID: 99da21929b2ab92c4d124a699c0a0bfa28dc2102755feada81f05263f0a7558b
                                  • Opcode Fuzzy Hash: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                  • Instruction Fuzzy Hash: 5051A233A182439AEBB4AF119244368B7A0EB75B88FD44135DA6C67BE1CF3CE450DB11
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CallEncodePointerTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3544855599-2084237596
                                  • Opcode ID: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
                                  • Instruction ID: 90e4a52ca820647bb133055653ff004d920eb98234683f844b8189f46eb3e3c4
                                  • Opcode Fuzzy Hash: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
                                  • Instruction Fuzzy Hash: BD61A233908BC696D770AB25E5407AAB7A0FB95788F844235EB9C13B95DF7CE090CB10
                                  APIs
                                  • CreateDirectoryW.KERNEL32(00000000,?,00007FF733F6324C,?,?,00007FF733F63964), ref: 00007FF733F67642
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CreateDirectory
                                  • String ID: %.*s$%s%c$\
                                  • API String ID: 4241100979-1685191245
                                  • Opcode ID: 7bb6789f982dd078021ca405e37f28ebc21f271831f10c16ba6710f0d2331ec5
                                  • Instruction ID: 4a4899ba0585046ff4067c679a5e6c29bb31e26758fc5971f5e4f6962ab873d7
                                  • Opcode Fuzzy Hash: 7bb6789f982dd078021ca405e37f28ebc21f271831f10c16ba6710f0d2331ec5
                                  • Instruction Fuzzy Hash: BE310821619AC3A5EAB1AB21E4107AAA354FF84BE0FC04231FE6D537D9EF2CD6059710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message$ByteCharMultiWide
                                  • String ID: Error$Error/warning (ANSI fallback)
                                  • API String ID: 1878133881-653037927
                                  • Opcode ID: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                  • Instruction ID: 60f148c85e90f347b444a7fb86b5c8f9c7badafedda5aa3346994c5e9e13af01
                                  • Opcode Fuzzy Hash: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                  • Instruction Fuzzy Hash: 1511B272628B86A1FBB4AB10F451BA9B364FB44784FD01135DA5C27654DF3DDA05C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message$ByteCharMultiWide
                                  • String ID: Error/warning (ANSI fallback)$Warning
                                  • API String ID: 1878133881-2698358428
                                  • Opcode ID: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                  • Instruction ID: 0fc75b01671e1ba70352d20c0d425bbb3defb67b954b18866223dc55b52d93d0
                                  • Opcode Fuzzy Hash: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                  • Instruction Fuzzy Hash: 03110472628B86A1FBB0AB00F450BA9B364FF84784FC01135DA9C27654DF3CDA04C710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                  • String ID:
                                  • API String ID: 2718003287-0
                                  • Opcode ID: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
                                  • Instruction ID: 48ef72772ce579b8b5253ca601f6300677c55d129e4cc18e8125638dd54e593c
                                  • Opcode Fuzzy Hash: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
                                  • Instruction Fuzzy Hash: 8BD15832B08A8299E760DF79D4402AC77B1FB457D9BC08235EE5EA7B99DE38D406D310
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _get_daylight$_isindst
                                  • String ID:
                                  • API String ID: 4170891091-0
                                  • Opcode ID: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
                                  • Instruction ID: 989c2fb3f0b5378e9f3fb93a3cfe5da483efa5157b2aa3481df1df84d7947a2a
                                  • Opcode Fuzzy Hash: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
                                  • Instruction Fuzzy Hash: E8514632F041139AFB78EF6489416BCB7A1AB2039EFD10536ED1D62AF0DB3CA4019710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                  • String ID:
                                  • API String ID: 2780335769-0
                                  • Opcode ID: 1ec8bf387a2241cb1ee0019bb6bb5a321e30a3d38cbcbe421edb0c1d83f6d5d9
                                  • Instruction ID: f2b6a6729a2a23c7ae211cae6acc1efe041080d0ea3c94f6e3321bdf08b228ba
                                  • Opcode Fuzzy Hash: 1ec8bf387a2241cb1ee0019bb6bb5a321e30a3d38cbcbe421edb0c1d83f6d5d9
                                  • Instruction Fuzzy Hash: 9951A122A04A4299FBA4EF75D4403BD63A1AB48799FD04034EE4D6B799DF38D881D760
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: LongWindow$DialogInvalidateRect
                                  • String ID:
                                  • API String ID: 1956198572-0
                                  • Opcode ID: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                  • Instruction ID: ec6cfded2fce86beb1d9c2eeed7e9172e22a7d679df51475e9a8fd3b802a2d61
                                  • Opcode Fuzzy Hash: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                  • Instruction Fuzzy Hash: DF11AC21E0854771FAE4AB59E5452799251EF84780FD48031DE5D17BAACD2DD8C1A510
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _get_daylight$_invalid_parameter_noinfo
                                  • String ID: ?
                                  • API String ID: 1286766494-1684325040
                                  • Opcode ID: 90ec7c2969ce35aee26a67d6175707cb0f81e8cc9ba484ad9fb4d69d3ee99291
                                  • Instruction ID: e98e930ada494ecf790d7aaf751d3a2bb9f50e452e7429f7d5d635ad2d1e8180
                                  • Opcode Fuzzy Hash: 90ec7c2969ce35aee26a67d6175707cb0f81e8cc9ba484ad9fb4d69d3ee99291
                                  • Instruction Fuzzy Hash: 11410812A18B8366FBB8AB25940137AD690EF90BA4FD04235EE5C2BAD5DF3CD4819710
                                  APIs
                                  • _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F7835E
                                    • Part of subcall function 00007FF733F79C58: RtlFreeHeap.NTDLL(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C6E
                                    • Part of subcall function 00007FF733F79C58: GetLastError.KERNEL32(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C78
                                  • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF733F6BEC5), ref: 00007FF733F7837C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                  • String ID: C:\Users\user\Desktop\2a2d6bO44t.exe
                                  • API String ID: 3580290477-1624346499
                                  • Opcode ID: ddc46de6380418fe35fca5e4aa859368a8c2113199f78edf785cf6db79d8d493
                                  • Instruction ID: 6db0de874b3a6cb19bcfe48443ddc3d2bef5bf11914efecc7a63ca464388074e
                                  • Opcode Fuzzy Hash: ddc46de6380418fe35fca5e4aa859368a8c2113199f78edf785cf6db79d8d493
                                  • Instruction Fuzzy Hash: 3841C332A08B43A5EBB4FF2594410BDA394EF457D2BD55035FA5D63B85CE3CE4809320
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CurrentDirectory_invalid_parameter_noinfo
                                  • String ID: .$:
                                  • API String ID: 2020911589-4202072812
                                  • Opcode ID: 2ab34ab9cd3b86b5895dfaae9249a533cb2656d78b0c7701b1ac49f11c4a311a
                                  • Instruction ID: fd1428bb2faf2dcd3c1aeb7fa1ddf0d57312284e476d9f3295aaf81f229f4fd2
                                  • Opcode Fuzzy Hash: 2ab34ab9cd3b86b5895dfaae9249a533cb2656d78b0c7701b1ac49f11c4a311a
                                  • Instruction Fuzzy Hash: A141A222F04B53A8FBA1EBB198401FC67746F14789FD40139EE5D77A95DF389442A320
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: U
                                  • API String ID: 442123175-4171548499
                                  • Opcode ID: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
                                  • Instruction ID: 32c99ccae5981aa7d1fd2bed284c5f4dffec434ab086722ea2d991b79a8e8e3a
                                  • Opcode Fuzzy Hash: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
                                  • Instruction Fuzzy Hash: 0441B222B18A8691DB70AF65E4443A9B7A0FB98BD4FC04035EE4D97798EF3CD441DB50
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CurrentDirectory
                                  • String ID: :
                                  • API String ID: 1611563598-336475711
                                  • Opcode ID: 07ccd8f192e8e90d69bfd843d23e6c5cb8c086d03a1c4ecf0d47480cab5f9335
                                  • Instruction ID: 2b8d3f02e6a5c1a11d40fa25e35832bbc1c1674dfea4ba0f39670aa0f4d8cf9e
                                  • Opcode Fuzzy Hash: 07ccd8f192e8e90d69bfd843d23e6c5cb8c086d03a1c4ecf0d47480cab5f9335
                                  • Instruction Fuzzy Hash: F621D523B0868391EBB4AB15D44427DA3B1FBD4B88FC54036E68D63294DF7CD945D760
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ExceptionFileHeaderRaise
                                  • String ID: csm
                                  • API String ID: 2573137834-1018135373
                                  • Opcode ID: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                  • Instruction ID: ecbd0b9d8829c06b549666dc8caf9d83e8cf7b61ed0a324e6760cef28893520b
                                  • Opcode Fuzzy Hash: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                  • Instruction Fuzzy Hash: 6D116D36618B86A2EB659F15F440269B7E0FB88B84F984230DF8D17769DF3CC951CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1685356845.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000000.00000002.1685338062.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685381217.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685402927.00007FF733FA4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1685481326.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: DriveType_invalid_parameter_noinfo
                                  • String ID: :
                                  • API String ID: 2595371189-336475711
                                  • Opcode ID: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                  • Instruction ID: 83ad83fa3896f8672ac92a0bf44c5d0fba3f98f8a6ccd8636f5eecbb7d4f33e6
                                  • Opcode Fuzzy Hash: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                  • Instruction Fuzzy Hash: DA01F22191C703A2FBB0BF60946127EA3A0EF48B89FC00135E55DA7291EF3CE504EB20

                                  Execution Graph

                                  Execution Coverage:2.5%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:813
                                  Total number of Limit Nodes:21
                                  execution_graph 55842 7ff733f7ec9c 55843 7ff733f7ee8e 55842->55843 55845 7ff733f7ecde _isindst 55842->55845 55889 7ff733f743f4 11 API calls _get_daylight 55843->55889 55845->55843 55848 7ff733f7ed5e _isindst 55845->55848 55863 7ff733f854a4 55848->55863 55853 7ff733f7eeba 55899 7ff733f79c10 IsProcessorFeaturePresent 55853->55899 55860 7ff733f7edbb 55862 7ff733f7ee7e 55860->55862 55888 7ff733f854e8 37 API calls _isindst 55860->55888 55890 7ff733f6b870 55862->55890 55864 7ff733f854b3 55863->55864 55865 7ff733f7ed7c 55863->55865 55903 7ff733f7f5e8 EnterCriticalSection 55864->55903 55870 7ff733f848a8 55865->55870 55867 7ff733f854bb 55868 7ff733f854cc 55867->55868 55869 7ff733f85314 55 API calls 55867->55869 55869->55868 55871 7ff733f7ed91 55870->55871 55872 7ff733f848b1 55870->55872 55871->55853 55876 7ff733f848d8 55871->55876 55904 7ff733f743f4 11 API calls _get_daylight 55872->55904 55874 7ff733f848b6 55905 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 55874->55905 55877 7ff733f7eda2 55876->55877 55878 7ff733f848e1 55876->55878 55877->55853 55882 7ff733f84908 55877->55882 55906 7ff733f743f4 11 API calls _get_daylight 55878->55906 55880 7ff733f848e6 55907 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 55880->55907 55883 7ff733f84911 55882->55883 55885 7ff733f7edb3 55882->55885 55908 7ff733f743f4 11 API calls _get_daylight 55883->55908 55885->55853 55885->55860 55886 7ff733f84916 55909 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 55886->55909 55888->55862 55889->55862 55891 7ff733f6b879 55890->55891 55892 7ff733f6b884 55891->55892 55893 7ff733f6bc00 IsProcessorFeaturePresent 55891->55893 55894 7ff733f6bc18 55893->55894 55910 7ff733f6bdf8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 55894->55910 55896 7ff733f6bc2b 55911 7ff733f6bbc0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 55896->55911 55900 7ff733f79c23 55899->55900 55912 7ff733f79924 14 API calls 3 library calls 55900->55912 55902 7ff733f79c3e GetCurrentProcess TerminateProcess 55904->55874 55905->55871 55906->55880 55907->55877 55908->55886 55909->55885 55910->55896 55912->55902 55913 7ff733f6ab3c 55914 7ff733f69e3a 55913->55914 55916 7ff733f69eb6 55914->55916 55917 7ff733f6b0b0 55914->55917 55918 7ff733f6b0d3 55917->55918 55919 7ff733f6b0f1 memcpy_s 55917->55919 55921 7ff733f7c90c 55918->55921 55919->55916 55922 7ff733f7c957 55921->55922 55927 7ff733f7c91b _get_daylight 55921->55927 55929 7ff733f743f4 11 API calls _get_daylight 55922->55929 55924 7ff733f7c93e HeapAlloc 55925 7ff733f7c955 55924->55925 55924->55927 55925->55919 55927->55922 55927->55924 55928 7ff733f828a0 EnterCriticalSection LeaveCriticalSection _get_daylight 55927->55928 55928->55927 55929->55925 55930 7ff733f6bf5c 55951 7ff733f6c12c 55930->55951 55933 7ff733f6c0a8 56070 7ff733f6c44c 7 API calls 2 library calls 55933->56070 55934 7ff733f6bf78 __scrt_acquire_startup_lock 55936 7ff733f6c0b2 55934->55936 55941 7ff733f6bf96 __scrt_release_startup_lock 55934->55941 56071 7ff733f6c44c 7 API calls 2 library calls 55936->56071 55938 7ff733f6bfbb 55939 7ff733f6c0bd __CxxCallCatchBlock 55940 7ff733f6c041 55957 7ff733f6c594 55940->55957 55941->55938 55941->55940 56067 7ff733f78e44 45 API calls 55941->56067 55943 7ff733f6c046 55960 7ff733f61000 55943->55960 55948 7ff733f6c069 55948->55939 56069 7ff733f6c2b0 7 API calls 55948->56069 55950 7ff733f6c080 55950->55938 55952 7ff733f6c134 55951->55952 55953 7ff733f6c140 __scrt_dllmain_crt_thread_attach 55952->55953 55954 7ff733f6bf70 55953->55954 55955 7ff733f6c14d 55953->55955 55954->55933 55954->55934 55955->55954 56072 7ff733f6cba8 7 API calls 2 library calls 55955->56072 56073 7ff733f897e0 55957->56073 55959 7ff733f6c5ab GetStartupInfoW 55959->55943 55961 7ff733f61009 55960->55961 56075 7ff733f74794 55961->56075 55963 7ff733f6352b 56082 7ff733f633e0 55963->56082 55968 7ff733f6b870 _log10_special 8 API calls 55971 7ff733f6372a 55968->55971 55969 7ff733f6356c 56175 7ff733f61bf0 55969->56175 55970 7ff733f63736 56181 7ff733f63f70 55970->56181 56068 7ff733f6c5d8 GetModuleHandleW 55971->56068 55975 7ff733f63785 56204 7ff733f625f0 53 API calls _log10_special 55975->56204 55979 7ff733f63778 55982 7ff733f6377d 55979->55982 55983 7ff733f6379f 55979->55983 55980 7ff733f63538 55980->55968 55981 7ff733f6365f __vcrt_freefls 55986 7ff733f63844 55981->55986 55989 7ff733f67e10 14 API calls 55981->55989 56200 7ff733f6f36c 55982->56200 55985 7ff733f61bf0 49 API calls 55983->55985 55988 7ff733f637be 55985->55988 56208 7ff733f63e90 49 API calls 55986->56208 55999 7ff733f618f0 115 API calls 55988->55999 55990 7ff733f636ae 55989->55990 56179 7ff733f67f80 40 API calls __vcrt_freefls 55990->56179 55991 7ff733f63852 55994 7ff733f63865 55991->55994 55995 7ff733f63871 55991->55995 55992 7ff733f63588 56144 7ff733f67e10 55992->56144 56209 7ff733f63fe0 55994->56209 55998 7ff733f61bf0 49 API calls 55995->55998 55996 7ff733f636bd 56000 7ff733f6380f 55996->56000 56003 7ff733f636cf 55996->56003 56014 7ff733f63805 __vcrt_freefls 55998->56014 56001 7ff733f637df 55999->56001 56206 7ff733f68400 58 API calls _log10_special 56000->56206 56001->55992 56002 7ff733f637ef 56001->56002 56205 7ff733f625f0 53 API calls _log10_special 56002->56205 56007 7ff733f61bf0 49 API calls 56003->56007 56010 7ff733f636f1 56007->56010 56008 7ff733f63814 56207 7ff733f67c40 84 API calls 2 library calls 56008->56207 56009 7ff733f6389e SetDllDirectoryW 56016 7ff733f638c3 56009->56016 56013 7ff733f636fc 56010->56013 56010->56014 56180 7ff733f625f0 53 API calls _log10_special 56013->56180 56157 7ff733f686b0 56014->56157 56020 7ff733f63a50 56016->56020 56212 7ff733f66560 53 API calls 56016->56212 56019 7ff733f63834 56019->55986 56019->56014 56022 7ff733f63a7d 56020->56022 56023 7ff733f63a5a PostMessageW GetMessageW 56020->56023 56021 7ff733f638d5 56213 7ff733f66b00 118 API calls 2 library calls 56021->56213 56162 7ff733f63080 56022->56162 56023->56022 56025 7ff733f638ea 56026 7ff733f63947 56025->56026 56029 7ff733f63901 56025->56029 56214 7ff733f665a0 121 API calls _log10_special 56025->56214 56026->56020 56034 7ff733f6395c 56026->56034 56043 7ff733f63905 56029->56043 56215 7ff733f66970 91 API calls 56029->56215 56219 7ff733f630e0 122 API calls 2 library calls 56034->56219 56035 7ff733f63916 56035->56043 56216 7ff733f66cd0 54 API calls 56035->56216 56038 7ff733f63aa3 56039 7ff733f63964 56039->55980 56042 7ff733f6396c 56039->56042 56220 7ff733f683e0 LocalFree 56042->56220 56043->56026 56217 7ff733f62870 53 API calls _log10_special 56043->56217 56044 7ff733f6393f 56218 7ff733f66780 FreeLibrary 56044->56218 56067->55940 56068->55948 56069->55950 56070->55936 56071->55939 56072->55954 56074 7ff733f897d0 56073->56074 56074->55959 56074->56074 56078 7ff733f7e790 56075->56078 56076 7ff733f7e7e3 56222 7ff733f79b24 37 API calls 2 library calls 56076->56222 56078->56076 56079 7ff733f7e836 56078->56079 56223 7ff733f7e668 71 API calls _fread_nolock 56079->56223 56081 7ff733f7e80c 56081->55963 56224 7ff733f6bb70 56082->56224 56084 7ff733f633ec GetModuleFileNameW 56085 7ff733f6341b 56084->56085 56086 7ff733f63438 56084->56086 56231 7ff733f629e0 51 API calls _log10_special 56085->56231 56226 7ff733f685a0 FindFirstFileExW 56086->56226 56089 7ff733f6342e 56094 7ff733f6b870 _log10_special 8 API calls 56089->56094 56091 7ff733f6344b 56232 7ff733f68620 CreateFileW GetFinalPathNameByHandleW CloseHandle 56091->56232 56092 7ff733f634a5 56234 7ff733f68760 WideCharToMultiByte WideCharToMultiByte __vcrt_freefls 56092->56234 56097 7ff733f634dd 56094->56097 56096 7ff733f634b3 56096->56089 56235 7ff733f626c0 49 API calls _log10_special 56096->56235 56097->55980 56104 7ff733f618f0 56097->56104 56098 7ff733f63458 56099 7ff733f6345c 56098->56099 56100 7ff733f63474 __vcrt_InitializeCriticalSectionEx 56098->56100 56233 7ff733f626c0 49 API calls _log10_special 56099->56233 56100->56092 56103 7ff733f6346d 56103->56089 56105 7ff733f63f70 108 API calls 56104->56105 56106 7ff733f61925 56105->56106 56107 7ff733f61bb6 56106->56107 56109 7ff733f676a0 83 API calls 56106->56109 56108 7ff733f6b870 _log10_special 8 API calls 56107->56108 56111 7ff733f61bd1 56108->56111 56110 7ff733f6196b 56109->56110 56143 7ff733f6199c 56110->56143 56236 7ff733f6f9f4 56110->56236 56111->55969 56111->55970 56113 7ff733f6f36c 74 API calls 56113->56107 56114 7ff733f61985 56115 7ff733f61989 56114->56115 56116 7ff733f619a1 56114->56116 56243 7ff733f62760 53 API calls 2 library calls 56115->56243 56240 7ff733f6f6bc 56116->56240 56120 7ff733f619d7 56123 7ff733f619ee 56120->56123 56124 7ff733f61a06 56120->56124 56121 7ff733f619bf 56244 7ff733f62760 53 API calls 2 library calls 56121->56244 56245 7ff733f62760 53 API calls 2 library calls 56123->56245 56126 7ff733f61bf0 49 API calls 56124->56126 56127 7ff733f61a1d 56126->56127 56128 7ff733f61bf0 49 API calls 56127->56128 56129 7ff733f61a68 56128->56129 56130 7ff733f6f9f4 73 API calls 56129->56130 56131 7ff733f61a8c 56130->56131 56132 7ff733f61ab9 56131->56132 56133 7ff733f61aa1 56131->56133 56134 7ff733f6f6bc _fread_nolock 53 API calls 56132->56134 56246 7ff733f62760 53 API calls 2 library calls 56133->56246 56136 7ff733f61ace 56134->56136 56137 7ff733f61aec 56136->56137 56138 7ff733f61ad4 56136->56138 56248 7ff733f6f430 56137->56248 56247 7ff733f62760 53 API calls 2 library calls 56138->56247 56143->56113 56145 7ff733f67e1a 56144->56145 56146 7ff733f686b0 2 API calls 56145->56146 56147 7ff733f67e39 GetEnvironmentVariableW 56146->56147 56148 7ff733f67e56 ExpandEnvironmentStringsW 56147->56148 56149 7ff733f67ea2 56147->56149 56148->56149 56150 7ff733f67e78 56148->56150 56151 7ff733f6b870 _log10_special 8 API calls 56149->56151 56286 7ff733f68760 WideCharToMultiByte WideCharToMultiByte __vcrt_freefls 56150->56286 56153 7ff733f67eb4 56151->56153 56153->55981 56154 7ff733f67e8a 56155 7ff733f6b870 _log10_special 8 API calls 56154->56155 56156 7ff733f67e9a 56155->56156 56156->55981 56158 7ff733f686d2 MultiByteToWideChar 56157->56158 56159 7ff733f686f6 56157->56159 56158->56159 56161 7ff733f6870c __vcrt_freefls 56158->56161 56160 7ff733f68713 MultiByteToWideChar 56159->56160 56159->56161 56160->56161 56161->56009 56287 7ff733f65af0 56162->56287 56165 7ff733f630b9 56171 7ff733f633a0 56165->56171 56167 7ff733f630a1 56167->56165 56357 7ff733f65800 56167->56357 56169 7ff733f630ad 56169->56165 56366 7ff733f65990 53 API calls 56169->56366 56172 7ff733f633ae 56171->56172 56173 7ff733f633bf 56172->56173 56499 7ff733f68180 FreeLibrary 56172->56499 56221 7ff733f66780 FreeLibrary 56173->56221 56176 7ff733f61c15 56175->56176 56500 7ff733f73ca4 56176->56500 56179->55996 56180->55980 56182 7ff733f63f7c 56181->56182 56183 7ff733f686b0 2 API calls 56182->56183 56184 7ff733f63fa4 56183->56184 56185 7ff733f686b0 2 API calls 56184->56185 56186 7ff733f63fb7 56185->56186 56527 7ff733f752a4 56186->56527 56189 7ff733f6b870 _log10_special 8 API calls 56190 7ff733f63746 56189->56190 56190->55975 56191 7ff733f676a0 56190->56191 56192 7ff733f676c4 56191->56192 56193 7ff733f6779b __vcrt_freefls 56192->56193 56194 7ff733f6f9f4 73 API calls 56192->56194 56193->55979 56195 7ff733f676e0 56194->56195 56195->56193 56693 7ff733f76bd8 56195->56693 56197 7ff733f6f9f4 73 API calls 56198 7ff733f676f5 56197->56198 56198->56193 56198->56197 56199 7ff733f6f6bc _fread_nolock 53 API calls 56198->56199 56199->56198 56201 7ff733f6f39c 56200->56201 56709 7ff733f6f148 56201->56709 56203 7ff733f6f3b5 56203->55975 56204->55980 56205->55980 56206->56008 56207->56019 56208->55991 56210 7ff733f61bf0 49 API calls 56209->56210 56211 7ff733f64010 56210->56211 56211->56014 56211->56211 56212->56021 56213->56025 56214->56029 56215->56035 56216->56043 56217->56044 56218->56026 56219->56039 56221->56038 56222->56081 56223->56081 56225 7ff733f6bb9a 56224->56225 56225->56084 56225->56225 56227 7ff733f685f2 56226->56227 56228 7ff733f685df FindClose 56226->56228 56229 7ff733f6b870 _log10_special 8 API calls 56227->56229 56228->56227 56230 7ff733f63442 56229->56230 56230->56091 56230->56092 56231->56089 56232->56098 56233->56103 56234->56096 56235->56089 56237 7ff733f6fa24 56236->56237 56255 7ff733f6f784 56237->56255 56239 7ff733f6fa3d 56239->56114 56268 7ff733f6f6dc 56240->56268 56243->56143 56244->56143 56245->56143 56246->56143 56247->56143 56249 7ff733f61b06 56248->56249 56250 7ff733f6f439 56248->56250 56249->56143 56254 7ff733f625f0 53 API calls _log10_special 56249->56254 56284 7ff733f743f4 11 API calls _get_daylight 56250->56284 56252 7ff733f6f43e 56285 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 56252->56285 56254->56143 56256 7ff733f6f7ee 56255->56256 56257 7ff733f6f7ae 56255->56257 56256->56257 56259 7ff733f6f7fa 56256->56259 56267 7ff733f79b24 37 API calls 2 library calls 56257->56267 56266 7ff733f7477c EnterCriticalSection 56259->56266 56261 7ff733f6f7d5 56261->56239 56262 7ff733f6f7ff 56263 7ff733f6f908 71 API calls 56262->56263 56264 7ff733f6f811 56263->56264 56265 7ff733f74788 _fread_nolock LeaveCriticalSection 56264->56265 56265->56261 56267->56261 56269 7ff733f6f706 56268->56269 56280 7ff733f619b9 56268->56280 56270 7ff733f6f715 __scrt_get_show_window_mode 56269->56270 56271 7ff733f6f752 56269->56271 56269->56280 56282 7ff733f743f4 11 API calls _get_daylight 56270->56282 56281 7ff733f7477c EnterCriticalSection 56271->56281 56274 7ff733f6f75a 56276 7ff733f6f45c _fread_nolock 51 API calls 56274->56276 56275 7ff733f6f72a 56283 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 56275->56283 56278 7ff733f6f771 56276->56278 56279 7ff733f74788 _fread_nolock LeaveCriticalSection 56278->56279 56279->56280 56280->56120 56280->56121 56282->56275 56283->56280 56284->56252 56285->56249 56286->56154 56288 7ff733f65b05 56287->56288 56289 7ff733f61bf0 49 API calls 56288->56289 56290 7ff733f65b41 56289->56290 56291 7ff733f65b6d 56290->56291 56292 7ff733f65b4a 56290->56292 56294 7ff733f63fe0 49 API calls 56291->56294 56377 7ff733f625f0 53 API calls _log10_special 56292->56377 56295 7ff733f65b85 56294->56295 56296 7ff733f65ba3 56295->56296 56378 7ff733f625f0 53 API calls _log10_special 56295->56378 56367 7ff733f63f10 56296->56367 56298 7ff733f6b870 _log10_special 8 API calls 56301 7ff733f6308e 56298->56301 56301->56165 56318 7ff733f65c80 56301->56318 56302 7ff733f65bbb 56304 7ff733f63fe0 49 API calls 56302->56304 56305 7ff733f65bd4 56304->56305 56306 7ff733f65bf9 56305->56306 56307 7ff733f65bd9 56305->56307 56309 7ff733f681a0 3 API calls 56306->56309 56379 7ff733f625f0 53 API calls _log10_special 56307->56379 56311 7ff733f65c06 56309->56311 56310 7ff733f65b63 56310->56298 56312 7ff733f65c49 56311->56312 56313 7ff733f65c12 56311->56313 56381 7ff733f650b0 95 API calls 56312->56381 56315 7ff733f686b0 2 API calls 56313->56315 56316 7ff733f65c2a 56315->56316 56380 7ff733f629e0 51 API calls _log10_special 56316->56380 56382 7ff733f64c80 56318->56382 56320 7ff733f65cba 56321 7ff733f65cd3 56320->56321 56322 7ff733f65cc2 56320->56322 56389 7ff733f64450 56321->56389 56414 7ff733f625f0 53 API calls _log10_special 56322->56414 56326 7ff733f65cf0 56329 7ff733f65d10 56326->56329 56330 7ff733f65cff 56326->56330 56327 7ff733f65cdf 56415 7ff733f625f0 53 API calls _log10_special 56327->56415 56393 7ff733f64700 56329->56393 56416 7ff733f625f0 53 API calls _log10_special 56330->56416 56331 7ff733f65cce 56331->56167 56334 7ff733f65d2b 56335 7ff733f65d40 56334->56335 56336 7ff733f65d2f 56334->56336 56338 7ff733f65d60 56335->56338 56339 7ff733f65d4f 56335->56339 56417 7ff733f625f0 53 API calls _log10_special 56336->56417 56400 7ff733f645a0 56338->56400 56418 7ff733f625f0 53 API calls _log10_special 56339->56418 56343 7ff733f65d80 56346 7ff733f65da0 56343->56346 56347 7ff733f65d8f 56343->56347 56344 7ff733f65d6f 56419 7ff733f625f0 53 API calls _log10_special 56344->56419 56349 7ff733f65db1 56346->56349 56351 7ff733f65dc2 56346->56351 56420 7ff733f625f0 53 API calls _log10_special 56347->56420 56421 7ff733f625f0 53 API calls _log10_special 56349->56421 56352 7ff733f65dec 56351->56352 56422 7ff733f765c0 73 API calls 56351->56422 56352->56331 56424 7ff733f625f0 53 API calls _log10_special 56352->56424 56354 7ff733f65dda 56423 7ff733f765c0 73 API calls 56354->56423 56358 7ff733f65820 56357->56358 56358->56358 56359 7ff733f65849 56358->56359 56364 7ff733f65860 __vcrt_freefls 56358->56364 56452 7ff733f625f0 53 API calls _log10_special 56359->56452 56361 7ff733f65855 56361->56169 56362 7ff733f6596b 56362->56169 56364->56362 56365 7ff733f625f0 53 API calls 56364->56365 56428 7ff733f61440 56364->56428 56365->56364 56366->56165 56368 7ff733f63f1a 56367->56368 56369 7ff733f686b0 2 API calls 56368->56369 56370 7ff733f63f3f 56369->56370 56371 7ff733f6b870 _log10_special 8 API calls 56370->56371 56372 7ff733f63f67 56371->56372 56372->56302 56373 7ff733f681a0 56372->56373 56374 7ff733f686b0 2 API calls 56373->56374 56375 7ff733f681b4 LoadLibraryExW 56374->56375 56376 7ff733f681d3 __vcrt_freefls 56375->56376 56376->56302 56377->56310 56378->56296 56379->56310 56380->56310 56381->56310 56384 7ff733f64cac 56382->56384 56383 7ff733f64cb4 56383->56320 56384->56383 56387 7ff733f64e54 56384->56387 56425 7ff733f75db4 48 API calls 56384->56425 56385 7ff733f65017 __vcrt_freefls 56385->56320 56386 7ff733f64180 47 API calls 56386->56387 56387->56385 56387->56386 56390 7ff733f64480 56389->56390 56391 7ff733f6b870 _log10_special 8 API calls 56390->56391 56392 7ff733f644ea 56391->56392 56392->56326 56392->56327 56394 7ff733f6476f 56393->56394 56397 7ff733f6471b 56393->56397 56427 7ff733f64300 MultiByteToWideChar MultiByteToWideChar __vcrt_freefls 56394->56427 56396 7ff733f6477c 56396->56334 56399 7ff733f6475a 56397->56399 56426 7ff733f64300 MultiByteToWideChar MultiByteToWideChar __vcrt_freefls 56397->56426 56399->56334 56401 7ff733f645b5 56400->56401 56402 7ff733f61bf0 49 API calls 56401->56402 56403 7ff733f64601 56402->56403 56404 7ff733f61bf0 49 API calls 56403->56404 56413 7ff733f64687 __vcrt_freefls 56403->56413 56405 7ff733f64640 56404->56405 56408 7ff733f686b0 2 API calls 56405->56408 56405->56413 56406 7ff733f6b870 _log10_special 8 API calls 56407 7ff733f646dc 56406->56407 56407->56343 56407->56344 56409 7ff733f6465a 56408->56409 56410 7ff733f686b0 2 API calls 56409->56410 56411 7ff733f64671 56410->56411 56412 7ff733f686b0 2 API calls 56411->56412 56412->56413 56413->56406 56414->56331 56415->56331 56416->56331 56417->56331 56418->56331 56419->56331 56420->56331 56421->56331 56422->56354 56423->56352 56424->56331 56425->56384 56426->56399 56427->56396 56429 7ff733f63f70 108 API calls 56428->56429 56430 7ff733f61463 56429->56430 56431 7ff733f6148c 56430->56431 56432 7ff733f6146b 56430->56432 56434 7ff733f6f9f4 73 API calls 56431->56434 56471 7ff733f625f0 53 API calls _log10_special 56432->56471 56435 7ff733f614a1 56434->56435 56437 7ff733f614a5 56435->56437 56438 7ff733f614c1 56435->56438 56436 7ff733f6147b 56436->56364 56472 7ff733f62760 53 API calls 2 library calls 56437->56472 56441 7ff733f614f1 56438->56441 56442 7ff733f614d1 56438->56442 56440 7ff733f614bc __vcrt_freefls 56444 7ff733f6f36c 74 API calls 56440->56444 56445 7ff733f614f7 56441->56445 56449 7ff733f6150a 56441->56449 56473 7ff733f62760 53 API calls 2 library calls 56442->56473 56446 7ff733f61584 56444->56446 56453 7ff733f611f0 56445->56453 56446->56364 56448 7ff733f6f6bc _fread_nolock 53 API calls 56448->56449 56449->56440 56449->56448 56450 7ff733f61596 56449->56450 56474 7ff733f62760 53 API calls 2 library calls 56450->56474 56452->56361 56454 7ff733f61248 56453->56454 56455 7ff733f61277 56454->56455 56456 7ff733f6124f 56454->56456 56459 7ff733f612ad 56455->56459 56460 7ff733f61291 56455->56460 56479 7ff733f625f0 53 API calls _log10_special 56456->56479 56458 7ff733f61262 56458->56440 56462 7ff733f612bf 56459->56462 56469 7ff733f612db memcpy_s 56459->56469 56480 7ff733f62760 53 API calls 2 library calls 56460->56480 56481 7ff733f62760 53 API calls 2 library calls 56462->56481 56464 7ff733f6f6bc _fread_nolock 53 API calls 56464->56469 56465 7ff733f612a8 __vcrt_freefls 56465->56440 56466 7ff733f6139f 56482 7ff733f625f0 53 API calls _log10_special 56466->56482 56469->56464 56469->56465 56469->56466 56470 7ff733f6f430 37 API calls 56469->56470 56475 7ff733f6fdfc 56469->56475 56470->56469 56471->56436 56472->56440 56473->56440 56474->56440 56476 7ff733f6fe2c 56475->56476 56483 7ff733f6fb4c 56476->56483 56478 7ff733f6fe4a 56478->56469 56479->56458 56480->56465 56481->56465 56482->56465 56484 7ff733f6fb6c 56483->56484 56489 7ff733f6fb99 56483->56489 56485 7ff733f6fb76 56484->56485 56486 7ff733f6fba1 56484->56486 56484->56489 56497 7ff733f79b24 37 API calls 2 library calls 56485->56497 56490 7ff733f6fa8c 56486->56490 56489->56478 56498 7ff733f7477c EnterCriticalSection 56490->56498 56492 7ff733f6faa9 56493 7ff733f6facc 74 API calls 56492->56493 56494 7ff733f6fab2 56493->56494 56495 7ff733f74788 _fread_nolock LeaveCriticalSection 56494->56495 56496 7ff733f6fabd 56495->56496 56496->56489 56497->56489 56499->56173 56501 7ff733f73cfe 56500->56501 56502 7ff733f73d23 56501->56502 56504 7ff733f73d5f 56501->56504 56518 7ff733f79b24 37 API calls 2 library calls 56502->56518 56519 7ff733f71f30 49 API calls _invalid_parameter_noinfo 56504->56519 56506 7ff733f73d4d 56509 7ff733f6b870 _log10_special 8 API calls 56506->56509 56507 7ff733f73e3c 56508 7ff733f79c58 __free_lconv_num 11 API calls 56507->56508 56508->56506 56511 7ff733f61c38 56509->56511 56510 7ff733f73df6 56510->56507 56512 7ff733f73e11 56510->56512 56513 7ff733f73e60 56510->56513 56514 7ff733f73e08 56510->56514 56511->55992 56520 7ff733f79c58 56512->56520 56513->56507 56515 7ff733f73e6a 56513->56515 56514->56507 56514->56512 56517 7ff733f79c58 __free_lconv_num 11 API calls 56515->56517 56517->56506 56518->56506 56519->56510 56521 7ff733f79c5d HeapFree 56520->56521 56525 7ff733f79c8c 56520->56525 56522 7ff733f79c78 GetLastError 56521->56522 56521->56525 56523 7ff733f79c85 __free_lconv_num 56522->56523 56526 7ff733f743f4 11 API calls _get_daylight 56523->56526 56525->56506 56526->56525 56528 7ff733f751d8 56527->56528 56529 7ff733f751fe 56528->56529 56531 7ff733f75231 56528->56531 56558 7ff733f743f4 11 API calls _get_daylight 56529->56558 56533 7ff733f75237 56531->56533 56534 7ff733f75244 56531->56534 56532 7ff733f75203 56559 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 56532->56559 56560 7ff733f743f4 11 API calls _get_daylight 56533->56560 56546 7ff733f79f38 56534->56546 56539 7ff733f75258 56561 7ff733f743f4 11 API calls _get_daylight 56539->56561 56540 7ff733f75265 56553 7ff733f7f1dc 56540->56553 56543 7ff733f75278 56562 7ff733f74788 LeaveCriticalSection 56543->56562 56545 7ff733f63fc6 56545->56189 56563 7ff733f7f5e8 EnterCriticalSection 56546->56563 56548 7ff733f79f4f 56549 7ff733f79fac 19 API calls 56548->56549 56550 7ff733f79f5a 56549->56550 56551 7ff733f7f648 _isindst LeaveCriticalSection 56550->56551 56552 7ff733f7524e 56551->56552 56552->56539 56552->56540 56564 7ff733f7eed8 56553->56564 56557 7ff733f7f236 56557->56543 56558->56532 56559->56545 56560->56545 56561->56545 56569 7ff733f7ef13 __vcrt_InitializeCriticalSectionEx 56564->56569 56565 7ff733f7f0da 56570 7ff733f7f0e3 56565->56570 56582 7ff733f743f4 11 API calls _get_daylight 56565->56582 56567 7ff733f7f1b1 56583 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 56567->56583 56569->56565 56579 7ff733f76d4c 51 API calls 3 library calls 56569->56579 56570->56557 56576 7ff733f86064 56570->56576 56572 7ff733f7f145 56572->56565 56580 7ff733f76d4c 51 API calls 3 library calls 56572->56580 56574 7ff733f7f164 56574->56565 56581 7ff733f76d4c 51 API calls 3 library calls 56574->56581 56584 7ff733f85664 56576->56584 56579->56572 56580->56574 56581->56565 56582->56567 56583->56570 56585 7ff733f8567b 56584->56585 56586 7ff733f85699 56584->56586 56638 7ff733f743f4 11 API calls _get_daylight 56585->56638 56586->56585 56588 7ff733f856b5 56586->56588 56595 7ff733f85c74 56588->56595 56589 7ff733f85680 56639 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 56589->56639 56593 7ff733f8568c 56593->56557 56641 7ff733f859a8 56595->56641 56598 7ff733f85ce9 56672 7ff733f743d4 11 API calls _get_daylight 56598->56672 56599 7ff733f85d01 56660 7ff733f77830 56599->56660 56617 7ff733f85cee 56673 7ff733f743f4 11 API calls _get_daylight 56617->56673 56630 7ff733f856e0 56630->56593 56640 7ff733f77808 LeaveCriticalSection 56630->56640 56638->56589 56639->56593 56642 7ff733f859d4 56641->56642 56649 7ff733f859ee 56641->56649 56642->56649 56685 7ff733f743f4 11 API calls _get_daylight 56642->56685 56644 7ff733f859e3 56686 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 56644->56686 56646 7ff733f85abd 56656 7ff733f85b1a 56646->56656 56691 7ff733f78e90 37 API calls 2 library calls 56646->56691 56647 7ff733f85a6c 56647->56646 56689 7ff733f743f4 11 API calls _get_daylight 56647->56689 56649->56647 56687 7ff733f743f4 11 API calls _get_daylight 56649->56687 56651 7ff733f85b16 56651->56656 56657 7ff733f79c10 _isindst 17 API calls 56651->56657 56653 7ff733f85ab2 56690 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 56653->56690 56654 7ff733f85a61 56688 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 56654->56688 56656->56598 56656->56599 56659 7ff733f85bad 56657->56659 56692 7ff733f7f5e8 EnterCriticalSection 56660->56692 56672->56617 56673->56630 56685->56644 56686->56649 56687->56654 56688->56647 56689->56653 56690->56646 56691->56651 56694 7ff733f76c08 56693->56694 56697 7ff733f766e4 56694->56697 56696 7ff733f76c21 56696->56198 56698 7ff733f7672e 56697->56698 56699 7ff733f766ff 56697->56699 56707 7ff733f7477c EnterCriticalSection 56698->56707 56708 7ff733f79b24 37 API calls 2 library calls 56699->56708 56702 7ff733f7671f 56702->56696 56703 7ff733f76733 56704 7ff733f76750 38 API calls 56703->56704 56705 7ff733f7673f 56704->56705 56706 7ff733f74788 _fread_nolock LeaveCriticalSection 56705->56706 56706->56702 56708->56702 56710 7ff733f6f163 56709->56710 56711 7ff733f6f191 56709->56711 56720 7ff733f79b24 37 API calls 2 library calls 56710->56720 56718 7ff733f6f183 56711->56718 56719 7ff733f7477c EnterCriticalSection 56711->56719 56714 7ff733f6f1a8 56715 7ff733f6f1c4 72 API calls 56714->56715 56716 7ff733f6f1b4 56715->56716 56717 7ff733f74788 _fread_nolock LeaveCriticalSection 56716->56717 56717->56718 56718->56203 56720->56718 56721 7ff733f78c79 56733 7ff733f796e8 56721->56733 56723 7ff733f78c7e 56724 7ff733f78ca5 GetModuleHandleW 56723->56724 56725 7ff733f78cef 56723->56725 56724->56725 56731 7ff733f78cb2 56724->56731 56726 7ff733f78b7c 11 API calls 56725->56726 56727 7ff733f78d2b 56726->56727 56728 7ff733f78d32 56727->56728 56729 7ff733f78d48 11 API calls 56727->56729 56730 7ff733f78d44 56729->56730 56731->56725 56732 7ff733f78da0 GetModuleHandleExW GetProcAddress FreeLibrary 56731->56732 56732->56725 56738 7ff733f7a460 45 API calls 3 library calls 56733->56738 56735 7ff733f796f1 56739 7ff733f79814 45 API calls __CxxCallCatchBlock 56735->56739 56738->56735 56740 7ff733f74938 56741 7ff733f74952 56740->56741 56742 7ff733f7496f 56740->56742 56791 7ff733f743d4 11 API calls _get_daylight 56741->56791 56742->56741 56744 7ff733f74982 CreateFileW 56742->56744 56746 7ff733f749ec 56744->56746 56747 7ff733f749b6 56744->56747 56745 7ff733f74957 56792 7ff733f743f4 11 API calls _get_daylight 56745->56792 56794 7ff733f74f14 46 API calls 3 library calls 56746->56794 56765 7ff733f74a8c GetFileType 56747->56765 56751 7ff733f749f1 56754 7ff733f749f5 56751->56754 56755 7ff733f74a20 56751->56755 56752 7ff733f7495f 56793 7ff733f79bf0 37 API calls _invalid_parameter_noinfo 56752->56793 56795 7ff733f74368 11 API calls 2 library calls 56754->56795 56796 7ff733f74cd4 56755->56796 56757 7ff733f749cb CloseHandle 56761 7ff733f7496a 56757->56761 56758 7ff733f749e1 CloseHandle 56758->56761 56764 7ff733f749ff 56764->56761 56766 7ff733f74ada 56765->56766 56767 7ff733f74b97 56765->56767 56768 7ff733f74b06 GetFileInformationByHandle 56766->56768 56814 7ff733f74e10 21 API calls _fread_nolock 56766->56814 56769 7ff733f74bc1 56767->56769 56770 7ff733f74b9f 56767->56770 56772 7ff733f74bb2 GetLastError 56768->56772 56773 7ff733f74b2f 56768->56773 56775 7ff733f74be4 PeekNamedPipe 56769->56775 56790 7ff733f74b82 56769->56790 56770->56772 56774 7ff733f74ba3 56770->56774 56817 7ff733f74368 11 API calls 2 library calls 56772->56817 56777 7ff733f74cd4 51 API calls 56773->56777 56816 7ff733f743f4 11 API calls _get_daylight 56774->56816 56775->56790 56776 7ff733f74af4 56776->56768 56776->56790 56781 7ff733f74b3a 56777->56781 56780 7ff733f6b870 _log10_special 8 API calls 56782 7ff733f749c4 56780->56782 56807 7ff733f74c34 56781->56807 56782->56757 56782->56758 56785 7ff733f74c34 10 API calls 56786 7ff733f74b59 56785->56786 56787 7ff733f74c34 10 API calls 56786->56787 56788 7ff733f74b6a 56787->56788 56788->56790 56815 7ff733f743f4 11 API calls _get_daylight 56788->56815 56790->56780 56791->56745 56792->56752 56793->56761 56794->56751 56795->56764 56798 7ff733f74cfc 56796->56798 56797 7ff733f74a2d 56806 7ff733f74e10 21 API calls _fread_nolock 56797->56806 56798->56797 56818 7ff733f7ea34 51 API calls 2 library calls 56798->56818 56800 7ff733f74d90 56800->56797 56819 7ff733f7ea34 51 API calls 2 library calls 56800->56819 56802 7ff733f74da3 56802->56797 56820 7ff733f7ea34 51 API calls 2 library calls 56802->56820 56804 7ff733f74db6 56804->56797 56821 7ff733f7ea34 51 API calls 2 library calls 56804->56821 56806->56764 56808 7ff733f74c5d FileTimeToSystemTime 56807->56808 56809 7ff733f74c50 56807->56809 56810 7ff733f74c71 SystemTimeToTzSpecificLocalTime 56808->56810 56811 7ff733f74c58 56808->56811 56809->56808 56809->56811 56810->56811 56812 7ff733f6b870 _log10_special 8 API calls 56811->56812 56813 7ff733f74b49 56812->56813 56813->56785 56814->56776 56815->56790 56816->56790 56817->56790 56818->56800 56819->56802 56820->56804 56821->56797 56822 7ffe01396110 56823 7ffe01396138 56822->56823 56824 7ffe01396124 56822->56824 56875 7ffe013ca4a8 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 56823->56875 56826 7ffe01396161 56824->56826 56835 7ffe0139626c 56824->56835 56827 7ffe0139616a 56826->56827 56828 7ffe01396211 56826->56828 56830 7ffe013961e9 56827->56830 56831 7ffe0139616f GetLastError 56827->56831 56868 7ffe013976f0 56828->56868 56829 7ffe013961d5 56830->56829 56836 7ffe013961f9 56830->56836 56833 7ffe01396186 56831->56833 56834 7ffe0139618b 56831->56834 56876 7ffe01393a40 6 API calls _vfwprintf_l 56833->56876 56843 7ffe01396197 56834->56843 56879 7ffe013962cc 6 API calls _vfwprintf_l 56834->56879 56835->56829 56896 7ffe013977ec 117 API calls 56835->56896 56878 7ffe01393a40 6 API calls _vfwprintf_l 56836->56878 56841 7ffe01396223 56844 7ffe013962b7 SetLastError 56841->56844 56880 7ffe0138dcf0 56841->56880 56842 7ffe013961fe 56842->56829 56899 7ffe013962cc 6 API calls _vfwprintf_l 56842->56899 56843->56844 56846 7ffe013961a1 56843->56846 56844->56829 56846->56844 56849 7ffe013961aa 56846->56849 56877 7ffe01393a40 6 API calls _vfwprintf_l 56849->56877 56850 7ffe01396248 56893 7ffe013962cc 6 API calls _vfwprintf_l 56850->56893 56851 7ffe013962a9 56897 7ffe013962cc 6 API calls _vfwprintf_l 56851->56897 56852 7ffe013d33ef 56900 7ffe0139f930 29 API calls __std_type_info_destroy_list 56852->56900 56857 7ffe013961b5 SetLastError 56857->56829 56858 7ffe013961d0 56857->56858 56858->56829 56859 7ffe013962b0 56898 7ffe0138f040 25 API calls 2 library calls 56859->56898 56860 7ffe01396250 56861 7ffe01396258 56860->56861 56862 7ffe013d3408 56860->56862 56894 7ffe013963a4 25 API calls wmemcpy_s 56861->56894 56901 7ffe013962cc 6 API calls _vfwprintf_l 56862->56901 56866 7ffe01396260 56895 7ffe0138f040 25 API calls 2 library calls 56866->56895 56902 7ffe013c967c 56868->56902 56870 7ffe0139773d 56873 7ffe01397746 56870->56873 56918 7ffe013c96bc 8 API calls 3 library calls 56870->56918 56872 7ffe01397704 56872->56870 56910 7ffe0139c7f0 EnterCriticalSection 56872->56910 56873->56829 56875->56824 56876->56834 56877->56857 56878->56842 56879->56841 56881 7ffe0138dd16 HeapAlloc 56880->56881 56882 7ffe0138dd01 56880->56882 56884 7ffe0138dd47 56881->56884 56885 7ffe013d0f80 56881->56885 56882->56881 56883 7ffe013d0f6e 56882->56883 56972 7ffe01393440 25 API calls 2 library calls 56883->56972 56884->56850 56884->56851 56891 7ffe013d0f9f HeapAlloc 56885->56891 56892 7ffe013d0fb9 56885->56892 56973 7ffe01383964 8 API calls _vfwprintf_l 56885->56973 56974 7ffe013ec860 10 API calls wmemcpy_s 56885->56974 56890 7ffe013d0fc3 56891->56885 56891->56892 56975 7ffe01393440 25 API calls 2 library calls 56892->56975 56893->56860 56894->56866 56895->56843 56896->56829 56897->56859 56898->56844 56899->56852 56900->56858 56901->56859 56903 7ffe013c9685 __vcrt_initialize_winapi_thunks 56902->56903 56919 7ffe013c9c98 56903->56919 56906 7ffe013c9698 56906->56872 56908 7ffe013c96a1 56908->56906 56926 7ffe013c9d04 DeleteCriticalSection 56908->56926 56943 7ffe0139c998 56910->56943 56912 7ffe0139c80c 56913 7ffe0139c81c LeaveCriticalSection 56912->56913 56954 7ffe0139c93c 79 API calls 56912->56954 56913->56872 56915 7ffe0139c815 56955 7ffe0139c838 GetStdHandle GetFileType 56915->56955 56917 7ffe0139c81a 56917->56913 56918->56870 56920 7ffe013c9ca0 56919->56920 56922 7ffe013c9cd1 56920->56922 56923 7ffe013c9694 56920->56923 56927 7ffe013ca0a0 56920->56927 56932 7ffe013c9d04 DeleteCriticalSection 56922->56932 56923->56906 56925 7ffe013c9854 8 API calls 2 library calls 56923->56925 56925->56908 56926->56906 56933 7ffe013c9d88 56927->56933 56930 7ffe013ca0eb InitializeCriticalSectionAndSpinCount 56931 7ffe013ca0e0 56930->56931 56931->56920 56932->56923 56934 7ffe013c9de9 56933->56934 56941 7ffe013c9de4 try_get_function 56933->56941 56934->56930 56934->56931 56935 7ffe013c9ecc 56935->56934 56937 7ffe013c9eda GetProcAddress 56935->56937 56936 7ffe013c9e18 LoadLibraryExW 56938 7ffe013c9e39 GetLastError 56936->56938 56936->56941 56939 7ffe013c9eeb 56937->56939 56938->56941 56939->56934 56940 7ffe013c9eb1 FreeLibrary 56940->56941 56941->56934 56941->56935 56941->56936 56941->56940 56942 7ffe013c9e73 LoadLibraryExW 56941->56942 56942->56941 56944 7ffe0139c9bb EnterCriticalSection 56943->56944 56945 7ffe013d5b28 56943->56945 56947 7ffe0139c9d3 56944->56947 56968 7ffe01393440 25 API calls 2 library calls 56945->56968 56949 7ffe0139ca12 LeaveCriticalSection 56947->56949 56953 7ffe0139ca0d 56947->56953 56956 7ffe0139ca40 56947->56956 56948 7ffe013d5b2d 56969 7ffe013a2370 73 API calls wmemcpy_s 56948->56969 56949->56912 56951 7ffe013d5b39 56953->56949 56954->56915 56955->56917 56957 7ffe0138dcf0 wmemcpy_s 25 API calls 56956->56957 56962 7ffe0139ca54 56957->56962 56958 7ffe0139cb24 56970 7ffe0138f040 25 API calls 2 library calls 56958->56970 56960 7ffe0139cb42 56960->56947 56961 7ffe013d5b83 InitializeCriticalSectionAndSpinCount 56963 7ffe013d5b98 GetProcAddress 56961->56963 56962->56958 56962->56961 56967 7ffe013d5b40 56962->56967 56965 7ffe013d5b5c 56963->56965 56965->56961 56966 7ffe013d5bdb 56965->56966 56966->56966 56967->56963 56967->56965 56971 7ffe0139bfe0 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary try_get_function 56967->56971 56968->56948 56969->56951 56970->56960 56971->56967 56972->56884 56973->56885 56974->56885 56975->56890 56976 7ff733f62d00 56977 7ff733f62d10 56976->56977 56978 7ff733f62d4b 56977->56978 56979 7ff733f62d61 56977->56979 57004 7ff733f625f0 53 API calls _log10_special 56978->57004 56982 7ff733f62d81 56979->56982 56992 7ff733f62d97 __vcrt_freefls 56979->56992 56981 7ff733f62d57 __vcrt_freefls 56983 7ff733f6b870 _log10_special 8 API calls 56981->56983 57005 7ff733f625f0 53 API calls _log10_special 56982->57005 56985 7ff733f62f1a 56983->56985 56986 7ff733f61440 116 API calls 56986->56992 56987 7ff733f63069 57012 7ff733f625f0 53 API calls _log10_special 56987->57012 56988 7ff733f61bf0 49 API calls 56988->56992 56990 7ff733f63053 57011 7ff733f625f0 53 API calls _log10_special 56990->57011 56992->56981 56992->56986 56992->56987 56992->56988 56992->56990 56993 7ff733f6302d 56992->56993 56995 7ff733f62f27 56992->56995 57010 7ff733f625f0 53 API calls _log10_special 56993->57010 56996 7ff733f62f93 56995->56996 57006 7ff733f79714 37 API calls 2 library calls 56995->57006 56998 7ff733f62fbe 56996->56998 56999 7ff733f62fb0 56996->56999 57008 7ff733f62af0 37 API calls 56998->57008 57007 7ff733f79714 37 API calls 2 library calls 56999->57007 57002 7ff733f62fbc 57009 7ff733f62470 54 API calls __vcrt_freefls 57002->57009 57004->56981 57005->56981 57006->56996 57007->57002 57008->57002 57009->56981 57010->56981 57011->56981 57012->56981

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 7ff733f61000-7ff733f63536 call 7ff733f6f138 call 7ff733f6f140 call 7ff733f6bb70 call 7ff733f74700 call 7ff733f74794 call 7ff733f633e0 14 7ff733f63538-7ff733f6353f 0->14 15 7ff733f63544-7ff733f63566 call 7ff733f618f0 0->15 16 7ff733f6371a-7ff733f63735 call 7ff733f6b870 14->16 20 7ff733f6356c-7ff733f63583 call 7ff733f61bf0 15->20 21 7ff733f63736-7ff733f6374c call 7ff733f63f70 15->21 26 7ff733f63588-7ff733f635c1 20->26 27 7ff733f6374e-7ff733f6377b call 7ff733f676a0 21->27 28 7ff733f63785-7ff733f6379a call 7ff733f625f0 21->28 29 7ff733f635c7-7ff733f635cb 26->29 30 7ff733f63653-7ff733f6366d call 7ff733f67e10 26->30 41 7ff733f6377d-7ff733f63780 call 7ff733f6f36c 27->41 42 7ff733f6379f-7ff733f637be call 7ff733f61bf0 27->42 44 7ff733f63712 28->44 33 7ff733f635cd-7ff733f635e5 call 7ff733f74560 29->33 34 7ff733f63638-7ff733f6364d call 7ff733f618e0 29->34 46 7ff733f63695-7ff733f6369c 30->46 47 7ff733f6366f-7ff733f63675 30->47 50 7ff733f635e7-7ff733f635eb 33->50 51 7ff733f635f2-7ff733f6360a call 7ff733f74560 33->51 34->29 34->30 41->28 63 7ff733f637c1-7ff733f637ca 42->63 44->16 54 7ff733f63844-7ff733f63863 call 7ff733f63e90 46->54 55 7ff733f636a2-7ff733f636c0 call 7ff733f67e10 call 7ff733f67f80 46->55 52 7ff733f63677-7ff733f63680 47->52 53 7ff733f63682-7ff733f63690 call 7ff733f7415c 47->53 50->51 69 7ff733f6360c-7ff733f63610 51->69 70 7ff733f63617-7ff733f6362f call 7ff733f74560 51->70 52->53 53->46 66 7ff733f63865-7ff733f6386f call 7ff733f63fe0 54->66 67 7ff733f63871-7ff733f63882 call 7ff733f61bf0 54->67 77 7ff733f636c6-7ff733f636c9 55->77 78 7ff733f6380f-7ff733f6381e call 7ff733f68400 55->78 63->63 68 7ff733f637cc-7ff733f637e9 call 7ff733f618f0 63->68 80 7ff733f63887-7ff733f638a1 call 7ff733f686b0 66->80 67->80 68->26 82 7ff733f637ef-7ff733f63800 call 7ff733f625f0 68->82 69->70 70->34 83 7ff733f63631 70->83 77->78 84 7ff733f636cf-7ff733f636f6 call 7ff733f61bf0 77->84 93 7ff733f6382c-7ff733f63836 call 7ff733f67c40 78->93 94 7ff733f63820 78->94 95 7ff733f638a3 80->95 96 7ff733f638af-7ff733f638c1 SetDllDirectoryW 80->96 82->44 83->34 97 7ff733f636fc-7ff733f63703 call 7ff733f625f0 84->97 98 7ff733f63805-7ff733f6380d call 7ff733f7415c 84->98 93->80 112 7ff733f63838 93->112 94->93 95->96 100 7ff733f638c3-7ff733f638ca 96->100 101 7ff733f638d0-7ff733f638ec call 7ff733f66560 call 7ff733f66b00 96->101 109 7ff733f63708-7ff733f6370a 97->109 98->80 100->101 106 7ff733f63a50-7ff733f63a58 100->106 117 7ff733f638ee-7ff733f638f4 101->117 118 7ff733f63947-7ff733f6394a call 7ff733f66510 101->118 110 7ff733f63a7d-7ff733f63a92 call 7ff733f633d0 call 7ff733f63080 call 7ff733f633a0 106->110 111 7ff733f63a5a-7ff733f63a77 PostMessageW GetMessageW 106->111 109->44 128 7ff733f63a97-7ff733f63aaf call 7ff733f66780 call 7ff733f66510 110->128 111->110 112->54 121 7ff733f6390e-7ff733f63918 call 7ff733f66970 117->121 122 7ff733f638f6-7ff733f63903 call 7ff733f665a0 117->122 126 7ff733f6394f-7ff733f63956 118->126 135 7ff733f6391a-7ff733f63921 121->135 136 7ff733f63923-7ff733f63931 call 7ff733f66cd0 121->136 122->121 133 7ff733f63905-7ff733f6390c 122->133 126->106 130 7ff733f6395c-7ff733f63966 call 7ff733f630e0 126->130 130->109 143 7ff733f6396c-7ff733f63980 call 7ff733f683e0 130->143 138 7ff733f6393a-7ff733f63942 call 7ff733f62870 call 7ff733f66780 133->138 135->138 136->126 145 7ff733f63933 136->145 138->118 151 7ff733f639a5-7ff733f639e8 call 7ff733f67f20 call 7ff733f67fc0 call 7ff733f66780 call 7ff733f66510 call 7ff733f67ec0 143->151 152 7ff733f63982-7ff733f6399f PostMessageW GetMessageW 143->152 145->138 163 7ff733f63a3d-7ff733f63a4b call 7ff733f618a0 151->163 164 7ff733f639ea-7ff733f63a00 call 7ff733f681f0 call 7ff733f67ec0 151->164 152->151 163->109 164->163 171 7ff733f63a02-7ff733f63a10 164->171 172 7ff733f63a12-7ff733f63a2c call 7ff733f625f0 call 7ff733f618a0 171->172 173 7ff733f63a31-7ff733f63a38 call 7ff733f62870 171->173 172->109 173->163
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FileModuleName
                                  • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$ERROR: failed to remove temporary directory: %s$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$MEI$PYINSTALLER_STRICT_UNPACK_MODE$Path exceeds PYI_PATH_MAX limit.$WARNING: failed to remove temporary directory: %s$_MEIPASS2$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-runtime-tmpdir
                                  • API String ID: 514040917-585287483
                                  • Opcode ID: 9842cbd688bc5711a49d4e0ce16b69d9ca5c4bef69e7965de4c15c2abde6ee8e
                                  • Instruction ID: d706a917ba471e89090486f15826967039176175e2c89b18d124083d96b9a066
                                  • Opcode Fuzzy Hash: 9842cbd688bc5711a49d4e0ce16b69d9ca5c4bef69e7965de4c15c2abde6ee8e
                                  • Instruction Fuzzy Hash: 82F18021A08683B1FBB8FB21D5552F9E351AF54780FC44032DA5DA72E6EF2CE558E360

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 245 7ff733f84f10-7ff733f84f4b call 7ff733f84898 call 7ff733f848a0 call 7ff733f84908 252 7ff733f85175-7ff733f851c1 call 7ff733f79c10 call 7ff733f84898 call 7ff733f848a0 call 7ff733f84908 245->252 253 7ff733f84f51-7ff733f84f5c call 7ff733f848a8 245->253 279 7ff733f851c7-7ff733f851d2 call 7ff733f848a8 252->279 280 7ff733f852ff-7ff733f8536d call 7ff733f79c10 call 7ff733f80888 252->280 253->252 259 7ff733f84f62-7ff733f84f6c 253->259 261 7ff733f84f8e-7ff733f84f92 259->261 262 7ff733f84f6e-7ff733f84f71 259->262 265 7ff733f84f95-7ff733f84f9d 261->265 264 7ff733f84f74-7ff733f84f7f 262->264 267 7ff733f84f8a-7ff733f84f8c 264->267 268 7ff733f84f81-7ff733f84f88 264->268 265->265 269 7ff733f84f9f-7ff733f84fb2 call 7ff733f7c90c 265->269 267->261 272 7ff733f84fbb-7ff733f84fc9 267->272 268->264 268->267 275 7ff733f84fca-7ff733f84fd6 call 7ff733f79c58 269->275 276 7ff733f84fb4-7ff733f84fb6 call 7ff733f79c58 269->276 285 7ff733f84fdd-7ff733f84fe5 275->285 276->272 279->280 289 7ff733f851d8-7ff733f851e3 call 7ff733f848d8 279->289 297 7ff733f8537b-7ff733f8537e 280->297 298 7ff733f8536f-7ff733f85376 280->298 285->285 288 7ff733f84fe7-7ff733f84ff8 call 7ff733f7f784 285->288 288->252 299 7ff733f84ffe-7ff733f85054 call 7ff733f897e0 * 4 call 7ff733f84e2c 288->299 289->280 300 7ff733f851e9-7ff733f8520c call 7ff733f79c58 GetTimeZoneInformation 289->300 304 7ff733f853b5-7ff733f853c8 call 7ff733f7c90c 297->304 305 7ff733f85380 297->305 302 7ff733f8540b-7ff733f8540e 298->302 357 7ff733f85056-7ff733f8505a 299->357 311 7ff733f852d4-7ff733f852fe call 7ff733f84890 call 7ff733f84880 call 7ff733f84888 300->311 312 7ff733f85212-7ff733f85233 300->312 309 7ff733f85414-7ff733f8541c call 7ff733f84f10 302->309 310 7ff733f85383 302->310 322 7ff733f853ca 304->322 323 7ff733f853d3-7ff733f853ee call 7ff733f80888 304->323 305->310 316 7ff733f85388-7ff733f853b4 call 7ff733f79c58 call 7ff733f6b870 309->316 310->316 317 7ff733f85383 call 7ff733f8518c 310->317 318 7ff733f8523e-7ff733f85245 312->318 319 7ff733f85235-7ff733f8523b 312->319 317->316 326 7ff733f85259 318->326 327 7ff733f85247-7ff733f8524f 318->327 319->318 330 7ff733f853cc-7ff733f853d1 call 7ff733f79c58 322->330 345 7ff733f853f5-7ff733f85407 call 7ff733f79c58 323->345 346 7ff733f853f0-7ff733f853f3 323->346 338 7ff733f8525b-7ff733f852cf call 7ff733f897e0 * 4 call 7ff733f81e6c call 7ff733f85424 * 2 326->338 327->326 333 7ff733f85251-7ff733f85257 327->333 330->305 333->338 338->311 345->302 346->330 359 7ff733f8505c 357->359 360 7ff733f85060-7ff733f85064 357->360 359->360 360->357 362 7ff733f85066-7ff733f8508b call 7ff733f75e68 360->362 369 7ff733f8508e-7ff733f85092 362->369 371 7ff733f85094-7ff733f8509f 369->371 372 7ff733f850a1-7ff733f850a5 369->372 371->372 374 7ff733f850a7-7ff733f850ab 371->374 372->369 376 7ff733f850ad-7ff733f850d5 call 7ff733f75e68 374->376 377 7ff733f8512c-7ff733f85130 374->377 385 7ff733f850d7 376->385 386 7ff733f850f3-7ff733f850f7 376->386 378 7ff733f85137-7ff733f85144 377->378 379 7ff733f85132-7ff733f85134 377->379 381 7ff733f85146-7ff733f8515c call 7ff733f84e2c 378->381 382 7ff733f8515f-7ff733f8516e call 7ff733f84890 call 7ff733f84880 378->382 379->378 381->382 382->252 390 7ff733f850da-7ff733f850e1 385->390 386->377 388 7ff733f850f9-7ff733f85117 call 7ff733f75e68 386->388 397 7ff733f85123-7ff733f8512a 388->397 390->386 394 7ff733f850e3-7ff733f850f1 390->394 394->386 394->390 397->377 398 7ff733f85119-7ff733f8511d 397->398 398->377 399 7ff733f8511f 398->399 399->397
                                  APIs
                                  • _get_daylight.LIBCMT ref: 00007FF733F84F55
                                    • Part of subcall function 00007FF733F848A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F848BC
                                    • Part of subcall function 00007FF733F79C58: HeapFree.KERNEL32(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C6E
                                    • Part of subcall function 00007FF733F79C58: GetLastError.KERNEL32(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C78
                                    • Part of subcall function 00007FF733F79C10: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF733F79BEF,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F79C19
                                    • Part of subcall function 00007FF733F79C10: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF733F79BEF,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F79C3E
                                  • _get_daylight.LIBCMT ref: 00007FF733F84F44
                                    • Part of subcall function 00007FF733F84908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F8491C
                                  • _get_daylight.LIBCMT ref: 00007FF733F851BA
                                  • _get_daylight.LIBCMT ref: 00007FF733F851CB
                                  • _get_daylight.LIBCMT ref: 00007FF733F851DC
                                  • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF733F8541C), ref: 00007FF733F85203
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                  • String ID: Eastern Standard Time$Eastern Summer Time
                                  • API String ID: 4070488512-239921721
                                  • Opcode ID: 1e88bcb5f495bb70dc88d60703a9f776145871d29d9eb43ad6078281b4d73a6f
                                  • Instruction ID: 4e5ee6a617a029fafcccc5e82ba99899628f902e1c576c51404c78b0f3a14301
                                  • Opcode Fuzzy Hash: 1e88bcb5f495bb70dc88d60703a9f776145871d29d9eb43ad6078281b4d73a6f
                                  • Instruction Fuzzy Hash: EED1D326A08643A6EBB8FF21D8411B9A7A1FF84784FC44035EA4D7B695DF3CE441E760

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 514 7ff733f85c74-7ff733f85ce7 call 7ff733f859a8 517 7ff733f85ce9-7ff733f85cf2 call 7ff733f743d4 514->517 518 7ff733f85d01-7ff733f85d0b call 7ff733f77830 514->518 523 7ff733f85cf5-7ff733f85cfc call 7ff733f743f4 517->523 524 7ff733f85d0d-7ff733f85d24 call 7ff733f743d4 call 7ff733f743f4 518->524 525 7ff733f85d26-7ff733f85d8f CreateFileW 518->525 538 7ff733f86042-7ff733f86062 523->538 524->523 526 7ff733f85e0c-7ff733f85e17 GetFileType 525->526 527 7ff733f85d91-7ff733f85d97 525->527 533 7ff733f85e6a-7ff733f85e71 526->533 534 7ff733f85e19-7ff733f85e54 GetLastError call 7ff733f74368 CloseHandle 526->534 530 7ff733f85dd9-7ff733f85e07 GetLastError call 7ff733f74368 527->530 531 7ff733f85d99-7ff733f85d9d 527->531 530->523 531->530 536 7ff733f85d9f-7ff733f85dd7 CreateFileW 531->536 541 7ff733f85e79-7ff733f85e7c 533->541 542 7ff733f85e73-7ff733f85e77 533->542 534->523 549 7ff733f85e5a-7ff733f85e65 call 7ff733f743f4 534->549 536->526 536->530 543 7ff733f85e82-7ff733f85ed7 call 7ff733f77748 541->543 544 7ff733f85e7e 541->544 542->543 552 7ff733f85ed9-7ff733f85ee5 call 7ff733f85bb0 543->552 553 7ff733f85ef6-7ff733f85f27 call 7ff733f85728 543->553 544->543 549->523 552->553 559 7ff733f85ee7 552->559 560 7ff733f85f2d-7ff733f85f6f 553->560 561 7ff733f85f29-7ff733f85f2b 553->561 562 7ff733f85ee9-7ff733f85ef1 call 7ff733f79dd0 559->562 563 7ff733f85f91-7ff733f85f9c 560->563 564 7ff733f85f71-7ff733f85f75 560->564 561->562 562->538 566 7ff733f85fa2-7ff733f85fa6 563->566 567 7ff733f86040 563->567 564->563 565 7ff733f85f77-7ff733f85f8c 564->565 565->563 566->567 569 7ff733f85fac-7ff733f85ff1 CloseHandle CreateFileW 566->569 567->538 571 7ff733f86026-7ff733f8603b 569->571 572 7ff733f85ff3-7ff733f86021 GetLastError call 7ff733f74368 call 7ff733f77970 569->572 571->567 572->571
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                  • String ID:
                                  • API String ID: 1617910340-0
                                  • Opcode ID: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                  • Instruction ID: c79fa004885b77c81de0045d36f9e69ac0f3bd074958a51a98f2ee174d58f3c7
                                  • Opcode Fuzzy Hash: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                  • Instruction Fuzzy Hash: 24C1D032B28A4296EBA4DF68C4806BC7761FB49B98B801235DE2E7B794CF38D451D310

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1000 7ff733f8518c-7ff733f851c1 call 7ff733f84898 call 7ff733f848a0 call 7ff733f84908 1007 7ff733f851c7-7ff733f851d2 call 7ff733f848a8 1000->1007 1008 7ff733f852ff-7ff733f8536d call 7ff733f79c10 call 7ff733f80888 1000->1008 1007->1008 1013 7ff733f851d8-7ff733f851e3 call 7ff733f848d8 1007->1013 1019 7ff733f8537b-7ff733f8537e 1008->1019 1020 7ff733f8536f-7ff733f85376 1008->1020 1013->1008 1021 7ff733f851e9-7ff733f8520c call 7ff733f79c58 GetTimeZoneInformation 1013->1021 1024 7ff733f853b5-7ff733f853c8 call 7ff733f7c90c 1019->1024 1025 7ff733f85380 1019->1025 1023 7ff733f8540b-7ff733f8540e 1020->1023 1030 7ff733f852d4-7ff733f852fe call 7ff733f84890 call 7ff733f84880 call 7ff733f84888 1021->1030 1031 7ff733f85212-7ff733f85233 1021->1031 1028 7ff733f85414-7ff733f8541c call 7ff733f84f10 1023->1028 1029 7ff733f85383 1023->1029 1040 7ff733f853ca 1024->1040 1041 7ff733f853d3-7ff733f853ee call 7ff733f80888 1024->1041 1025->1029 1034 7ff733f85388-7ff733f853b4 call 7ff733f79c58 call 7ff733f6b870 1028->1034 1029->1034 1035 7ff733f85383 call 7ff733f8518c 1029->1035 1036 7ff733f8523e-7ff733f85245 1031->1036 1037 7ff733f85235-7ff733f8523b 1031->1037 1035->1034 1043 7ff733f85259 1036->1043 1044 7ff733f85247-7ff733f8524f 1036->1044 1037->1036 1047 7ff733f853cc-7ff733f853d1 call 7ff733f79c58 1040->1047 1059 7ff733f853f5-7ff733f85407 call 7ff733f79c58 1041->1059 1060 7ff733f853f0-7ff733f853f3 1041->1060 1053 7ff733f8525b-7ff733f852cf call 7ff733f897e0 * 4 call 7ff733f81e6c call 7ff733f85424 * 2 1043->1053 1044->1043 1049 7ff733f85251-7ff733f85257 1044->1049 1047->1025 1049->1053 1053->1030 1059->1023 1060->1047
                                  APIs
                                  • _get_daylight.LIBCMT ref: 00007FF733F851BA
                                    • Part of subcall function 00007FF733F84908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F8491C
                                  • _get_daylight.LIBCMT ref: 00007FF733F851CB
                                    • Part of subcall function 00007FF733F848A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F848BC
                                  • _get_daylight.LIBCMT ref: 00007FF733F851DC
                                    • Part of subcall function 00007FF733F848D8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F848EC
                                    • Part of subcall function 00007FF733F79C58: HeapFree.KERNEL32(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C6E
                                    • Part of subcall function 00007FF733F79C58: GetLastError.KERNEL32(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C78
                                  • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF733F8541C), ref: 00007FF733F85203
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                  • String ID: Eastern Standard Time$Eastern Summer Time
                                  • API String ID: 3458911817-239921721
                                  • Opcode ID: c5508bc63ced89b7e96ce891f343e42cb1356f84bc391250f2f4d752248c7e40
                                  • Instruction ID: 100b4b8b25653b31d6f72f6fc234e454512ecd5e5518659b4da688b163ea494f
                                  • Opcode Fuzzy Hash: c5508bc63ced89b7e96ce891f343e42cb1356f84bc391250f2f4d752248c7e40
                                  • Instruction Fuzzy Hash: 90519132A08643A6E7B4FF21E8815B9E761FB88784FC05135EA4D6B695DF3CE440D760
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirst
                                  • String ID:
                                  • API String ID: 2295610775-0
                                  • Opcode ID: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                  • Instruction ID: f06a048bcc97a945bdbb15d6f174d6b4e69bdd896cf70585fb999ead8d2bd566
                                  • Opcode Fuzzy Hash: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                  • Instruction Fuzzy Hash: AFF0C832A1864796F7F09B60B549766B390AB84328FC40339D96E166D4DF3CD4599B00

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 179 7ff733f618f0-7ff733f6192b call 7ff733f63f70 182 7ff733f61bc1-7ff733f61be5 call 7ff733f6b870 179->182 183 7ff733f61931-7ff733f61971 call 7ff733f676a0 179->183 188 7ff733f61bae-7ff733f61bb1 call 7ff733f6f36c 183->188 189 7ff733f61977-7ff733f61987 call 7ff733f6f9f4 183->189 193 7ff733f61bb6-7ff733f61bbe 188->193 194 7ff733f61989-7ff733f6199c call 7ff733f62760 189->194 195 7ff733f619a1-7ff733f619bd call 7ff733f6f6bc 189->195 193->182 194->188 200 7ff733f619d7-7ff733f619ec call 7ff733f74154 195->200 201 7ff733f619bf-7ff733f619d2 call 7ff733f62760 195->201 206 7ff733f619ee-7ff733f61a01 call 7ff733f62760 200->206 207 7ff733f61a06-7ff733f61a87 call 7ff733f61bf0 * 2 call 7ff733f6f9f4 200->207 201->188 206->188 215 7ff733f61a8c-7ff733f61a9f call 7ff733f74170 207->215 218 7ff733f61ab9-7ff733f61ad2 call 7ff733f6f6bc 215->218 219 7ff733f61aa1-7ff733f61ab4 call 7ff733f62760 215->219 224 7ff733f61aec-7ff733f61b08 call 7ff733f6f430 218->224 225 7ff733f61ad4-7ff733f61ae7 call 7ff733f62760 218->225 219->188 230 7ff733f61b1b-7ff733f61b29 224->230 231 7ff733f61b0a-7ff733f61b16 call 7ff733f625f0 224->231 225->188 230->188 233 7ff733f61b2f-7ff733f61b3e 230->233 231->188 235 7ff733f61b40-7ff733f61b46 233->235 236 7ff733f61b48-7ff733f61b55 235->236 237 7ff733f61b60-7ff733f61b6f 235->237 238 7ff733f61b71-7ff733f61b7a 236->238 237->237 237->238 239 7ff733f61b7c-7ff733f61b7f 238->239 240 7ff733f61b8f 238->240 239->240 241 7ff733f61b81-7ff733f61b84 239->241 242 7ff733f61b91-7ff733f61bac 240->242 241->240 243 7ff733f61b86-7ff733f61b89 241->243 242->188 242->235 243->240 244 7ff733f61b8b-7ff733f61b8d 243->244 244->242
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _fread_nolock$Message
                                  • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                  • API String ID: 677216364-3497178890
                                  • Opcode ID: 35ecb335ea51856d2c4ba3a5b8941be69d2e3f44d34773facc26e79b75a298fb
                                  • Instruction ID: a8d2b55761b153be60d5fd9e00cae964e9dc34fc28c84e06052e6f5d98e3f2a4
                                  • Opcode Fuzzy Hash: 35ecb335ea51856d2c4ba3a5b8941be69d2e3f44d34773facc26e79b75a298fb
                                  • Instruction Fuzzy Hash: CC71E431B08687A5EBB4FB25D4402F9A3A0FF48784FC44135E98D67799EE3CE545AB20

                                  Control-flow Graph

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                  • API String ID: 2030045667-3659356012
                                  • Opcode ID: 6f52e494031d5ca2484d2f9d573e2a1dcf24fa62387402d5cbc9e3bb6a366fed
                                  • Instruction ID: a9997d657fc47e318a52439ed26cc1ad5c55c6e43b0ba9c5330bcdf748d26e63
                                  • Opcode Fuzzy Hash: 6f52e494031d5ca2484d2f9d573e2a1dcf24fa62387402d5cbc9e3bb6a366fed
                                  • Instruction Fuzzy Hash: 7841B421B08643A1EEB4BB15A9505BAE3A0FF447D4FC44032DE9D27B95EF3CE945A710

                                  Control-flow Graph

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                  • API String ID: 2030045667-2813020118
                                  • Opcode ID: e496b0bcba3729b97d06f0e46ecf728c80844e1a155ab2c5c02d584ccd3a7d05
                                  • Instruction ID: 1b43d0ddc1256e16730c599045681265c1a6f3be219be1b9ec5bec275f78db03
                                  • Opcode Fuzzy Hash: e496b0bcba3729b97d06f0e46ecf728c80844e1a155ab2c5c02d584ccd3a7d05
                                  • Instruction Fuzzy Hash: 7351F822A08643A1EAB0BB12A4503BAE251FF85794FC44135ED8E67BD5EF3CE541E720

                                  Control-flow Graph

                                  APIs
                                  • FreeLibrary.KERNEL32(?,?,?,00007FF733F7E3BA,?,?,-00000018,00007FF733F7A063,?,?,?,00007FF733F79F5A,?,?,?,00007FF733F7524E), ref: 00007FF733F7E19C
                                  • GetProcAddress.KERNEL32(?,?,?,00007FF733F7E3BA,?,?,-00000018,00007FF733F7A063,?,?,?,00007FF733F79F5A,?,?,?,00007FF733F7524E), ref: 00007FF733F7E1A8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressFreeLibraryProc
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 3013587201-537541572
                                  • Opcode ID: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                  • Instruction ID: 2e079c796433af1a702f68cdfc3f7262db39fb952d3a8f7453a149568ca971ea
                                  • Opcode Fuzzy Hash: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                  • Instruction Fuzzy Hash: 87412631B19A03A1FAB5AB12AC00675E392BF54BD4FC80136ED1D777A4EE7CE405A320

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 887 7ff733f7ad6c-7ff733f7ad92 888 7ff733f7adad-7ff733f7adb1 887->888 889 7ff733f7ad94-7ff733f7ada8 call 7ff733f743d4 call 7ff733f743f4 887->889 891 7ff733f7b187-7ff733f7b193 call 7ff733f743d4 call 7ff733f743f4 888->891 892 7ff733f7adb7-7ff733f7adbe 888->892 905 7ff733f7b19e 889->905 911 7ff733f7b199 call 7ff733f79bf0 891->911 892->891 894 7ff733f7adc4-7ff733f7adf2 892->894 894->891 897 7ff733f7adf8-7ff733f7adff 894->897 900 7ff733f7ae18-7ff733f7ae1b 897->900 901 7ff733f7ae01-7ff733f7ae13 call 7ff733f743d4 call 7ff733f743f4 897->901 903 7ff733f7b183-7ff733f7b185 900->903 904 7ff733f7ae21-7ff733f7ae27 900->904 901->911 908 7ff733f7b1a1-7ff733f7b1b8 903->908 904->903 909 7ff733f7ae2d-7ff733f7ae30 904->909 905->908 909->901 912 7ff733f7ae32-7ff733f7ae57 909->912 911->905 915 7ff733f7ae8a-7ff733f7ae91 912->915 916 7ff733f7ae59-7ff733f7ae5b 912->916 920 7ff733f7ae66-7ff733f7ae7d call 7ff733f743d4 call 7ff733f743f4 call 7ff733f79bf0 915->920 921 7ff733f7ae93-7ff733f7aebb call 7ff733f7c90c call 7ff733f79c58 * 2 915->921 918 7ff733f7ae5d-7ff733f7ae64 916->918 919 7ff733f7ae82-7ff733f7ae88 916->919 918->919 918->920 923 7ff733f7af08-7ff733f7af1f 919->923 952 7ff733f7b010 920->952 948 7ff733f7aebd-7ff733f7aed3 call 7ff733f743f4 call 7ff733f743d4 921->948 949 7ff733f7aed8-7ff733f7af03 call 7ff733f7b594 921->949 927 7ff733f7af9a-7ff733f7afa4 call 7ff733f82c2c 923->927 928 7ff733f7af21-7ff733f7af29 923->928 940 7ff733f7b02e 927->940 941 7ff733f7afaa-7ff733f7afbf 927->941 928->927 932 7ff733f7af2b-7ff733f7af2d 928->932 932->927 933 7ff733f7af2f-7ff733f7af45 932->933 933->927 937 7ff733f7af47-7ff733f7af53 933->937 937->927 942 7ff733f7af55-7ff733f7af57 937->942 944 7ff733f7b033-7ff733f7b053 ReadFile 940->944 941->940 946 7ff733f7afc1-7ff733f7afd3 GetConsoleMode 941->946 942->927 947 7ff733f7af59-7ff733f7af71 942->947 950 7ff733f7b14d-7ff733f7b156 GetLastError 944->950 951 7ff733f7b059-7ff733f7b061 944->951 946->940 953 7ff733f7afd5-7ff733f7afdd 946->953 947->927 957 7ff733f7af73-7ff733f7af7f 947->957 948->952 949->923 954 7ff733f7b158-7ff733f7b16e call 7ff733f743f4 call 7ff733f743d4 950->954 955 7ff733f7b173-7ff733f7b176 950->955 951->950 959 7ff733f7b067 951->959 956 7ff733f7b013-7ff733f7b01d call 7ff733f79c58 952->956 953->944 961 7ff733f7afdf-7ff733f7b001 ReadConsoleW 953->961 954->952 965 7ff733f7b17c-7ff733f7b17e 955->965 966 7ff733f7b009-7ff733f7b00b call 7ff733f74368 955->966 956->908 957->927 964 7ff733f7af81-7ff733f7af83 957->964 968 7ff733f7b06e-7ff733f7b083 959->968 970 7ff733f7b003 GetLastError 961->970 971 7ff733f7b022-7ff733f7b02c 961->971 964->927 975 7ff733f7af85-7ff733f7af95 964->975 965->956 966->952 968->956 977 7ff733f7b085-7ff733f7b090 968->977 970->966 971->968 975->927 980 7ff733f7b0b7-7ff733f7b0bf 977->980 981 7ff733f7b092-7ff733f7b0ab call 7ff733f7a984 977->981 982 7ff733f7b13b-7ff733f7b148 call 7ff733f7a7c4 980->982 983 7ff733f7b0c1-7ff733f7b0d3 980->983 989 7ff733f7b0b0-7ff733f7b0b2 981->989 982->989 986 7ff733f7b12e-7ff733f7b136 983->986 987 7ff733f7b0d5 983->987 986->956 990 7ff733f7b0da-7ff733f7b0e1 987->990 989->956 992 7ff733f7b11d-7ff733f7b128 990->992 993 7ff733f7b0e3-7ff733f7b0e7 990->993 992->986 994 7ff733f7b0e9-7ff733f7b0f0 993->994 995 7ff733f7b103 993->995 994->995 996 7ff733f7b0f2-7ff733f7b0f6 994->996 997 7ff733f7b109-7ff733f7b119 995->997 996->995 998 7ff733f7b0f8-7ff733f7b101 996->998 997->990 999 7ff733f7b11b 997->999 998->997 999->986
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: 61b7c791dd7b4870e419cd94b23561cebff66563b6152af2ba6a1b175460b8f9
                                  • Instruction ID: fbb662e8dcabc13431d522c6a7f4ace926a0dbcd8f3e28efce4eecbf66b42511
                                  • Opcode Fuzzy Hash: 61b7c791dd7b4870e419cd94b23561cebff66563b6152af2ba6a1b175460b8f9
                                  • Instruction Fuzzy Hash: E1C1E222A0C68761EBF1AB1594002BEB750EF91BC1FD50131FA5E23791CEBDE855A720

                                  Control-flow Graph

                                  APIs
                                  • GetModuleFileNameW.KERNEL32(?,00007FF733F63534), ref: 00007FF733F63411
                                    • Part of subcall function 00007FF733F629E0: GetLastError.KERNEL32(?,?,?,00007FF733F6342E,?,00007FF733F63534), ref: 00007FF733F62A14
                                    • Part of subcall function 00007FF733F629E0: FormatMessageW.KERNEL32(?,?,?,00007FF733F6342E), ref: 00007FF733F62A7D
                                    • Part of subcall function 00007FF733F629E0: MessageBoxW.USER32 ref: 00007FF733F62ACF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message$ErrorFileFormatLastModuleName
                                  • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                  • API String ID: 517058245-2863816727
                                  • Opcode ID: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                  • Instruction ID: 976e5697552e0a8c3d0460734add27d143f8cb50d8b8c5fb292f3c9d70ba34df
                                  • Opcode Fuzzy Hash: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                  • Instruction Fuzzy Hash: CD21A161B0C543B1FAB5BB25E8513B9D2A0BF48395FC00137E65DA65F5EE2CE504E720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _get_daylight$_isindst
                                  • String ID:
                                  • API String ID: 4170891091-0
                                  • Opcode ID: 8f9731ccc05e5e98dab1658fcebd939f282d40e9b6d5561daf5942648b351509
                                  • Instruction ID: c5348b2341eeb3444ebbae126172a1c75fc3766e8b2bc675892d3e941fe9d7d4
                                  • Opcode Fuzzy Hash: 8f9731ccc05e5e98dab1658fcebd939f282d40e9b6d5561daf5942648b351509
                                  • Instruction Fuzzy Hash: 61514632F041139AFB78EF6489416BCB7A1AB2039EFD10536ED1D62AF0DB3CA4019710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$__security_init_cookie
                                  • String ID:
                                  • API String ID: 2222513578-0
                                  • Opcode ID: d32f32be829c345f8424b6e50172c33a4feb856c6a1ec6dc64b44a65f2bf0592
                                  • Instruction ID: 418012163f7a3cd981724629be18cd7ccee20baa14a5b2e89da1990722bda16d
                                  • Opcode Fuzzy Hash: d32f32be829c345f8424b6e50172c33a4feb856c6a1ec6dc64b44a65f2bf0592
                                  • Instruction Fuzzy Hash: BE51C3E0F0E70342FB586775A9661796295AF497A4F164238D86E0FBF7DE2CF8458300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                  • String ID:
                                  • API String ID: 2780335769-0
                                  • Opcode ID: 44011dbc5c196255e5d063134f532b0674048b95aab6dcf0e225215e54208c6d
                                  • Instruction ID: f2b6a6729a2a23c7ae211cae6acc1efe041080d0ea3c94f6e3321bdf08b228ba
                                  • Opcode Fuzzy Hash: 44011dbc5c196255e5d063134f532b0674048b95aab6dcf0e225215e54208c6d
                                  • Instruction Fuzzy Hash: 9951A122A04A4299FBA4EF75D4403BD63A1AB48799FD04034EE4D6B799DF38D881D760
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 1279662727-0
                                  • Opcode ID: c9c3dc0ca6ff3025a18f37416ed5252826b5e2a6b8668c561ba6737191909872
                                  • Instruction ID: cb595081b3302e43052096e4c93030019ab954c5e7e3fbea7b8b271c0722e8c0
                                  • Opcode Fuzzy Hash: c9c3dc0ca6ff3025a18f37416ed5252826b5e2a6b8668c561ba6737191909872
                                  • Instruction Fuzzy Hash: 4A41D622D18B8393F3A4AF209500379B260FB947A5F909334F69C17AD1EF7CA5E09710
                                  APIs
                                    • Part of subcall function 00007FFE0138DCF0: HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FFE013934C9,?,?,?,00007FFE013D39B1,?,?,?,?,00007FFE013978EA,?,?,?), ref: 00007FFE0138DD38
                                  • InitializeCriticalSectionAndSpinCount.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00007FFE0139F39E,?,?,?,?,?,00007FFE0139F0A6), ref: 00007FFE013D5B8C
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,?,00007FFE0139F39E,?,?,?,?,?,00007FFE0139F0A6), ref: 00007FFE013D5BA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressAllocCountCriticalHeapInitializeProcSectionSpin
                                  • String ID: InitializeCriticalSectionEx
                                  • API String ID: 1188775705-3084827643
                                  • Opcode ID: d50c9835e02574957e0a21de02abdf2f731f597d5daf9e2beef02907001a061a
                                  • Instruction ID: f38f5bef380c84e1f011a4284705e65bdb4e1609028e3a1f2c6e7f9bf736cbea
                                  • Opcode Fuzzy Hash: d50c9835e02574957e0a21de02abdf2f731f597d5daf9e2beef02907001a061a
                                  • Instruction Fuzzy Hash: AA41BE22B19B4282EB148B59E85027973A0FB557A4F855335EAAD4B7F4DF3CF81AC700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 3251591375-0
                                  • Opcode ID: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                  • Instruction ID: ebcc8ae1de9e1be13af78bb234ed50a3ab403a435930c4d7ae538728f0915642
                                  • Opcode Fuzzy Hash: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                  • Instruction Fuzzy Hash: 21316D11E0CA4376FAF4BBA594127B993819F41384FC45034E99EBB6E3DF2DA844A631
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                  • Instruction ID: 441531795a00e1440621135173b080aa4ea4a4a3fa96ab675fdc3cc46d00601c
                                  • Opcode Fuzzy Hash: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                  • Instruction Fuzzy Hash: 38D06711F18607A6EAB83B715C5A17992115F5C792FD01438E85F3A3A3CD2CAC096360
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: 304c800bfc18b22a295e41f2f803514c44f0a5a87c6028a89610e4dcef950876
                                  • Instruction ID: 5b6501a3862ed970077b0254ff80342dcd561805b6b06936aec950baf4c08b57
                                  • Opcode Fuzzy Hash: 304c800bfc18b22a295e41f2f803514c44f0a5a87c6028a89610e4dcef950876
                                  • Instruction Fuzzy Hash: 0251E521B0D38366FAB8BE29941067AA391BF44BB4FD44734DD6D677D9CE3CD800A620
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID:
                                  • API String ID: 2976181284-0
                                  • Opcode ID: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                  • Instruction ID: b7871627909b0bd662c007faacb3043c702c00497d9c48e13a1b1d41ed88af61
                                  • Opcode Fuzzy Hash: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                  • Instruction Fuzzy Hash: 1B11C461718B8291DAB0AF25A804179A361AB45BF4FD40331FEBD2B7E9CF7CD4509700
                                  APIs
                                  • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF733F74B49), ref: 00007FF733F74C67
                                  • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF733F74B49), ref: 00007FF733F74C7D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Time$System$FileLocalSpecific
                                  • String ID:
                                  • API String ID: 1707611234-0
                                  • Opcode ID: 5814b874014510fcf00941fef2b2171ed045486f006683dc2ae422325307d6da
                                  • Instruction ID: 2ec0255a4635c5603d33c28ee971de227cd49fcda94e55387b702ed13f1ea78e
                                  • Opcode Fuzzy Hash: 5814b874014510fcf00941fef2b2171ed045486f006683dc2ae422325307d6da
                                  • Instruction Fuzzy Hash: 0A11822160CA1391EAB4AB11A40103EF7A0FB817A6FD00235F6FD559E8EF2CD454EB10
                                  APIs
                                  • CloseHandle.KERNELBASE(?,?,?,00007FF733F79CE5,?,?,00000000,00007FF733F79D9A), ref: 00007FF733F79ED6
                                  • GetLastError.KERNEL32(?,?,?,00007FF733F79CE5,?,?,00000000,00007FF733F79D9A), ref: 00007FF733F79EE0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CloseErrorHandleLast
                                  • String ID:
                                  • API String ID: 918212764-0
                                  • Opcode ID: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                  • Instruction ID: 602db3f9891e3ff6548462b155741a727a1d85acc7ba0a7525285ec73bf74bb5
                                  • Opcode Fuzzy Hash: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                  • Instruction Fuzzy Hash: 8C21C611F2C64361FEF4B764A44077EA2919F847D1FC45235F92E677D1CE6CA485A320
                                  APIs
                                  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000000,00007FFE013934C9,?,?,?,00007FFE013D39B1,?,?,?,?,00007FFE013978EA,?,?,?), ref: 00007FFE0138DD38
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AllocHeap
                                  • String ID:
                                  • API String ID: 4292702814-0
                                  • Opcode ID: 27d2ecc8a82d26b6ee3a94a029cf6d96569e999f53c42dbd91e108040fe652f2
                                  • Instruction ID: abea3c30f1488af86283745bfbf74b4b0adbd25c27584ea14dc13a9e1b272434
                                  • Opcode Fuzzy Hash: 27d2ecc8a82d26b6ee3a94a029cf6d96569e999f53c42dbd91e108040fe652f2
                                  • Instruction Fuzzy Hash: C711A560B1974381FF599F61A8003B99391AF89F90F4A5634E95E4F3F5DF2CE4548710
                                  APIs
                                  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139C80C), ref: 00007FFE0139C9C4
                                  • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139C80C), ref: 00007FFE0139CA19
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave
                                  • String ID:
                                  • API String ID: 3168844106-0
                                  • Opcode ID: 0291edbe3082b304451f4ed1c39b7bd1e6a79d51fcd4033be8e3744c9ea70ef5
                                  • Instruction ID: d3c674c8ce222dfcaa7ab15aed957a41a06336d33b5ebe731b05e1e61a9f880d
                                  • Opcode Fuzzy Hash: 0291edbe3082b304451f4ed1c39b7bd1e6a79d51fcd4033be8e3744c9ea70ef5
                                  • Instruction Fuzzy Hash: 25115E32A09B8286F350CB14E84017A63A4FF45784F561435EA8E9B7F1DF7CE852CB40
                                  APIs
                                  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFE0139C7FD
                                    • Part of subcall function 00007FFE0139C998: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139C80C), ref: 00007FFE0139C9C4
                                    • Part of subcall function 00007FFE0139C998: LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139C80C), ref: 00007FFE0139CA19
                                  • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FFE0139C823
                                    • Part of subcall function 00007FFE0139C93C: GetStartupInfoW.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FFE0139C95C
                                    • Part of subcall function 00007FFE0139C838: GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FFE0139C89A
                                    • Part of subcall function 00007FFE0139C838: GetFileType.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FFE0139C8B0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$FileHandleInfoStartupType
                                  • String ID:
                                  • API String ID: 2762830733-0
                                  • Opcode ID: ec87571a4dd4f9888bb3e403b7d3050c44f51055bcf036c43b695e8927277bbf
                                  • Instruction ID: 90b84df6dc77e7e666f545a60ef1145d49044c5b9a284ab0b50c3ffc3f5fcc17
                                  • Opcode Fuzzy Hash: ec87571a4dd4f9888bb3e403b7d3050c44f51055bcf036c43b695e8927277bbf
                                  • Instruction Fuzzy Hash: F9E01210E0E50286FB14AB70D8A50B953509F69311F813035D84E9E1F1DE5CF48AD714
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                  • Instruction ID: 8e9d17b03a1de68589f742f6754e814a56e1fdc22e0774ab9d0b6e335f68dca4
                                  • Opcode Fuzzy Hash: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                  • Instruction Fuzzy Hash: BF41E532909203A7EAB4AB19A54117DB7A0EB567C2FD40131E68EA36D0CF7CE902D770
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _fread_nolock
                                  • String ID:
                                  • API String ID: 840049012-0
                                  • Opcode ID: a0f762802b007f79df3f5188bfeabeb6c0338d12f38915015ea771c39cfbc038
                                  • Instruction ID: 3e42c8414daa1b80c95ae3d4cfaeab6b80da632adec5416931db4ca08ff7ffd2
                                  • Opcode Fuzzy Hash: a0f762802b007f79df3f5188bfeabeb6c0338d12f38915015ea771c39cfbc038
                                  • Instruction Fuzzy Hash: EB21A321B1965366FAB4BA16A9043BAE641BF45BD4FCC4430FE0D2B786CE7DE045E720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                  • Instruction ID: b7d9474693699b5386815685c14a47a7802aed693088439e22859ca8b07b672e
                                  • Opcode Fuzzy Hash: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                  • Instruction Fuzzy Hash: 3431A321A18A53A2FBE17B59944137DA650AF50BE2FD20235F96D233D2CF7DE481A730
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: HandleModule$AddressFreeLibraryProc
                                  • String ID:
                                  • API String ID: 3947729631-0
                                  • Opcode ID: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                  • Instruction ID: 3e3e913d254885d7e9a0e6db828fed5d98de27a1aa64f3a102e6c8a7be462d71
                                  • Opcode Fuzzy Hash: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                  • Instruction Fuzzy Hash: 6921AE32A157069AEBB4AF64C4412EC73A4FB0475AFD4063AE62C26AD5EF38D444DB60
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                  • Instruction ID: 701348c931bb1ca4f06cf7dbc4b220915017cf00a5c0659eb457b517cfd3df70
                                  • Opcode Fuzzy Hash: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                  • Instruction Fuzzy Hash: 15116321A1D68391FAF0BF51940027EE2A4AF95BC1FD44435FA8C67A96CF7CD441E760
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                  • Instruction ID: eadd2560de96c7cb0acc45c496cd90b3bc7a0cbee17b9b070f12026b5a735f6d
                                  • Opcode Fuzzy Hash: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                  • Instruction Fuzzy Hash: 4621A432A18A8397DBB5AF18D440379B6A1FB84B94FE44234EA5D6B6D9DF3CD400DB10
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: __vcrt_initialize_locks__vcrt_initialize_winapi_thunks
                                  • String ID:
                                  • API String ID: 2444027679-0
                                  • Opcode ID: 267e1e33e985904d0087cc8bc5e2fb633dc7a44b110c5dfb642aea7bba0d9fe0
                                  • Instruction ID: 4552c175ac3fef9495ffa3d1a458a549ea130d0a0fab9e38b8ac54b43c6f2280
                                  • Opcode Fuzzy Hash: 267e1e33e985904d0087cc8bc5e2fb633dc7a44b110c5dfb642aea7bba0d9fe0
                                  • Instruction Fuzzy Hash: 05114861E19B0282FFA19B24E8403BC62A0AF04BA4F5A4635E5AD4E7F5DE6CE841C601
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                  • Instruction ID: 5cf72152970863cdac84408bb0220d16d4a8b2783303b97d539cc6819691d907
                                  • Opcode Fuzzy Hash: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                  • Instruction Fuzzy Hash: 67010821A0874351EAA4FB569900069E695BF45FE0FC84230EE5C23BD6DE3CD0029310
                                  APIs
                                    • Part of subcall function 00007FF733F686B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF733F63FA4,00000000,00007FF733F61925), ref: 00007FF733F686E9
                                  • LoadLibraryExW.KERNELBASE(?,00007FF733F65C06,?,00007FF733F6308E), ref: 00007FF733F681C2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ByteCharLibraryLoadMultiWide
                                  • String ID:
                                  • API String ID: 2592636585-0
                                  • Opcode ID: 637d93bcaba6b3ef3808867d80487fbb7a80e425bc13fea3da321eb74d5281f1
                                  • Instruction ID: bcb2abe9a6e5fd7c4da993a845e5172efcd7a6bd4fc0f5bd02b3a691046f1300
                                  • Opcode Fuzzy Hash: 637d93bcaba6b3ef3808867d80487fbb7a80e425bc13fea3da321eb74d5281f1
                                  • Instruction Fuzzy Hash: F6D0C211F2464691FAA8BB77BA46579D1519F8ABC0FC88034EE6D17B5ADC3CC4904B04
                                  APIs
                                  • HeapAlloc.KERNEL32(?,?,?,00007FF733F6FFB0,?,?,?,00007FF733F7161A,?,?,?,?,?,00007FF733F72E09), ref: 00007FF733F7C94A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AllocHeap
                                  • String ID:
                                  • API String ID: 4292702814-0
                                  • Opcode ID: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                  • Instruction ID: 3139ee93b1c791d27f77db29d9538a196d9c086623d57f5e90e18325b6ee4142
                                  • Opcode Fuzzy Hash: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                  • Instruction Fuzzy Hash: 9EF05800B19247A4FEF876B1681127996A05F88BE2FC80630E86EA62C1DE2CE580A130
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: AppPolicyGetThreadInitializationType$AreFileApisANSI$CompareStringEx$EnumSystemLocalesEx$GetDateFormatEx$GetLocaleInfoEx$GetTimeFormatEx$GetUserDefaultLocaleName$IsValidLocaleName$LCIDToLocaleName$LCMapStringEx$LocaleNameToLCID$RoInitialize
                                  • API String ID: 0-3669283627
                                  • Opcode ID: 0a41683f40b259b1e67c6c9bde6614169f6c19f14045b61a5e850a46e33da5b2
                                  • Instruction ID: 41582cb95aaf1222f356183d8a03a2dc63124bb19ad2f8cb7937fc7137f69919
                                  • Opcode Fuzzy Hash: 0a41683f40b259b1e67c6c9bde6614169f6c19f14045b61a5e850a46e33da5b2
                                  • Instruction Fuzzy Hash: 451243A5B09B0746FF589719F8601B463E2AF597C8F4A543ADC4E8F774EE2CF5488240
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: FlsGetValue$LCMapStringEx
                                  • API String ID: 1452528299-552164261
                                  • Opcode ID: f0d041f4b4fc85b9cdf17ef866bfe8f9e5e967b850e0db7c2084dec861ba1d8c
                                  • Instruction ID: 094500bbbfe91895595864c990eac251e526794e3af296e72907ec455a377c0a
                                  • Opcode Fuzzy Hash: f0d041f4b4fc85b9cdf17ef866bfe8f9e5e967b850e0db7c2084dec861ba1d8c
                                  • Instruction Fuzzy Hash: 25E17066B09B4382EF589B59E8601BC23A1AF49BD8F455436DD4E4F7B5EE7CF8488300
                                  APIs
                                  • FindFirstFileW.KERNEL32(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67A1B
                                  • RemoveDirectoryW.KERNEL32(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67A9E
                                  • DeleteFileW.KERNEL32(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67ABD
                                  • FindNextFileW.KERNEL32(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67ACB
                                  • FindClose.KERNEL32(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67ADC
                                  • RemoveDirectoryW.KERNEL32(?,00007FF733F67EF9,00007FF733F639E6), ref: 00007FF733F67AE5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                                  • String ID: %s\*
                                  • API String ID: 1057558799-766152087
                                  • Opcode ID: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                  • Instruction ID: ba42741f2ca969c2a5e2c75f745a78450b22403dcc208d44858e036b50afe489
                                  • Opcode Fuzzy Hash: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                  • Instruction Fuzzy Hash: 9541A621A0C983A1EAB0BB24E8545B9A360FF94754FC00232E59E676E4DF3DDA4ED710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                  • String ID:
                                  • API String ID: 3140674995-0
                                  • Opcode ID: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                  • Instruction ID: fdf377b78755e2c09ebd229f32d795bb1970d9d5890fe2ce69ef55d67edafe5b
                                  • Opcode Fuzzy Hash: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                  • Instruction Fuzzy Hash: 00312F72609B8296EBB49F60E8407EEB364FB84744F84403ADA4E67B95DF38D548D720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                  • String ID:
                                  • API String ID: 1239891234-0
                                  • Opcode ID: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                  • Instruction ID: 7968258588225b65a02af474f071d059f96aa0888dcb2147850bc239a1a5f7ef
                                  • Opcode Fuzzy Hash: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                  • Instruction Fuzzy Hash: 51318532608B8295E774DF25E8402AEB3A0FB88794FD00135EA9D57B65DF3CD545C710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                  • String ID:
                                  • API String ID: 1239891234-0
                                  • Opcode ID: 267245f3bd38f2c02141a155506c253c2953b48b1ae2e079d631393d28aeaf4b
                                  • Instruction ID: 0fb95ad8b4464a451cf487440063cd2b82dfcadab465957bd23f52061b706bd3
                                  • Opcode Fuzzy Hash: 267245f3bd38f2c02141a155506c253c2953b48b1ae2e079d631393d28aeaf4b
                                  • Instruction Fuzzy Hash: 8E313036614B8286DB609F25E8402EE73A4FB88788F550136DB8D47B65DF7CD555CB00
                                  APIs
                                  • GetLocaleInfoW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,00000002,00007FFE013EFC3E,?,?,?,00000000,?,00000092,?), ref: 00007FFE013EF915
                                  • GetLocaleInfoW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,00000002,00007FFE013EFC3E,?,?,?,00000000,?,00000092,?), ref: 00007FFE013EF959
                                  • GetACP.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,00000002,00007FFE013EFC3E,?,?,?,00000000,?,00000092,?), ref: 00007FFE013EF96F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: 63f68895fa317381e46d59cdb5da771bb10869db7f8227425ff028a80743315c
                                  • Instruction ID: 44e6002e202e26743cddb02401d5f4a8272f010b82a3c70d2fda28dbcfd0d2c3
                                  • Opcode Fuzzy Hash: 63f68895fa317381e46d59cdb5da771bb10869db7f8227425ff028a80743315c
                                  • Instruction Fuzzy Hash: 04215131A0C743A2F7649B11E4805BAA3A9FF65788F554031EACD4B6F8DFACE940C700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite$ConsoleOutput
                                  • String ID:
                                  • API String ID: 1443284424-0
                                  • Opcode ID: 5e1b83992b63a47b5d58ea9a1a8ea21678f5dac8a57e374f4ac3bcdce7b8afee
                                  • Instruction ID: 12d6a33ceaf9156b788a26235c3be8f9f99edc12fd2c508de3deb1c6c4fa951a
                                  • Opcode Fuzzy Hash: 5e1b83992b63a47b5d58ea9a1a8ea21678f5dac8a57e374f4ac3bcdce7b8afee
                                  • Instruction Fuzzy Hash: F2D1FD32B18A918AEB10CF74D4402AD7BB1FB55B98F524135DE4E5BBA9DE3CD84AC300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FileFindFirst_invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 2227656907-0
                                  • Opcode ID: 88c6eeb3815b689bec9e785de6a4435637107cd6a4a104e99c849aa3a7604df1
                                  • Instruction ID: e63895f76e75986c39280f225fa5729acc57a5d89f49807f5b46736d40bd8432
                                  • Opcode Fuzzy Hash: 88c6eeb3815b689bec9e785de6a4435637107cd6a4a104e99c849aa3a7604df1
                                  • Instruction Fuzzy Hash: E9B1B522B1879362EAB4AB2198005BAE390EF45BE4FC45131ED5D3BB95DF3CE441D310
                                  APIs
                                    • Part of subcall function 00007FFE01392FE0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013F2851), ref: 00007FFE01392FEA
                                    • Part of subcall function 00007FFE01392FE0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013F2851), ref: 00007FFE01393030
                                    • Part of subcall function 00007FFE01392FE0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013F2851), ref: 00007FFE01393083
                                  • GetUserDefaultLCID.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,00000000,?,00000092,?), ref: 00007FFE013EFC10
                                  • IsValidCodePage.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,00000000,?,00000092,?), ref: 00007FFE013EFC4B
                                  • IsValidLocale.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,00000000,?,00000092,?), ref: 00007FFE013EFC65
                                  • GetLocaleInfoW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,00000000,?,00000092,?), ref: 00007FFE013EFCB2
                                  • GetLocaleInfoW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,00000000,?,00000092,?), ref: 00007FFE013EFCD1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLastLocale$InfoValid$CodeDefaultPageUser
                                  • String ID:
                                  • API String ID: 1491647067-0
                                  • Opcode ID: 42fa7465111f9485c4452dc4fb25b8dbf29c89794bf053654adb9970e6f8f339
                                  • Instruction ID: ac77044959281b39ce0e2d8da374efebf729a769f0bd9028a26a07d001827a2f
                                  • Opcode Fuzzy Hash: 42fa7465111f9485c4452dc4fb25b8dbf29c89794bf053654adb9970e6f8f339
                                  • Instruction Fuzzy Hash: 70816972B0C74286FB20DB61D4512BD23E8AB54B48F564436CE0D9B3E8EEBCE945C350
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,?,?,00007FFE01381679), ref: 00007FFE0139DCBF
                                  • GetLocaleInfoW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,?,00007FFE01381679), ref: 00007FFE013D5F1E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressInfoLocaleProc
                                  • String ID: GetLocaleInfoEx$IsValidLocaleName
                                  • API String ID: 2353564440-3594675595
                                  • Opcode ID: e34764d3d7dd8039f0e78f5012b24970bdf88d0d388ef93113ccd5e59fef2fb0
                                  • Instruction ID: e4bf0cdb410d9c082edcc45dbc190bdd7f2314ffd3ae3fa1e8672b7847465a82
                                  • Opcode Fuzzy Hash: e34764d3d7dd8039f0e78f5012b24970bdf88d0d388ef93113ccd5e59fef2fb0
                                  • Instruction Fuzzy Hash: 8131E161B19B4282FB048B16B8105B563E0BF64BE4F0A9535ED1D5F7B8EE7CF8058340
                                  APIs
                                  • IsDebuggerPresent.API-MS-WIN-CORE-DEBUG-L1-1-0(?,?,00000000,00007FFE013CA37B,?,?,?,?,00007FFE013CA2D6,?,?,?,?,00007FFE013D0F02), ref: 00007FFE013CA18D
                                  • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FFE013CA37B,?,?,?,?,00007FFE013CA2D6,?,?,?,?,00007FFE013D0F02), ref: 00007FFE013CA1A5
                                  • UnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FFE013CA37B,?,?,?,?,00007FFE013CA2D6,?,?,?,?,00007FFE013D0F02), ref: 00007FFE013CA1AE
                                  • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,00000000,00007FFE013CA37B,?,?,?,?,00007FFE013CA2D6,?,?,?,?,00007FFE013D0F02), ref: 00007FFE013CA1C7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CurrentDebuggerPresentProcess
                                  • String ID:
                                  • API String ID: 2506494423-0
                                  • Opcode ID: fb5ea8104a77d4c5d96bbf16649f5d49e7e3f9ba9a0afdde2dc7b858688ca2b2
                                  • Instruction ID: 0ba22f85699bdb616c4906caacb07aca1c2dbab67426cc493b2184bfb2848baa
                                  • Opcode Fuzzy Hash: fb5ea8104a77d4c5d96bbf16649f5d49e7e3f9ba9a0afdde2dc7b858688ca2b2
                                  • Instruction Fuzzy Hash: D0F0ED61E48A0686FB542B71EC152B47250EF89759F011834D90E4F2B1EFBD64C58B40
                                  APIs
                                  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FFE01381718), ref: 00007FFE013ED30C
                                  • EnumSystemLocalesW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,?,?,?,?,00000000,?,00007FFE01381718), ref: 00007FFE013ED345
                                  • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,00007FFE01381718), ref: 00007FFE013ED366
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterEnumLeaveLocalesSystem
                                  • String ID:
                                  • API String ID: 2886288447-0
                                  • Opcode ID: 11d679e72249f151f03d901951a6cb7bb545d2b024f1541009a6aab9907634a1
                                  • Instruction ID: 66a911c7e351fa45b7e872ff38b9ee030346d1fd594d824ff1ab4a5cdd13bf7a
                                  • Opcode Fuzzy Hash: 11d679e72249f151f03d901951a6cb7bb545d2b024f1541009a6aab9907634a1
                                  • Instruction Fuzzy Hash: E0113932A08B4282EB00CB19F8901A96361FB99B88F845132EA8E87778DF3CE555C300
                                  APIs
                                    • Part of subcall function 00007FFE01392FE0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013F2851), ref: 00007FFE01392FEA
                                    • Part of subcall function 00007FFE01392FE0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013F2851), ref: 00007FFE01393030
                                  • GetPrimaryLen.LIBCMT ref: 00007FFE013EF42D
                                  • EnumSystemLocalesW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,00000040,00007FFE013EFBE3,?,?,?,00000000,?,00000092,?,?,?,00007FFE013D202E), ref: 00007FFE013EF442
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesPrimarySystem
                                  • String ID:
                                  • API String ID: 1794546269-0
                                  • Opcode ID: c48d17922ab1b48582798c1663d4b912c91d103d90995669fa172b71ef107056
                                  • Instruction ID: 116845e50a66263752666205a628be1bf25303239d89bf98cf5ab63cf328c9de
                                  • Opcode Fuzzy Hash: c48d17922ab1b48582798c1663d4b912c91d103d90995669fa172b71ef107056
                                  • Instruction Fuzzy Hash: 8411C263A0C78586EB518F25E4402AD37E1EBA0BA0F558235D6194B3E9DE7CD981CB40
                                  APIs
                                  • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,00000020,00007FFE1334016E,?,?,00000000,00007FFE1333D3C1), ref: 00007FFE133401B9
                                  • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,00000020,00007FFE1334016E,?,?,00000000,00007FFE1333D3C1), ref: 00007FFE133401F7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AllocInfoSystemVirtual
                                  • String ID:
                                  • API String ID: 3440192736-0
                                  • Opcode ID: 94f426eb3a902a8e95c746d34cab3007df66f5496063bb7fa456196b55c00d3f
                                  • Instruction ID: 487e3e9d4f2398b2bd16b5bdd9bc37d87bc94195f949870eb54c5068cd1c532e
                                  • Opcode Fuzzy Hash: 94f426eb3a902a8e95c746d34cab3007df66f5496063bb7fa456196b55c00d3f
                                  • Instruction Fuzzy Hash: 6601A232B08E074BEB188F67B441235A3E1AFA8BA0B444078CA6D57774DE2CE5458704
                                  APIs
                                    • Part of subcall function 00007FFE01392FE0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013F2851), ref: 00007FFE01392FEA
                                    • Part of subcall function 00007FFE01392FE0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013F2851), ref: 00007FFE01393030
                                  • GetPrimaryLen.LIBCMT ref: 00007FFE013EF4BC
                                  • EnumSystemLocalesW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,00000002,00007FFE013EFB62,?,?,?,00000000,?,00000092,?,?,?,00007FFE013D202E), ref: 00007FFE013EF4D4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesPrimarySystem
                                  • String ID:
                                  • API String ID: 1794546269-0
                                  • Opcode ID: 918e33f92e6cfffee02549a009de8ab1d619ca4aa561b61bbce5ed93a2346109
                                  • Instruction ID: 3ace4eaa53f5faaa56f3e8cd1c419144e281d2c1598605ce1c6f95e2846eee8f
                                  • Opcode Fuzzy Hash: 918e33f92e6cfffee02549a009de8ab1d619ca4aa561b61bbce5ed93a2346109
                                  • Instruction Fuzzy Hash: F5F0C863A0C78582EB115B25D44037977D5DBA07A4F168231D63D4B2FACEBC94818B01
                                  APIs
                                    • Part of subcall function 00007FFE01392FE0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013F2851), ref: 00007FFE01392FEA
                                    • Part of subcall function 00007FFE01392FE0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013F2851), ref: 00007FFE01393030
                                  • EnumSystemLocalesW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,00000002,00007FFE013EFC07,?,?,?,00000000,?,00000092,?,?,?,00007FFE013D202E), ref: 00007FFE013EF3A3
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: f0712430c06e6bc3b3a0938eaa0402bd87424cfcfc7a1c73fa6ecc90391848c0
                                  • Instruction ID: e6c87144433a87f1fa844ac70c9c6ec7606bba53a8ad05dff0fad818b7d2a92c
                                  • Opcode Fuzzy Hash: f0712430c06e6bc3b3a0938eaa0402bd87424cfcfc7a1c73fa6ecc90391848c0
                                  • Instruction Fuzzy Hash: A5F0B463A0878441DB104B25E4403A9B7E1EB90BA0F058231D628473F9CEBC84808200
                                  APIs
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F650C0
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F65101
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F65126
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F6514B
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F65173
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F6519B
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F651C3
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F651EB
                                  • GetProcAddress.KERNEL32(?,00007FF733F65C57,?,00007FF733F6308E), ref: 00007FF733F65213
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                  • API String ID: 190572456-2007157414
                                  • Opcode ID: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                  • Instruction ID: d541cbf37c498ec45317d65d8dd11a7dd4b483298579d6d4248c2420812bea8f
                                  • Opcode Fuzzy Hash: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                  • Instruction Fuzzy Hash: 3812666494EF43B1FAF9BB15B8601B4E3A1AF44750BD42536C81E3A760EF7CB548B260
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                  • API String ID: 190572456-3427451314
                                  • Opcode ID: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                  • Instruction ID: 9575ff883b39dffedbdfcf89874e211dea2990049979ca5e5bda6cfbc1f2a196
                                  • Opcode Fuzzy Hash: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                  • Instruction Fuzzy Hash: 3BE1566591DB43B0FAFDBB14A8501B4E3A5AF54750FD81136E81E3A2A4EF3CA548B370
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+Name::operator+=$Decorator::getName$Name::Name::operator=$Name::doPchar$DimensionSigned$DataDecoratedEncodingStringSymbolType
                                  • String ID: `anonymous namespace'$`string'$operator
                                  • API String ID: 2020783597-815891235
                                  • Opcode ID: 3c21f6e1fc1565ac1cfb2fd5206cc140514e7d7df8721337382753e13a86550f
                                  • Instruction ID: cb804564d0ab2acf56f90ec26f90e02efd64a917084aa6322be1ff7ad99b205c
                                  • Opcode Fuzzy Hash: 3c21f6e1fc1565ac1cfb2fd5206cc140514e7d7df8721337382753e13a86550f
                                  • Instruction Fuzzy Hash: BE229CA2F18B6689FB14DB64D8942FD2771BF05788F964036DA0E5B6B9DF2CE446C300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator=$Name::operator+Name::operator+=$Decorator::getNameName::Type$DataName::doPchar
                                  • String ID: volatile$<unknown>$UNKNOWN$__int128$__int16$__int32$__int64$__int8$__w64 $bool$char$char16_t$char32_t$const$double$float$int$long$long $short$signed $unsigned $void$volatile$wchar_t
                                  • API String ID: 1480303775-3737837666
                                  • Opcode ID: 1927567a377c84a443f6970d25b003a49c416ab76026ca8221145af2a49d523a
                                  • Instruction ID: 97016dcb13ad7ec7c6cf6080c794d235043fece2728d8c9b32831ba7e02e1feb
                                  • Opcode Fuzzy Hash: 1927567a377c84a443f6970d25b003a49c416ab76026ca8221145af2a49d523a
                                  • Instruction Fuzzy Hash: 98D139B2E19A5395FB20DBA4D8842BC27B1BF04754F928532DA1E5F6B9DF7CE9448300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Decorator::get$Name::operator+=$DimensionSigned$Name$Name::operator+$DecoratedName::$DataName::doName::getPcharStringType
                                  • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-
                                  • API String ID: 283215372-4167119577
                                  • Opcode ID: 12bb7d13e92f06a6bf447f779c0ee1e92f81f505711a6c6b54402271d41620aa
                                  • Instruction ID: cf2974ae74423237a2a1f174fa3f25f75d076fdd4fd8dff8a3d26abfd3a7207f
                                  • Opcode Fuzzy Hash: 12bb7d13e92f06a6bf447f779c0ee1e92f81f505711a6c6b54402271d41620aa
                                  • Instruction Fuzzy Hash: 17B16A62F0D64289FB109B64D4952FC37A2AF55748F960036DE0D1BABADE7CE50AC700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+$Name::operator+=Name::operator=
                                  • String ID: volatile$<unknown>$UNKNOWN$__int128$__int16$__int32$__int64$__int8$__w64 $bool$char$char16_t$char32_t$const$double$float$int$long$long $short$signed $unsigned $void$volatile$wchar_t
                                  • API String ID: 2985695045-3737837666
                                  • Opcode ID: bf7e98c3344c0179c6ddaaa74246d4408eef3205f29f3d89c83678baefc845d4
                                  • Instruction ID: a1b2f7bf0715dc5681af3af7ecfb8b71bf5916f547fc3164143a283b72b06e75
                                  • Opcode Fuzzy Hash: bf7e98c3344c0179c6ddaaa74246d4408eef3205f29f3d89c83678baefc845d4
                                  • Instruction Fuzzy Hash: 9DD16DE6F18E1295FB14EBA6D8801BC2360BB05B64F5048F3DA0D966B6EF3CE565D301
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+$Name::operator+=$Name::operator=$Decorator::getNameSymbol
                                  • String ID: `anonymous namespace'$`string'$operator
                                  • API String ID: 1939614110-815891235
                                  • Opcode ID: 0a418c01cc5cb1d78d8ecc88b58af45e4c8bff701549ed15115c360b0e5e7569
                                  • Instruction ID: 090ac2a48bfb6f78d04e64db6a1c94c7c570f84445193f368fb3f2e682a46f7c
                                  • Opcode Fuzzy Hash: 0a418c01cc5cb1d78d8ecc88b58af45e4c8bff701549ed15115c360b0e5e7569
                                  • Instruction Fuzzy Hash: 823271A2F18E5288FB10EB66D8901FC2771BB44FA8F5440F3DA0D57AA9DF38A465C741
                                  APIs
                                    • Part of subcall function 00007FFE1A45BDE4: RtlLookupFunctionEntry.KERNEL32(?,?,?,?,?,?,?,00007FFE1A45204C), ref: 00007FFE1A45BEB9
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A452118
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A452134
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A452149
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A452166
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A45219C
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A4521AD
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A4521C5
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A4521DA
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A452205
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A45220C
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A45239A
                                  • CatchIt.LIBVCRUNTIME ref: 00007FFE1A4523D9
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A4523F0
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A4523F7
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A4523FE
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A452405
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A452469
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A45247D
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A452494
                                  • _UnwindNestedFrames.LIBVCRUNTIME ref: 00007FFE1A4524EE
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A4524FD
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A45252C
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A45253A
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFE1A452541
                                    • Part of subcall function 00007FFE1A4528B0: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A4528E6
                                    • Part of subcall function 00007FFE1A4528B0: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452919
                                    • Part of subcall function 00007FFE1A4528B0: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452958
                                    • Part of subcall function 00007FFE1A4528B0: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452979
                                    • Part of subcall function 00007FFE1A4528B0: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A45299C
                                    • Part of subcall function 00007FFE1A4528B0: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A4529BA
                                  • std::bad_alloc::bad_alloc.LIBCMT ref: 00007FFE1A452571
                                  • _CxxThrowException.LIBVCRUNTIME ref: 00007FFE1A452581
                                    • Part of subcall function 00007FFE1A454620: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFE1A452586), ref: 00007FFE1A45469D
                                    • Part of subcall function 00007FFE1A454620: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFE1A452586), ref: 00007FFE1A4546DC
                                    • Part of subcall function 00007FFE1A454380: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFE1A451CA0), ref: 00007FFE1A4543BA
                                    • Part of subcall function 00007FFE1A454380: strcpy_s.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFE1A451CA0), ref: 00007FFE1A4543D2
                                    • Part of subcall function 00007FFE1A454380: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FFE1A451CA0), ref: 00007FFE1A4543E8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$terminate$Exception$CatchEntryFileFramesFunctionHeaderLookupNestedRaiseThrowUnwindfreemallocstd::bad_alloc::bad_allocstrcpy_s
                                  • String ID: csm$csm$csm
                                  • API String ID: 3386888594-393685449
                                  • Opcode ID: 3626c349750869fe565dd3b9c9181262c1049519526de4ccc4dcac70c7db7e4f
                                  • Instruction ID: 9add6bf19cdca5f3a82deb96860472519b33feb081ffd22ca242a29794a1943b
                                  • Opcode Fuzzy Hash: 3626c349750869fe565dd3b9c9181262c1049519526de4ccc4dcac70c7db7e4f
                                  • Instruction Fuzzy Hash: 93028EB2B09E4286EA24AF62944427D27A4FF45F68F1440F7EE4D077A6CF3CE465C640
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+$Decorator::get$DataIndirectNameName::Name::doName::operator+=PcharScopeType
                                  • String ID:
                                  • API String ID: 3173522582-0
                                  • Opcode ID: 5d5f78a55cbb505edb1646c940a8ce2b9e8aeb4b195174f4d175174c9cb5d7f9
                                  • Instruction ID: b041af529dcd5bf614ee18b0f5225d3d1e69db342d28d894715ea611688cf8d4
                                  • Opcode Fuzzy Hash: 5d5f78a55cbb505edb1646c940a8ce2b9e8aeb4b195174f4d175174c9cb5d7f9
                                  • Instruction Fuzzy Hash: 37F15676B08A829AEB11DF64E4801ED77B1FB0474CB458036EA4D6BAA9DF3CE559C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Dealloc$FromLong_$Err_Void$Object_StringUnraisableWrite$ArgsAttrBlockCallFunctionImportImport_InternLongModuleOccurredUnicode_
                                  • String ID: DllGetClassObject$_ctypes.DllGetClassObject$ctypes
                                  • API String ID: 3128317949-177550262
                                  • Opcode ID: 99bdcf459ac8af5bcc7a0db9776d141a5a270aa91500dbaaf312ce4d3d78e8c4
                                  • Instruction ID: d0dbf458581709e0ec4ef649f46f20f6e61c9a529040df8b605a8a624c30212b
                                  • Opcode Fuzzy Hash: 99bdcf459ac8af5bcc7a0db9776d141a5a270aa91500dbaaf312ce4d3d78e8c4
                                  • Instruction Fuzzy Hash: 45510E31F49F428AEE549F23A958239A3A0AF65FB1F0841B4CD2E67774DF7DA4458308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_$DeallocString$FormatItemSubtypeTuple_Type_
                                  • String ID: COM method call without VTable$Expected a COM this pointer as first argument$NULL COM pointer access$native com method call without 'this' parameter$this function takes %d argument%s (%d given)$this function takes at least %d argument%s (%d given)
                                  • API String ID: 3243083996-1981512665
                                  • Opcode ID: dacd0b13c9e80698b11dd7f487c8c4109035449e1944ff7af2743ef586600601
                                  • Instruction ID: 0e682bd8a7fa4ec1898fce01644051318c32711615a37026b277ab725959d41c
                                  • Opcode Fuzzy Hash: dacd0b13c9e80698b11dd7f487c8c4109035449e1944ff7af2743ef586600601
                                  • Instruction Fuzzy Hash: 12C19E32A09F4289EA54CB179444279A7A0FFA4FB4F048475EA6E6B774DF3CE449C708
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_$Dealloc$String$Arg_Eval_FormatParseSizeThreadTuple_$AddressAttrAuditLong_Object_OccurredProcRestoreSaveSequence_Sys_TupleVoid
                                  • String ID: O&O;illegal func_spec argument$O|O$_handle$could not convert the _handle attribute to a pointer$ctypes.dlsym$function '%s' not found$function ordinal %d not found$the _handle attribute of the second argument must be an integer
                                  • API String ID: 247295482-1088195083
                                  • Opcode ID: c6efa2341e803b1a4695140a97f4be8c3672992cc7647cd23768f9356f60b82d
                                  • Instruction ID: 0fa9dac25bb64aeaadb97bcfbc6b344d95ae5db47d2c1cb302ba25f77edda5eb
                                  • Opcode Fuzzy Hash: c6efa2341e803b1a4695140a97f4be8c3672992cc7647cd23768f9356f60b82d
                                  • Instruction Fuzzy Hash: 9071F821F09E4689EB558F67D8501B863A0BF64FA4B4485B1DA2EA67B8DF3CE445C308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$ErrorLast$FileHeaderValue_calloc_base_free_base
                                  • String ID: ?AVbad_exception@std@@$MOC$RCC$csm$csm
                                  • API String ID: 2425072861-1914178954
                                  • Opcode ID: 5ddc374ad099d947232a7d8a7f0c32787dabcb296a25caccbb93ce29c81494a5
                                  • Instruction ID: 6525f2e064450151b8bb358490884b1e76ac447936b8e41bed68300d7087aa83
                                  • Opcode Fuzzy Hash: 5ddc374ad099d947232a7d8a7f0c32787dabcb296a25caccbb93ce29c81494a5
                                  • Instruction Fuzzy Hash: 74A177F6F09E4682EA64AB62906527827A0FF48F64F0454F7DA4D427A6DF3CF461C601
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Dealloc$Err_$Mem_$FormatFree$AttrItemMallocMemoryObject_Sequence_StringUnicode_
                                  • String ID: %s:%s:$UO|i$bit fields not allowed for type %s$number of bits invalid for bit field
                                  • API String ID: 3175293119-1978056028
                                  • Opcode ID: bc37b6ce8a5a7c313a365d20831b984a8754113c41a18f45fcca063f25ce9297
                                  • Instruction ID: f85aa18f93963009133524d8ad38ebb86cc7fbd6f07442f093a98bc24f043bca
                                  • Opcode Fuzzy Hash: bc37b6ce8a5a7c313a365d20831b984a8754113c41a18f45fcca063f25ce9297
                                  • Instruction Fuzzy Hash: FE914931B09F4289EB51CB26E4442A9A7A0FB64BB4F548275EA6D63BB4DF3CD444C304
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$terminate
                                  • String ID: csm$csm
                                  • API String ID: 579254285-3733052814
                                  • Opcode ID: fe75575324e898bddb0e030716503548cf80929cbfae6fbe91e7efb773c12368
                                  • Instruction ID: 97ee4bd1d0da0ebe54499ba29c03d16d33c34a1736b72599fcc6c0c271d6cd5d
                                  • Opcode Fuzzy Hash: fe75575324e898bddb0e030716503548cf80929cbfae6fbe91e7efb773c12368
                                  • Instruction Fuzzy Hash: 1E5119F5F09F4691EA68BB67805513826B5AF98F35F0405FBD91D027B2DE6CF8308611
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+$Name::operator+=Replicator::operator[]
                                  • String ID: `anonymous namespace'
                                  • API String ID: 2709820770-3062148218
                                  • Opcode ID: 82e5f84ef63da0c09f1d45ac61254de523a11a8ca8f628e7ef5fa0c4bf2e3efc
                                  • Instruction ID: 84d57797feb03f50db30ac0db91f611bb8d6cb9e9eaf827b2327d51bb0c39d32
                                  • Opcode Fuzzy Hash: 82e5f84ef63da0c09f1d45ac61254de523a11a8ca8f628e7ef5fa0c4bf2e3efc
                                  • Instruction Fuzzy Hash: D2E13BB2A08B8699EB10EF66E4801FD77A0FB44B54F4440B7EA4D17A69DF38E564C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Capsule_$Dict_Err_ItemMem_String$DeallocDictErrorFreeFromInternMallocOccurredPointerState_ThreadUnicode_ValidWith
                                  • String ID: _ctypes pymem$cannot get thread state$ctypes.error_object$ctypes.error_object is an invalid capsule
                                  • API String ID: 830874875-3474121714
                                  • Opcode ID: 2bb1a87e73bca4652e838fac4122f7796e303849dce0c89fd1d2022574556888
                                  • Instruction ID: 406fdad5a0e1fdfb61ffe09ad6e0b5961e99495b9f20fcc66739c384f226b554
                                  • Opcode Fuzzy Hash: 2bb1a87e73bca4652e838fac4122f7796e303849dce0c89fd1d2022574556888
                                  • Instruction Fuzzy Hash: 15310764F0AF02C9EA548B23B85817877A0AF69FB5B4494B5C92E62774EF3CE4548308
                                  APIs
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452608
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A45262B
                                  • EncodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452634
                                  • CatchIt.LIBVCRUNTIME ref: 00007FFE1A452837
                                    • Part of subcall function 00007FFE1A452C84: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A452CF1
                                    • Part of subcall function 00007FFE1A452C84: _UnwindNestedFrames.LIBVCRUNTIME ref: 00007FFE1A452D34
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452867
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A45286E
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452875
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A45287C
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452883
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A45288A
                                    • Part of subcall function 00007FFE1A4548F4: GetLastError.KERNEL32(?,?,?,00007FFE1A451831), ref: 00007FFE1A454918
                                    • Part of subcall function 00007FFE1A4548F4: SetLastError.KERNEL32(?,?,?,00007FFE1A451831), ref: 00007FFE1A4549C0
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452891
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452898
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A45289F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$ErrorLast$CatchEncodeFramesNestedPointerUnwindterminate
                                  • String ID: MOC$RCC
                                  • API String ID: 2140352205-2084237596
                                  • Opcode ID: d1b7c608141e651fae73115cad78fec1ac335fdd7b28dfb3f62e3715bf8cc4f2
                                  • Instruction ID: 66f1099b5457b023d2dc38e21eb1ff3744bda85545593cf2bdf231591856fd6b
                                  • Opcode Fuzzy Hash: d1b7c608141e651fae73115cad78fec1ac335fdd7b28dfb3f62e3715bf8cc4f2
                                  • Instruction Fuzzy Hash: 83818CB2B08E8695EA28AB56D4803796761FF94F68F0485F7DA4D037A5CF3CE125C710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+Name::operator+=
                                  • String ID:
                                  • API String ID: 382699925-0
                                  • Opcode ID: d14701550f813a1b5f0a6813c5cfc38f9d7d7c563afc0a5d8f31b01ef8bfca20
                                  • Instruction ID: f15236641cb2d8c6ab9da89cf5d5b7eef3fd4ca7b9506b92e3496626144b982e
                                  • Opcode Fuzzy Hash: d14701550f813a1b5f0a6813c5cfc38f9d7d7c563afc0a5d8f31b01ef8bfca20
                                  • Instruction Fuzzy Hash: 38127BB6F08A869AEB10EF66D4401FC37B0EB45B58B4044F7DA4D57BAADE38D529C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+Name::operator+=$atol
                                  • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-${
                                  • API String ID: 2344370515-4023094362
                                  • Opcode ID: 3ccc18cc20a8de763716fe189613d3dfe9f7631dc5b97b57d434d142ef750345
                                  • Instruction ID: b53bc4be1c4e59470e830fc75227f756eed8346d200ea28713c9354a85e17ca6
                                  • Opcode Fuzzy Hash: 3ccc18cc20a8de763716fe189613d3dfe9f7631dc5b97b57d434d142ef750345
                                  • Instruction Fuzzy Hash: CDB1A0A2B0DE4294FA20EB62E0401FD67A1AF54F64F9404F7DA4E12AB5DF3CE566C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Decorator::getNameReplicator::operator+=Template
                                  • String ID: generic-type-$template-parameter-
                                  • API String ID: 2731555906-13229604
                                  • Opcode ID: 396f79b88366afe23f1aff7c6d7c11bf4edeca51deac59b79e7b12377a9b3622
                                  • Instruction ID: 9ba05f4c7033a28d823d24f1e928885bb7cb5ca033a98c4b68508026c1f7d4c4
                                  • Opcode Fuzzy Hash: 396f79b88366afe23f1aff7c6d7c11bf4edeca51deac59b79e7b12377a9b3622
                                  • Instruction Fuzzy Hash: 7A91AD62B19B8699FB11CB65E8502FD37B2AB85B88F410072DA4D5B7B5DF3CEA05C300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AttrObject_String$Arg_Dealloc$KeywordsParseSequence_SizeSliceTuple_
                                  • String ID: OOO:COMError$args$details$hresult$text
                                  • API String ID: 4238450639-2065934886
                                  • Opcode ID: 0e33fc63f16e8cff2f69fe795086b1cf5b86fb5825d0457c417604a486835943
                                  • Instruction ID: 9b6f98d5adf357199f6593aa0edf33756a3cef2b35bcb33e81981f4ccdfa0266
                                  • Opcode Fuzzy Hash: 0e33fc63f16e8cff2f69fe795086b1cf5b86fb5825d0457c417604a486835943
                                  • Instruction Fuzzy Hash: 6C314961B08F428AEF008F27A8401A96360FFA5FE5F048075DE2E67674DE6CE545C348
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684008902.00007FFE148E1000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FFE148E0000, based on PE: true
                                  • Associated: 00000001.00000002.1683990716.00007FFE148E0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000001.00000002.1684065854.00007FFE148E6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000001.00000002.1684085393.00007FFE148E9000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe148e0000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Initialize__scrt_acquire_startup_lock__scrt_fastfail__scrt_release_startup_lock$__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_initialize_default_local_stdio_options__scrt_is_nonwritable_in_current_image__scrt_uninitialize_crt
                                  • String ID:
                                  • API String ID: 627783611-0
                                  • Opcode ID: 0daaf410fab2e492ea3c3aefe6d952281a319b58a6fc51e626949263605bcbaf
                                  • Instruction ID: 8242b6ffb52c2b041acaba5b7429b3d1d40825ab40f5be979ba822f0048e584f
                                  • Opcode Fuzzy Hash: 0daaf410fab2e492ea3c3aefe6d952281a319b58a6fc51e626949263605bcbaf
                                  • Instruction Fuzzy Hash: DE91A020E1CE4785FA51AB6B98C0279E290AF47BA4F4440B5FA4D777B6DE3CE84D8700
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                  • API String ID: 2030045667-1550345328
                                  • Opcode ID: 255b8301470d2c09814697fd1abaf8d0a44c74aa93bf6ce883ab7e72569204a6
                                  • Instruction ID: 77d7af44cc823f2da87c29d51b630c651658d860286cd1fc53bd906e64ca019d
                                  • Opcode Fuzzy Hash: 255b8301470d2c09814697fd1abaf8d0a44c74aa93bf6ce883ab7e72569204a6
                                  • Instruction Fuzzy Hash: D651D121B08643B2EAB4BB11E9101B9A3A0BF44794FC44131ED5C2B7A6EF3CE945B720
                                  APIs
                                    • Part of subcall function 00007FF733F686B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF733F63FA4,00000000,00007FF733F61925), ref: 00007FF733F686E9
                                  • ExpandEnvironmentStringsW.KERNEL32(?,00007FF733F67C97,?,?,FFFFFFFF,00007FF733F63834), ref: 00007FF733F6782C
                                    • Part of subcall function 00007FF733F626C0: MessageBoxW.USER32 ref: 00007FF733F62736
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                  • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                                  • API String ID: 1662231829-930877121
                                  • Opcode ID: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                  • Instruction ID: 688a45f93d64741bf09f5e0a04090a71da137e557c4cc2da0fb5e51ad85254c9
                                  • Opcode Fuzzy Hash: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                  • Instruction Fuzzy Hash: B541D521B2C643B0FAF4BB25D9516B9E3A1AF84784FD01431F54E766A5EE2CE508A720
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_$String$Arg_Buffer_ContiguousDeallocFormatFromMemoryObjectParseSizeTuple_View_
                                  • String ID: Buffer size too small (%zd instead of at least %zd bytes)$O|n:from_buffer$abstract class$offset cannot be negative$underlying buffer is not C contiguous$underlying buffer is not writable
                                  • API String ID: 3855407247-993325174
                                  • Opcode ID: 42e492d205ad7dd4c6f6c7cf540caaa1e8787fca46433464cb0af44fa82531f9
                                  • Instruction ID: 9b816cf33a30a136c5b02d267dd777f081f88c7487e507f5dc731ddb2607aa33
                                  • Opcode Fuzzy Hash: 42e492d205ad7dd4c6f6c7cf540caaa1e8787fca46433464cb0af44fa82531f9
                                  • Instruction Fuzzy Hash: F1415221F0DE42C9EA549B27D8502B8A360AFA5FF5F4481B1D93DA76B4DE3CE844C308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_Eval_FromThread$Arg_AuditErrorFormatLastLibraryLoadLong_ParseRestoreSaveSys_TupleUnicodeUnicode_VoidWindows
                                  • String ID: Could not find module '%.500S'. Try using the full path with constructor syntax.$U|i:LoadLibrary$ctypes.dlopen
                                  • API String ID: 3052933754-3881442430
                                  • Opcode ID: b40d6f49d5e738a373c4095ccb546efa75c5e8c24845934a071df0328de69760
                                  • Instruction ID: f1d7aaae8fa3040fcf058b23ab56532d41dc2fe97026d5b793e131801b505be3
                                  • Opcode Fuzzy Hash: b40d6f49d5e738a373c4095ccb546efa75c5e8c24845934a071df0328de69760
                                  • Instruction Fuzzy Hash: A3212C25F09F4389EB148B57E84417867A0EF69FE1B0440B5CA2E63774DF2CE485C748
                                  APIs
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452A7C
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452AB5
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452AED
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452B16
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452B38
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452B4C
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452B86
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452BA8
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452BBC
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452BF1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort
                                  • String ID:
                                  • API String ID: 4206212132-0
                                  • Opcode ID: fead68839a78518182c3d658b19b0aea22ffa5b8ddac6850a95f5d947da0cf14
                                  • Instruction ID: a092b97a8bd14391b3c064c9439ba8e6855c2af56ab05ebc786b34348e734363
                                  • Opcode Fuzzy Hash: fead68839a78518182c3d658b19b0aea22ffa5b8ddac6850a95f5d947da0cf14
                                  • Instruction Fuzzy Hash: 4A516AB5F09F4292EA25BF5295852386360BF98F65F0049F7EE1D027B2DF3CE4628611
                                  APIs
                                  • PySequence_Size.PYTHON38(?,?,?,?,?,00007FFE1333748C), ref: 00007FFE1333D39B
                                    • Part of subcall function 00007FFE1333C97C: _PyObject_GC_NewVar.PYTHON38(?,?,?,00007FFE1333D3AC,?,?,?,?,?,00007FFE1333748C), ref: 00007FFE1333C993
                                    • Part of subcall function 00007FFE1333C97C: memset.VCRUNTIME140(?,?,?,00007FFE1333D3AC,?,?,?,?,?,00007FFE1333748C), ref: 00007FFE1333C9B5
                                    • Part of subcall function 00007FFE1333C97C: memset.VCRUNTIME140 ref: 00007FFE1333C9EA
                                    • Part of subcall function 00007FFE1333C97C: PyObject_GC_Track.PYTHON38 ref: 00007FFE1333C9F2
                                  • PyErr_NoMemory.PYTHON38(?,?,?,?,?,00007FFE1333748C), ref: 00007FFE1333D3CA
                                  • PySequence_GetItem.PYTHON38(?,?,?,?,?,00007FFE1333748C), ref: 00007FFE1333D3E9
                                  • _Py_Dealloc.PYTHON38(?,?,?,?,?,00007FFE1333748C), ref: 00007FFE1333D40F
                                  • ffi_prep_cif.LIBFFI-7 ref: 00007FFE1333D48D
                                  • PyErr_Format.PYTHON38 ref: 00007FFE1333D4AB
                                  • _Py_Dealloc.PYTHON38 ref: 00007FFE1333D514
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: DeallocErr_Object_Sequence_memset$FormatItemMemorySizeTrackffi_prep_cif
                                  • String ID: ffi_prep_cif failed with %d$ffi_prep_closure failed with %d$invalid result type for callback function
                                  • API String ID: 3883550313-3338905684
                                  • Opcode ID: 76b5466474ba48a2bb1c16240e8aff6746a86e2f47daa98a88a6211b61984917
                                  • Instruction ID: 76e1f659d46089f19da3ac2e2edeb83300be33c9e4c3a500a3f73adb574fca94
                                  • Opcode Fuzzy Hash: 76b5466474ba48a2bb1c16240e8aff6746a86e2f47daa98a88a6211b61984917
                                  • Instruction Fuzzy Hash: F4511722A09F4289EB159F27A844178A3A0FF65FA8F0481B5DD6E67774DF3CE445C348
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Dealloc$AttrObject_$FastLookupSequence_
                                  • String ID: '%U' is specified in _anonymous_ but not in _fields_$_anonymous_ must be a sequence
                                  • API String ID: 1391743325-2678605723
                                  • Opcode ID: 12dcecb767fa8d9d3a04c041334e511a40fffd52d739d7fcfaaa13542d8efb93
                                  • Instruction ID: 7e2909b0d8fc506dfc97294f315879d0ccbd2676e8dd1a29c6056728ef9d140c
                                  • Opcode Fuzzy Hash: 12dcecb767fa8d9d3a04c041334e511a40fffd52d739d7fcfaaa13542d8efb93
                                  • Instruction Fuzzy Hash: 05413031E08E42C9EB548B27E940278A7A0FF65FB4F0481B5DA2EA6674DF3DE4558308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ExceptionThrow$FileHeaderstd::bad_alloc::bad_alloc
                                  • String ID: Access violation - no RTTI data!$Bad read pointer - no RTTI data!
                                  • API String ID: 63457273-1829174677
                                  • Opcode ID: 48d942c1111f90c57d4d77f2c68cd7c094e12fa67c9e4fed7b0efa5bcd1c6e13
                                  • Instruction ID: be5ed04c9dd6e84c0278c6e550bb465309ed0b5cbd9a8cd746b541bbf5b7ea49
                                  • Opcode Fuzzy Hash: 48d942c1111f90c57d4d77f2c68cd7c094e12fa67c9e4fed7b0efa5bcd1c6e13
                                  • Instruction Fuzzy Hash: 2E6182A2B18E4691EB60EF12E4902B963A0FB44FA5F4040F6EA4E47775DF3CE565C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_$Number_OccurredSsize_tString
                                  • String ID: Array does not support item deletion$Can only assign sequence of same size$indices must be integer
                                  • API String ID: 3815977620-3643249925
                                  • Opcode ID: 6b6318933739b3b075ee83dfb703e90efbd664ea45f1749ba5fa0166e0716b41
                                  • Instruction ID: c27114c854c98ba63d1bd7f6426d4397f630b80e9531f4e5a99d35c5b16bb687
                                  • Opcode Fuzzy Hash: 6b6318933739b3b075ee83dfb703e90efbd664ea45f1749ba5fa0166e0716b41
                                  • Instruction Fuzzy Hash: 20416C66B09E42C9EA548F57D8402B5A361FF68FF8F0481B1DD2D6B6B4EE3CE4458308
                                  APIs
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FFE1A4532A3,?,?,?,00007FFE1A452CE7), ref: 00007FFE1A45307A
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FFE1A4532A3,?,?,?,00007FFE1A452CE7), ref: 00007FFE1A4530AD
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FFE1A4532A3,?,?,?,00007FFE1A452CE7), ref: 00007FFE1A45311A
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FFE1A4532A3,?,?,?,00007FFE1A452CE7), ref: 00007FFE1A453138
                                  • __AdjustPointer.LIBCMT ref: 00007FFE1A453179
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FFE1A4532A3,?,?,?,00007FFE1A452CE7), ref: 00007FFE1A453186
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FFE1A4532A3,?,?,?,00007FFE1A452CE7), ref: 00007FFE1A45319F
                                  • __AdjustPointer.LIBCMT ref: 00007FFE1A4531D3
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FFE1A4532A3,?,?,?,00007FFE1A452CE7), ref: 00007FFE1A4531E8
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FFE1A4532A3,?,?,?,00007FFE1A452CE7), ref: 00007FFE1A45320A
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FFE1A4532A3,?,?,?,00007FFE1A452CE7), ref: 00007FFE1A453239
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FFE1A4532A3,?,?,?,00007FFE1A452CE7), ref: 00007FFE1A453240
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: terminate$abort$AdjustPointer
                                  • String ID:
                                  • API String ID: 1115439649-0
                                  • Opcode ID: f64bbe57d7db26001b8bcd52496f9bf51d695d9bf4131af8b6190256aa5124b1
                                  • Instruction ID: 5d87bba6e1abf5faa6a474170ebd48cb9107471d5c99a46de3896703ed1abd3e
                                  • Opcode Fuzzy Hash: f64bbe57d7db26001b8bcd52496f9bf51d695d9bf4131af8b6190256aa5124b1
                                  • Instruction Fuzzy Hash: EF6150B1F0AF8281FE25BB57946423863A4AF44FA1F0944FBDA5D077A5DE2CF8618311
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Replicator::operator[]
                                  • String ID: generic-type-$template-parameter-
                                  • API String ID: 3676697650-13229604
                                  • Opcode ID: 15e139576b22ffe1c75b7196b9f80b59ed6480602684051e6bae135f77d95c58
                                  • Instruction ID: 4e9290b6f66b6355cc6a6f941c6d8ae060fd740349d41474c85669f9d03f1ba3
                                  • Opcode Fuzzy Hash: 15e139576b22ffe1c75b7196b9f80b59ed6480602684051e6bae135f77d95c58
                                  • Instruction Fuzzy Hash: 4D917AA2B08E8299EB14EB72D4505BC37B1AB44BA8F8400F7DE4D977A5DE3CD426C741
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Dealloc$Unicode_$CallConcatDict_FromInternObjectObject_StringTuple_Update
                                  • String ID: _be
                                  • API String ID: 1673887913-4071763053
                                  • Opcode ID: 35f446f5b6b1b956f4fd8af42bf33edcf66db14131a12e619c936b27e730e859
                                  • Instruction ID: f6f56451d0982315bf18e9d45745b1b8a7a935717a49e1383f00e37f438aba67
                                  • Opcode Fuzzy Hash: 35f446f5b6b1b956f4fd8af42bf33edcf66db14131a12e619c936b27e730e859
                                  • Instruction Fuzzy Hash: 1E513C72E09F4689DB559F26D850238B3A5FB68FA0B088175CE6D23764DF7CE490C344
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                  • String ID: P%
                                  • API String ID: 2147705588-2959514604
                                  • Opcode ID: 028f263e58f42d33d872b22938efc015f71aa7b4c996476cfe5add7d8b08dd36
                                  • Instruction ID: b27c0c9c1a2cf7cfde1d73e663e12067b6d25d5be4d6bb937c693641e8d0e979
                                  • Opcode Fuzzy Hash: 028f263e58f42d33d872b22938efc015f71aa7b4c996476cfe5add7d8b08dd36
                                  • Instruction Fuzzy Hash: 5B513726608BA286D6789F22A4085BAF7A1F798B61F404131EBDE53791DF3CD045DB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+Name::operator+=Name::operator=
                                  • String ID: class $coclass $cointerface $enum $struct $union $unknown ecsu'
                                  • API String ID: 2521687178-3025788322
                                  • Opcode ID: a02d682005c4f8f87c802cf0d30af9cc80522cc67ca91cea7a7b89970b19caa2
                                  • Instruction ID: ff2d860eb3ce8247a8b5c2c01feafbc71b2ae04b8fc4e4e2f38130c28b38d0ff
                                  • Opcode Fuzzy Hash: a02d682005c4f8f87c802cf0d30af9cc80522cc67ca91cea7a7b89970b19caa2
                                  • Instruction Fuzzy Hash: 8A4124B6F18A1299E714EB66D4843BC23A0BB05B64F9401B7DA0D57A6ADF3CE9648340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+$Name::operator+=$Name::operator=
                                  • String ID:
                                  • API String ID: 3504876306-0
                                  • Opcode ID: 4cf0dd5078d3509ba570865b42868e9da23906801017a10dcb0b1e26b8be7c43
                                  • Instruction ID: d770db8a1dcd1b7babfcfcfff8a651104da209471a23661596cc96532aacfa9f
                                  • Opcode Fuzzy Hash: 4cf0dd5078d3509ba570865b42868e9da23906801017a10dcb0b1e26b8be7c43
                                  • Instruction Fuzzy Hash: 44918FA2B04B5699E700EBA2D8441FC37B2FB40B68F4044B7DE4D1BAA9DF78D456C740
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Dealloc
                                  • String ID:
                                  • API String ID: 3617616757-0
                                  • Opcode ID: b2883efe41b187946146f3a4c404d68ea07e5c6b5242b3d64d721331a57dd5fc
                                  • Instruction ID: 39adabaf150c676b039c24f9275e6b1db4bf795aa7da9a7288d23ef3d2b741f7
                                  • Opcode Fuzzy Hash: b2883efe41b187946146f3a4c404d68ea07e5c6b5242b3d64d721331a57dd5fc
                                  • Instruction Fuzzy Hash: 9C510C36E0DE4289FB648F63949433C63A8EF65F79F1485B0C96E661B49F7D94448308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+=Replicator::operator[]
                                  • String ID: ...$`template-parameter$void
                                  • API String ID: 2096148573-2152273162
                                  • Opcode ID: 665771c79e234ad4dc464f400d0cf3f39faa05bfa49c5029af23b19dd9380440
                                  • Instruction ID: 0f257440804dce1754ca78123b36f8cc4c49061bad80deca527933f57a550ff4
                                  • Opcode Fuzzy Hash: 665771c79e234ad4dc464f400d0cf3f39faa05bfa49c5029af23b19dd9380440
                                  • Instruction Fuzzy Hash: E3A16DA6B09F4295EA21EB26E4401B977A0FB48FA8F4845F3DA4D03775DE3CE569C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Free__vcrt_uninitialize_locks$LibraryValue_free_base
                                  • String ID: FlsFree$FlsGetValue$__based(
                                  • API String ID: 2814451518-2927404567
                                  • Opcode ID: f6cfbe63c062ea6287187b3eb5a9fe17c3e4f29cae45bc5e4672bc025ee94fd5
                                  • Instruction ID: bfbf9de4bd6ebdd09057c22d2366c866f6268b9dfa26b3dd4b0e4e76a8649d64
                                  • Opcode Fuzzy Hash: f6cfbe63c062ea6287187b3eb5a9fe17c3e4f29cae45bc5e4672bc025ee94fd5
                                  • Instruction Fuzzy Hash: 4551AEB1F09E1742EA60BB5798001B822A2AF85FB1F5442F7D96D037F5DE3CE8668304
                                  APIs
                                  • GetProcAddress.KERNEL32(?,?,00000000,00007FFE1A454945,?,?,?,00007FFE1A451831), ref: 00007FFE1A454B7A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 190572456-537541572
                                  • Opcode ID: 305ed8650c29c88a46931ba75e192595f887792d6ebc16c8c7e4d4d625547515
                                  • Instruction ID: ea35b75923dce6422380b1b74dcbe30db66951035ae1414e528a85f2cc05497c
                                  • Opcode Fuzzy Hash: 305ed8650c29c88a46931ba75e192595f887792d6ebc16c8c7e4d4d625547515
                                  • Instruction Fuzzy Hash: FC41B1B1B09E1281FA25AB53A8443B56396BF44FF1F0885F6CD1E4B7A5EE3CE4658300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort
                                  • String ID: csm
                                  • API String ID: 4206212132-1018135373
                                  • Opcode ID: f7736b398cdf48044678fa18456032d209415373489a7dee373e069894c23483
                                  • Instruction ID: c26d5c9de29bc51918c86d79e5d02a923d30c363731cbb120174ecb9d62378db
                                  • Opcode Fuzzy Hash: f7736b398cdf48044678fa18456032d209415373489a7dee373e069894c23483
                                  • Instruction Fuzzy Hash: FC510AB6B09F4292EA64AB62A44017923A4FF48FB4F1405F7EE5D07B65DF3CE4718A01
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CallFunctionObject_$ArgsDeallocFromLongLong_SubtypeTraceback_Type_
                                  • String ID: GetResult$_ctypes/callproc.c
                                  • API String ID: 276671208-4166898048
                                  • Opcode ID: 530bc2d210fd3b323a0918ef7c54ceed0a47631cf21d4f88d000686fb3151742
                                  • Instruction ID: 92b6497f6d299023cf034ed6a8b8b3e02f75e2be62961743eccacc1f4259dacf
                                  • Opcode Fuzzy Hash: 530bc2d210fd3b323a0918ef7c54ceed0a47631cf21d4f88d000686fb3151742
                                  • Instruction Fuzzy Hash: 23515225F0EE428DFB548B17A5502B8A7A1EF65FA0F5480B1DA6E376B4DF2CE445C308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+$Name::operator+=$Name::operator=
                                  • String ID: cli::array<$cli::pin_ptr<$std::nullptr_t$std::nullptr_t $void$void
                                  • API String ID: 3504876306-2239912363
                                  • Opcode ID: fb905b2f36ee6f8e76145deec34df325946bc174dcf074b8bb2b93575c82a950
                                  • Instruction ID: a2c4e0c2ad99bb77cfbc8ad34e882b0c1ac69966f465efaec9f0278a13242efe
                                  • Opcode Fuzzy Hash: fb905b2f36ee6f8e76145deec34df325946bc174dcf074b8bb2b93575c82a950
                                  • Instruction Fuzzy Hash: 945119A2F08F5299FB11AB62E8481BD37B0AB44F64F4484F7DA4D13AA5DF3CA565C700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_$Arg_FormatParseSizeStringTuple_
                                  • String ID: abstract class$i|ZO$paramflag value %d not supported$paramflags must be a sequence of (int [,string [,value]]) tuples$paramflags must be a tuple or None$paramflags must have the same length as argtypes
                                  • API String ID: 3576850287-2768394740
                                  • Opcode ID: b662a339171247125308a6015ac1936bee6e01cabed1c5037fc8db8e585e3441
                                  • Instruction ID: d0b983e75386a856395fca53b9686dc855507cc89ba5585ca36be7aacfe10950
                                  • Opcode Fuzzy Hash: b662a339171247125308a6015ac1936bee6e01cabed1c5037fc8db8e585e3441
                                  • Instruction Fuzzy Hash: 8A312161F08E479DFA558B17E4401B89361EF64FB4F54C0B2E92DA7674DE2CE485C708
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: -$:$f$p$p
                                  • API String ID: 3215553584-2013873522
                                  • Opcode ID: 6485ef080591767760fe67f9caec812fff4e1ba5c20858478bd9f0fbec74de2f
                                  • Instruction ID: cb2ec47f841396335f464ed92143a951b3aa59bf586f08fe00b68ef103a4e8ba
                                  • Opcode Fuzzy Hash: 6485ef080591767760fe67f9caec812fff4e1ba5c20858478bd9f0fbec74de2f
                                  • Instruction Fuzzy Hash: 6312B361E0C243A6FBB0BA15D0586B9F261FB40792FD44036F69D676C4DB3CE994AB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: f$f$p$p$f
                                  • API String ID: 3215553584-1325933183
                                  • Opcode ID: 47a7a6303f50c331757a7ed503f6ccc132970c05c2223996d06c8e5714df85c4
                                  • Instruction ID: 03d21e556df17629ef4213ec1dac635d3f5835c8f02905ba787719da183a861b
                                  • Opcode Fuzzy Hash: 47a7a6303f50c331757a7ed503f6ccc132970c05c2223996d06c8e5714df85c4
                                  • Instruction Fuzzy Hash: BB128362E1C143A7FBB0BA14E4546BAF261FF80795FC84036F69D566C4DB7CE480AB60
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$terminate
                                  • String ID: csm$csm
                                  • API String ID: 579254285-3733052814
                                  • Opcode ID: bf2bd8ebdab93d80cc5c3377118db6f6a4f09d09715ac30f3a7fa679fbe568cb
                                  • Instruction ID: 872ca46866851c0c3aa83712e38e144d318177029b352b8fd7f01b2f6a711d8d
                                  • Opcode Fuzzy Hash: bf2bd8ebdab93d80cc5c3377118db6f6a4f09d09715ac30f3a7fa679fbe568cb
                                  • Instruction Fuzzy Hash: 81818FB2B08B8296EA74BB5BA4846796790BB50FA4F0441F7CA5D07BA1DF3CE461C700
                                  APIs
                                  • PyLong_AsVoidPtr.PYTHON38 ref: 00007FFE13331E9F
                                    • Part of subcall function 00007FFE13332010: _PyArg_ParseTuple_SizeT.PYTHON38 ref: 00007FFE1333204C
                                    • Part of subcall function 00007FFE13332010: PySequence_Tuple.PYTHON38 ref: 00007FFE1333206F
                                    • Part of subcall function 00007FFE13332010: _PyArg_ParseTuple_SizeT.PYTHON38 ref: 00007FFE133320A0
                                    • Part of subcall function 00007FFE13332010: PySys_Audit.PYTHON38 ref: 00007FFE133320D1
                                    • Part of subcall function 00007FFE13332010: PyObject_GetAttrString.PYTHON38 ref: 00007FFE133320EA
                                    • Part of subcall function 00007FFE13332010: PyLong_AsVoidPtr.PYTHON38 ref: 00007FFE13332113
                                    • Part of subcall function 00007FFE13332010: PyErr_Occurred.PYTHON38 ref: 00007FFE13332126
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Arg_Long_ParseSizeTuple_Void$AttrAuditErr_Object_OccurredSequence_StringSys_Tuple
                                  • String ID: argument must be callable or integer function address$cannot construct instance of this class: no argtypes
                                  • API String ID: 4181388754-2742191083
                                  • Opcode ID: 95199a011234cc55058fc8dd18c5086f66689566921fae72a51de8fa4d81df3f
                                  • Instruction ID: 2c4a85d279b11a78130a2057ca765e5e70e830e658851a89a5ba0f0874661a3d
                                  • Opcode Fuzzy Hash: 95199a011234cc55058fc8dd18c5086f66689566921fae72a51de8fa4d81df3f
                                  • Instruction Fuzzy Hash: 5B519B21F0AF4288EA559B13D840179A3A1AF65FE0F08C4B1DE6E677B9DF2DE4418308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+$Name::operator+=$Name::operator=
                                  • String ID: {for
                                  • API String ID: 3504876306-864106941
                                  • Opcode ID: 1c92e329c404754517839ad3aba3f804cdfa7fe5de4e7f1074ce51ab54e1b3f4
                                  • Instruction ID: a784f07f211473ca604d92f8a69acb61f0bf5482c52cd9eb88963a4a3ccc991a
                                  • Opcode Fuzzy Hash: 1c92e329c404754517839ad3aba3f804cdfa7fe5de4e7f1074ce51ab54e1b3f4
                                  • Instruction Fuzzy Hash: B3516BB2B08F4599FB01AB66D8443FC27A1BB05BA4F8040B3DA4C17BA6DF7C9465C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Dealloc
                                  • String ID: wrong type
                                  • API String ID: 3617616757-2191655096
                                  • Opcode ID: 145fd6ca234b13e2fd656f9f0c6ee79a1be4d5a2110f2a11c1c077804be63fb0
                                  • Instruction ID: 5456921dc97231829ebea1f355288771cebe16c19741768be7b288f9b1fc740b
                                  • Opcode Fuzzy Hash: 145fd6ca234b13e2fd656f9f0c6ee79a1be4d5a2110f2a11c1c077804be63fb0
                                  • Instruction Fuzzy Hash: 88515D21B09E4288FE559B17E540179A3A1EF64FF0B44C4B1D96E677B4EF2CE494C308
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                  • API String ID: 2030045667-3659356012
                                  • Opcode ID: fe0539693312307a6548d1b6f9691386f436f5edd5898c8b8ef1b4374cb7018a
                                  • Instruction ID: 00c264f48185211ffcaa204d0e8525f3ad7f8085bb7631d60c2fbaa2dc497599
                                  • Opcode Fuzzy Hash: fe0539693312307a6548d1b6f9691386f436f5edd5898c8b8ef1b4374cb7018a
                                  • Instruction Fuzzy Hash: EA41B321B0864372FAB4BB12A9405BAE3A4BF44BC4FC44131DD9D2B796DE3CE445A720
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                  • String ID: CreateProcessW$Failed to create child process!
                                  • API String ID: 2895956056-699529898
                                  • Opcode ID: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                  • Instruction ID: fb3e0cb77ddc591f6c653f027e898d611701c11693a8953553ee14884d9578ba
                                  • Opcode Fuzzy Hash: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                  • Instruction Fuzzy Hash: 41412D32A18B8291EA70AB24F4452AAB3A1FBC5360FD00335E6AD577E5DF7CD4459B10
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: NameName::Name::operator+Name::operator+=$Decorator::getDimensionName::doPcharSigned
                                  • String ID: `template-parameter$void
                                  • API String ID: 1951524168-4057429177
                                  • Opcode ID: 6ae3ef52113e57d35b7955a0f65f779d93265ba774f9a60eaa75a8868ae336a0
                                  • Instruction ID: 09fcb5e14dd2b2895601139b6462952b1c6553d9c6f532e75319307508596a40
                                  • Opcode Fuzzy Hash: 6ae3ef52113e57d35b7955a0f65f779d93265ba774f9a60eaa75a8868ae336a0
                                  • Instruction Fuzzy Hash: A3312562B19B4285FB019B65E8512BE37A1BB44B88F860032DE0D6B7B5DF6CE505C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort
                                  • String ID: csm
                                  • API String ID: 4206212132-1018135373
                                  • Opcode ID: cee6b53f9be09bf52de3ade6e9bb4be5d591decda02f78e2ecb72a162e3db562
                                  • Instruction ID: c38d477e17d8fac4a91780eac7947ba48f2356296c2faa4466fa0e630b927c7e
                                  • Opcode Fuzzy Hash: cee6b53f9be09bf52de3ade6e9bb4be5d591decda02f78e2ecb72a162e3db562
                                  • Instruction Fuzzy Hash: 89310FB9F09F4692EA6CBB62905523822E4EF54F74F1406F7DA2C067E2DF2CB4708651
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: DeallocObject_$Call$Arg_ArgsAttrMethodParseTuple
                                  • String ID: OO!
                                  • API String ID: 3617613968-3205451899
                                  • Opcode ID: 89e33619414e4ae2e5cc80a3a5b6a94440a81f206e1f3bb8904daee7c26bde4d
                                  • Instruction ID: 4522a26cac2c7f8df2777fe3a3be021ba005b185acd33a926d57145b747979dd
                                  • Opcode Fuzzy Hash: 89e33619414e4ae2e5cc80a3a5b6a94440a81f206e1f3bb8904daee7c26bde4d
                                  • Instruction Fuzzy Hash: 5B216A22F08E4785EF448B67A844578A3A0EF64FF5B4480B5CA3D6B774EE2CE4858348
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_$BuildDeallocFromLong_OccurredSsize_tStringTuple_Value
                                  • String ID: not a ctypes type or object$siN
                                  • API String ID: 1444022424-92050270
                                  • Opcode ID: b1e41389128e37b91cd626e8d2f1abe88861ad0e6b1fe02023e3c6aa7f6ba98b
                                  • Instruction ID: be20afdc99590a2f9369bb8e89e5f7b4f40460a98aefea1dddf1fc9f44e86d4b
                                  • Opcode Fuzzy Hash: b1e41389128e37b91cd626e8d2f1abe88861ad0e6b1fe02023e3c6aa7f6ba98b
                                  • Instruction Fuzzy Hash: E7211D21A09E4289EA549B23E594279B3A1FF64FA5F048574DD2E67774DF2CE4418308
                                  APIs
                                    • Part of subcall function 00007FFE0139F2D0: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139F0A6), ref: 00007FFE0139F2F0
                                    • Part of subcall function 00007FFE0139F2D0: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139F0A6), ref: 00007FFE0139F346
                                    • Part of subcall function 00007FFE0139F2D0: LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139F0A6), ref: 00007FFE0139F3EB
                                  • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FFE0139F105
                                  • GetFileType.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FFE0139F123
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFE0139F2B4
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFE013D6450
                                  • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FFE013D6483
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterErrorFileLast$CloseCreateHandleLeaveType
                                  • String ID:
                                  • API String ID: 3788438030-0
                                  • Opcode ID: a59d17f06b1bd9d842be46a7f28cfe95a224e8e552fd04205d7b926c9701eb9f
                                  • Instruction ID: 29575cd4e56332afc5fcb706ba32dc7fb77dbc0452df0bcd4e033b4c72941c25
                                  • Opcode Fuzzy Hash: a59d17f06b1bd9d842be46a7f28cfe95a224e8e552fd04205d7b926c9701eb9f
                                  • Instruction Fuzzy Hash: EDC1A37AB28A4185EB10DF68D4912AC3B65EB49B98B120335DA6E9B7F5CF3CD455C300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 849930591-393685449
                                  • Opcode ID: e61afc8d21ba52cdbe611d77afa9c967b031d652e012678c684f0478f5a183c7
                                  • Instruction ID: 914f0950f6b9e363b7953ee909139cb53caaf78f16b4a3c368c8d678a6593f15
                                  • Opcode Fuzzy Hash: e61afc8d21ba52cdbe611d77afa9c967b031d652e012678c684f0478f5a183c7
                                  • Instruction Fuzzy Hash: 32D18132A08742A6EBB0AB25D5403ADB7A0FB65788FD00135EE4D677A6CF3CE455E710
                                  APIs
                                    • Part of subcall function 00007FFE01393440: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FFE013D39B1,?,?,?,?,00007FFE013978EA,?,?,?,00007FFE0139AC33,?,?,?), ref: 00007FFE0139344A
                                    • Part of subcall function 00007FFE01393440: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FFE013D39B1,?,?,?,?,00007FFE013978EA,?,?,?,00007FFE0139AC33,?,?,?), ref: 00007FFE01393490
                                    • Part of subcall function 00007FFE01433FF0: GetCurrentDirectoryW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FFE01434030
                                  • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,00000000), ref: 00007FFE01434397
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,00000000), ref: 00007FFE014343A3
                                  • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,00000000), ref: 00007FFE014343E3
                                  • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,00000000), ref: 00007FFE01434432
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,00000000), ref: 00007FFE0143443F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$FullNamePath$CurrentDirectory
                                  • String ID: .$:
                                  • API String ID: 3092725408-4202072812
                                  • Opcode ID: ef35eeac8d6858098a0af63d7695292964ee2a00a6a270ecab81768e333bc854
                                  • Instruction ID: 32e11b139cdf3b97f03f7997a9549f00d843feb97e5f69e28602ba6e257c24cf
                                  • Opcode Fuzzy Hash: ef35eeac8d6858098a0af63d7695292964ee2a00a6a270ecab81768e333bc854
                                  • Instruction Fuzzy Hash: E9517E62F086138AFB11ABB0D8501FD26A0BF54798F594435DE1DAFBB6EF3CA8518311
                                  APIs
                                  • GetTempPathW.KERNEL32(?,?,FFFFFFFF,00007FF733F63834), ref: 00007FF733F67CE4
                                  • CreateDirectoryW.KERNEL32(?,?,FFFFFFFF,00007FF733F63834), ref: 00007FF733F67D2C
                                    • Part of subcall function 00007FF733F67E10: GetEnvironmentVariableW.KERNEL32(00007FF733F6365F), ref: 00007FF733F67E47
                                    • Part of subcall function 00007FF733F67E10: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF733F67E69
                                    • Part of subcall function 00007FF733F77548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F77561
                                    • Part of subcall function 00007FF733F626C0: MessageBoxW.USER32 ref: 00007FF733F62736
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Environment$CreateDirectoryExpandMessagePathStringsTempVariable_invalid_parameter_noinfo
                                  • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                                  • API String ID: 740614611-1339014028
                                  • Opcode ID: 41794429c51d27e0df7a21877b4f19c7cdf826b4f928fd21ea6cb85727b80d41
                                  • Instruction ID: e880b1f9b66444cc5369ada3a98a3dc9eddd0b02431a84f277655a472f1d5bf9
                                  • Opcode Fuzzy Hash: 41794429c51d27e0df7a21877b4f19c7cdf826b4f928fd21ea6cb85727b80d41
                                  • Instruction Fuzzy Hash: 7241BF11B19A4760FAB5BB6299512F9D351AF857C0FC00131FD1D7B7A6EE3CE508A320
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: NameName::$Name::doName::operator+Pchar
                                  • String ID: `non-type-template-parameter
                                  • API String ID: 3026640183-4247534891
                                  • Opcode ID: 8de7eb83a26ee2879d9e7f3dce981534833e223cfe94a637316e027b59d68b0d
                                  • Instruction ID: 84db6b80487a6bc77f3130d3f9cee4472cf9f59dcc1632d52f88d820419096c7
                                  • Opcode Fuzzy Hash: 8de7eb83a26ee2879d9e7f3dce981534833e223cfe94a637316e027b59d68b0d
                                  • Instruction Fuzzy Hash: 2F418B72A08796A5EB10DB11E4A41BC33A5BB11B80F968435DE4D5FBB5DF3CE825C300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+Name::operator=
                                  • String ID: char $int $long $short $unsigned
                                  • API String ID: 1492653461-3894466517
                                  • Opcode ID: c0b7dbe21b8175da4614ce5a65b82f07a77ab9efeaa9dba654015b5c321106f4
                                  • Instruction ID: 93342fafe4bf7654372b4a9f0027582353a2a5d5a5288c6e4e2089c7eb44be89
                                  • Opcode Fuzzy Hash: c0b7dbe21b8175da4614ce5a65b82f07a77ab9efeaa9dba654015b5c321106f4
                                  • Instruction Fuzzy Hash: 60314AA2F19A4689FB119B2AD4443BC23B0AB04B68F9440F3CA4C566B5DF3CA466D701
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Dealloc$AttrCallable_CheckErr_LookupObject_String
                                  • String ID: restype must be a type, a callable, or None
                                  • API String ID: 1528254987-4008198047
                                  • Opcode ID: bcf5ff4b89c9fe4f4b7b7fccda20e8ee7fb59f527eff786d0c9e238778eafffc
                                  • Instruction ID: f969fb90226c8dd23a3ac5308ffec7ac5a6283698cf0bfbb43248b44d0145dbf
                                  • Opcode Fuzzy Hash: bcf5ff4b89c9fe4f4b7b7fccda20e8ee7fb59f527eff786d0c9e238778eafffc
                                  • Instruction Fuzzy Hash: 51316135E0DE4289FA548B27D54037863A4FF65FB4F1881B1CA6DA6674DF2CE4558308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: FlsGetValue$__based(
                                  • API String ID: 1452528299-1499225077
                                  • Opcode ID: 667999330e637d529fa0c4ead2f56afba722f0e302c095185809fe3dbf1186dd
                                  • Instruction ID: 72bf1643367e318b4afa6bca7adfe9ff8a9bf0ee740af296db1a5924119c68a0
                                  • Opcode Fuzzy Hash: 667999330e637d529fa0c4ead2f56afba722f0e302c095185809fe3dbf1186dd
                                  • Instruction Fuzzy Hash: 6C2101A0F0DE1241FA64BB33680617922926F48FB0F5485F7D96E0B3F6DE3CE4618240
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+=$Decorator::getNameName::operator+$Name::Name::operator=ScopeScoped
                                  • String ID: void
                                  • API String ID: 3176039966-3531332078
                                  • Opcode ID: ecff6ed1bed2e6a40566607b567991730e33737c114e984eddfe2bc1d2df1b28
                                  • Instruction ID: 56e8f47a6f77f188ad6ac2347d705fc88b674267725d9dbcc54986d4b38eb3ea
                                  • Opcode Fuzzy Hash: ecff6ed1bed2e6a40566607b567991730e33737c114e984eddfe2bc1d2df1b28
                                  • Instruction Fuzzy Hash: 36118466D1D68681FB20DB19E8503BA6361FF55744F458031E58D4F2B9DF2CE515C701
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Long$Long_MaskUnsigned
                                  • String ID: _ctypes/cfield.c pymem$unicode string or integer address expected instead of %s instance
                                  • API String ID: 1805849926-901310697
                                  • Opcode ID: 2ccd28ba18589efa0e64806d2f0cb936cf753f25fa42e4685e3b1daac323c193
                                  • Instruction ID: db47a998825c37e0bb6ed97db1a7517e0389c26aa4e6f274cdc773fbba9f3751
                                  • Opcode Fuzzy Hash: 2ccd28ba18589efa0e64806d2f0cb936cf753f25fa42e4685e3b1daac323c193
                                  • Instruction Fuzzy Hash: 06213D61F19F0689EB449F17E8401786360BF68FB0F9480B5CA6E67370DE3CE4998308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Arg_CharErrorFreeFromLastLocalParseTupleUnicode_Wide
                                  • String ID: <no description>$|i:FormatError
                                  • API String ID: 935104296-1632374824
                                  • Opcode ID: 76526e8ca7a5dbad8a9db4044e1930993c468c73b951a0b1ccb6cf4ff79fcccc
                                  • Instruction ID: f9ab00424e8f129193bd492fbc4a482f6b2fa947bbdc135e043c5aa24e606426
                                  • Opcode Fuzzy Hash: 76526e8ca7a5dbad8a9db4044e1930993c468c73b951a0b1ccb6cf4ff79fcccc
                                  • Instruction Fuzzy Hash: 32014462F0CE468AEB548B27A80417962A1FFA4BF0B549271D97E933F4EF3CE4458614
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Eval_Thread$Arg_Err_FreeFromLibraryParseRestoreSaveTupleWindows
                                  • String ID: O&:FreeLibrary
                                  • API String ID: 204461231-2600264430
                                  • Opcode ID: 75aac2151fbe6049cb3e9a760563f3d4315885d4bc3b29649270f1793fab5e9a
                                  • Instruction ID: d2fc2d0a2477d74cb54ff6c9c9889bf22148b06b239a465d8397197836928277
                                  • Opcode Fuzzy Hash: 75aac2151fbe6049cb3e9a760563f3d4315885d4bc3b29649270f1793fab5e9a
                                  • Instruction Fuzzy Hash: 5001DB26F1CE478AEB508B63A8441796360BF68BE1B5480B1DA6E63774DE3CE4958318
                                  APIs
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452AED
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452B16
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452B38
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452B4C
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452B86
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452BA8
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452BBC
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452BF1
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452C24
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452C35
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452C4C
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000000,?,00007FFE1A451EE3), ref: 00007FFE1A452C60
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$terminate
                                  • String ID:
                                  • API String ID: 579254285-0
                                  • Opcode ID: e3977c0a68af9ce3eb6a72269560602cc14ed44f0c0cc47add408e7440dde568
                                  • Instruction ID: 90361d0038ad0a10828b2457184954f87beb01954bf47bc5ba44a5ed99bf20e4
                                  • Opcode Fuzzy Hash: e3977c0a68af9ce3eb6a72269560602cc14ed44f0c0cc47add408e7440dde568
                                  • Instruction Fuzzy Hash: 714129B5B09F4292EA25BF1285852786760FF98F66F0149F7DA1D037B2CF3CE4258611
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CallDeallocErr_ObjectObject_StringSubtypeType_
                                  • String ID: has no _stginfo_
                                  • API String ID: 1588466501-2912685656
                                  • Opcode ID: 5c1c4e8e87691ef5d94af4ab4c7f18db9f774f61d349d2447f707128ae63115f
                                  • Instruction ID: 7af44790d7423e70285e003a5c60381d77882f64a79ade1261658f03a24711f2
                                  • Opcode Fuzzy Hash: 5c1c4e8e87691ef5d94af4ab4c7f18db9f774f61d349d2447f707128ae63115f
                                  • Instruction Fuzzy Hash: C4B17D72A09F8189EB65CF26E450279A7A0FB64FA4F00C476DA6E67760DF3CE494C704
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+$Name::operator=$Name::operator+=
                                  • String ID: std::nullptr_t$std::nullptr_t $volatile
                                  • API String ID: 3335366782-294867888
                                  • Opcode ID: 010d4b62d375ba577e931595fce58cfe727f9f4233cb7cc30c07a584e04d8d6a
                                  • Instruction ID: a10d5b1eec43aae0057c5ea8f28e5a233b9e670c884fb75938e3a6199f330f78
                                  • Opcode Fuzzy Hash: 010d4b62d375ba577e931595fce58cfe727f9f4233cb7cc30c07a584e04d8d6a
                                  • Instruction Fuzzy Hash: 726125F2F09E5294FB11AF6698540B863A5BB04FA4B8445F7EA4D03AB9DF3CE560D301
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$AddressProcValue
                                  • String ID: FlsGetValue$LCMapStringEx
                                  • API String ID: 3663398396-552164261
                                  • Opcode ID: 948fc83682bb285d1de66210e03cd83af409993909cd05a65e03d11a14740bb0
                                  • Instruction ID: d50f1a54819fa3b57f1d18eaf4d24b802a3ba156094cb231a2d01bc1abef0377
                                  • Opcode Fuzzy Hash: 948fc83682bb285d1de66210e03cd83af409993909cd05a65e03d11a14740bb0
                                  • Instruction Fuzzy Hash: DB51D161F0CB5382EB519B25A80027963A1AF44BE4F4A4536DD9E9FBF4DE3CE885C200
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::doName::operator+Name::operator+=Pchar$NameName::Name::append
                                  • String ID:
                                  • API String ID: 3659116837-0
                                  • Opcode ID: ba15799b0e7ceb7b55bd43d09b27d58f4f49837068a18498ec1ca158e5473965
                                  • Instruction ID: d478a6868caf6c49b48a80783fc85e6064f892e6c6da8034345b03a79c517c0a
                                  • Opcode Fuzzy Hash: ba15799b0e7ceb7b55bd43d09b27d58f4f49837068a18498ec1ca158e5473965
                                  • Instruction Fuzzy Hash: 9A615572B09B9289EB01CF64E8847AC37A2BB85758F458035EA0E5B7B9DF3DE441C300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: NameName::$Name::operator+
                                  • String ID: `non-type-template-parameter
                                  • API String ID: 826178784-4247534891
                                  • Opcode ID: 27f7340d07b8a53ae54682156064714a75510f143d49d5ded7006f5a180fbb92
                                  • Instruction ID: 5b8de4826e53cee7fc6a0cbf0e2d88adda7abdc2778e06176885e0d954ffc196
                                  • Opcode Fuzzy Hash: 27f7340d07b8a53ae54682156064714a75510f143d49d5ded7006f5a180fbb92
                                  • Instruction Fuzzy Hash: EE4170B2F09E5295E700AB22E4401BC77A5BB14FA4B5880F7CA5D17BA4DF38E4658300
                                  APIs
                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF733F6D29A,?,?,?,00007FF733F6CF8C,?,?,?,00007FF733F6CB89), ref: 00007FF733F6D06D
                                  • GetLastError.KERNEL32(?,?,?,00007FF733F6D29A,?,?,?,00007FF733F6CF8C,?,?,?,00007FF733F6CB89), ref: 00007FF733F6D07B
                                  • LoadLibraryExW.KERNEL32(?,?,?,00007FF733F6D29A,?,?,?,00007FF733F6CF8C,?,?,?,00007FF733F6CB89), ref: 00007FF733F6D0A5
                                  • FreeLibrary.KERNEL32(?,?,?,00007FF733F6D29A,?,?,?,00007FF733F6CF8C,?,?,?,00007FF733F6CB89), ref: 00007FF733F6D113
                                  • GetProcAddress.KERNEL32(?,?,?,00007FF733F6D29A,?,?,?,00007FF733F6CF8C,?,?,?,00007FF733F6CB89), ref: 00007FF733F6D11F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                  • String ID: api-ms-
                                  • API String ID: 2559590344-2084034818
                                  • Opcode ID: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                  • Instruction ID: a61f8fc7a720c75d46e82c89cb95a78c1e2941876351e57457c215b8ecb68f96
                                  • Opcode Fuzzy Hash: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                  • Instruction Fuzzy Hash: C331C82161EE43F1EEB5AB12A800575A394BF04BA0FD90635ED2D3B368DF3CE4429324
                                  APIs
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFE01392616
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFE0139265D
                                    • Part of subcall function 00007FFE013926A0: EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FFE01392690), ref: 00007FFE013926CC
                                    • Part of subcall function 00007FFE013926A0: LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FFE01392690), ref: 00007FFE013926E8
                                  • TlsGetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FFE013D2B3C
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0 ref: 00007FFE013D2B52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CriticalErrorLastSection$AddressEnterLeaveProcValue
                                  • String ID: FlsGetValue$LCMapStringEx
                                  • API String ID: 2861905401-552164261
                                  • Opcode ID: 9d82342594002ce3bbd8b4bd2bb79a11808f388563f9c3ff704688b0f4c3bab2
                                  • Instruction ID: e95d846124de01d90b05c9ea74670d1fa2e682d8edcf70546f981f601f954cc6
                                  • Opcode Fuzzy Hash: 9d82342594002ce3bbd8b4bd2bb79a11808f388563f9c3ff704688b0f4c3bab2
                                  • Instruction Fuzzy Hash: 8C318262B0AB0286FB149B28F85017963A1EF483A4F454635DDAD4B7F4EF7CE849C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _free_base$EntryInterlockedListPush_malloc_basestrcpy_s
                                  • String ID:
                                  • API String ID: 3559411272-3916222277
                                  • Opcode ID: 674afff8a306edbd1bdf95ce54468db4187de9c58b16d10f99e37dc01cd62d32
                                  • Instruction ID: 69f6a007e217ceddca41786462a478c907e38f3440db9e151060ee6e77b1e2d3
                                  • Opcode Fuzzy Hash: 674afff8a306edbd1bdf95ce54468db4187de9c58b16d10f99e37dc01cd62d32
                                  • Instruction Fuzzy Hash: A731C1A2B19F5981EA11EF23A8085792391FB08FF4B5446F6DE6E477A1DE3CD422C300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: DeallocSubtypeType_$Dict_$CallErr_FormatFromItemLong_MakeObject_Unicode_Voidstrchr
                                  • String ID:
                                  • API String ID: 1416334960-0
                                  • Opcode ID: ce3ac10905c1c6e7ba975258a2a35abd42496ba6533384bd7e976a6e54496548
                                  • Instruction ID: 70f0e0201755aa90bdcab70a136bd148fbb1d1ebbf42d1097f3851b70537ce4e
                                  • Opcode Fuzzy Hash: ce3ac10905c1c6e7ba975258a2a35abd42496ba6533384bd7e976a6e54496548
                                  • Instruction Fuzzy Hash: 16312D61F49F0289EE549B27A954138A3A1BF64FE0F1895B0DE2D677B5EF3CE4508308
                                  APIs
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FFE01394A45), ref: 00007FFE01396058
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FFE01394A45), ref: 00007FFE013960A8
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE01394A45), ref: 00007FFE013D3356
                                  • TlsGetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FFE01394A45), ref: 00007FFE013D33B9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$AddressProcValue
                                  • String ID: FlsGetValue$LCMapStringEx
                                  • API String ID: 3663398396-552164261
                                  • Opcode ID: 78ca7522fdfa8cbe323af7358c6e3b25300f47634eb04763555a5be60e670504
                                  • Instruction ID: d35ca8afb021cbb01d0ed24e07c37147c42f6f9752ffa454f2f89c086f52d458
                                  • Opcode Fuzzy Hash: 78ca7522fdfa8cbe323af7358c6e3b25300f47634eb04763555a5be60e670504
                                  • Instruction Fuzzy Hash: BD31BD61F1EB0282FB448B58F95017823A1AF48BE8F455135ED9E4B7B4EE3CF9488340
                                  APIs
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FFE013D0F8C,?,?,00000000,00007FFE013934C9,?,?,?,00007FFE013D39B1), ref: 00007FFE01383978
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FFE013D0F8C,?,?,00000000,00007FFE013934C9,?,?,?,00007FFE013D39B1), ref: 00007FFE013839C8
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE013D0F8C,?,?,00000000,00007FFE013934C9,?,?,?,00007FFE013D39B1), ref: 00007FFE013CC4F8
                                  • TlsGetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FFE013D0F8C,?,?,00000000,00007FFE013934C9,?,?,?,00007FFE013D39B1), ref: 00007FFE013CC55B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$AddressProcValue
                                  • String ID: FlsGetValue$LCMapStringEx
                                  • API String ID: 3663398396-552164261
                                  • Opcode ID: b3c3fa4fa481bad0b01e31c2ce2019b82ec713eee3a7a424c4296bf864c06ca5
                                  • Instruction ID: 513f315a1251cb4813d17fd51d8be8658edcd8a75590de03f0daef113c7c8822
                                  • Opcode Fuzzy Hash: b3c3fa4fa481bad0b01e31c2ce2019b82ec713eee3a7a424c4296bf864c06ca5
                                  • Instruction Fuzzy Hash: 9C31CE72F0AB0282FB049B59F85017863A1AF58BE8F456135ED5E5B7B4EE3CF8498340
                                  APIs
                                  • LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE01396342,?,?,?,00007FFE013934B6,?,?,?,00007FFE013D39B1), ref: 00007FFE0139C04A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 1029625771-537541572
                                  • Opcode ID: 6db79fdddd998107a66d735d21890402ca099e4a773b4f9534cfcd9fd7362131
                                  • Instruction ID: 9cbc61e4a9b2c9174a3df3caf28326a47868fe4c4cc3f939e4482e1facf8746d
                                  • Opcode Fuzzy Hash: 6db79fdddd998107a66d735d21890402ca099e4a773b4f9534cfcd9fd7362131
                                  • Instruction Fuzzy Hash: 60218D21B19B42C1EB159B26A8441B862A5FF49FE4F5A1635CE2F8B7F0DF3CE0418704
                                  APIs
                                  • UnDecorator::getArgumentList.LIBVCRUNTIME ref: 00007FFE1A458B93
                                    • Part of subcall function 00007FFE1A458C80: Replicator::operator[].LIBVCRUNTIME ref: 00007FFE1A458CFE
                                    • Part of subcall function 00007FFE1A458C80: DName::operator+=.LIBVCRUNTIME ref: 00007FFE1A458D09
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ArgumentDecorator::getListName::operator+=Replicator::operator[]
                                  • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                  • API String ID: 98997111-2211150622
                                  • Opcode ID: 7b61e257d67e4074b012ee781fd519160f23a95b3b10d6e0f956f18611d2db91
                                  • Instruction ID: 5d25907c6ca797da7433861d6f4ece227c3f8e553f8c62b9be4ae793484026a6
                                  • Opcode Fuzzy Hash: 7b61e257d67e4074b012ee781fd519160f23a95b3b10d6e0f956f18611d2db91
                                  • Instruction Fuzzy Hash: 363135A2A0AF8696FB129B16D8407B933A0EB05B65F9495F7C64D473B0DF3CE461D700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: SubtypeType_$Object_$Err_InstanceStringSubclass
                                  • String ID: abstract class
                                  • API String ID: 2446900705-1623945838
                                  • Opcode ID: 58fe7ba39b1d69d5d5881ffd8c909ddb01b50921734a2230f2f5ab80e3e20ea5
                                  • Instruction ID: 304cda790968543a43a4eed277a3f343b545cb5f56a09c8368fa8e0f53c42b0d
                                  • Opcode Fuzzy Hash: 58fe7ba39b1d69d5d5881ffd8c909ddb01b50921734a2230f2f5ab80e3e20ea5
                                  • Instruction Fuzzy Hash: D2214C21F0CE4789EE10AB17D850179A3A1BFA4FF4B04D5B1DA2FA76B5DE2CE4458308
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                  • String ID:
                                  • API String ID: 995526605-0
                                  • Opcode ID: 8356e17e6427c03366acad688ef96df5430cd8c67dfe58d52091e88c81740b7d
                                  • Instruction ID: 1d9d2ffab3d85de53c04902c5d891f8ff300bb22b1251b39fb4dddd3b0bbe515
                                  • Opcode Fuzzy Hash: 8356e17e6427c03366acad688ef96df5430cd8c67dfe58d52091e88c81740b7d
                                  • Instruction Fuzzy Hash: AF218531A0CA4351EBB0AB65E44022AE3A1FF857A4FD00235EA7D67BE4DF7CD8499710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Value$ErrorLast
                                  • String ID:
                                  • API String ID: 2506987500-0
                                  • Opcode ID: 4f1009f36f4b7e41e642a617816a0843c7a4fdcae41be86a1245b23186b7dd2e
                                  • Instruction ID: b572e648bfa7ae32c1284adb24854739b06ebab66b5828afc231970407de4768
                                  • Opcode Fuzzy Hash: 4f1009f36f4b7e41e642a617816a0843c7a4fdcae41be86a1245b23186b7dd2e
                                  • Instruction Fuzzy Hash: 6421A920A0C24362FEF877315685939E1925F587F6FD40734F83E26BE6DE2EA4506320
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message$ErrorFormatLast
                                  • String ID: %ls%ls: %ls$<FormatMessageW failed.>$Error
                                  • API String ID: 3971115935-1149178304
                                  • Opcode ID: 7223b30dd23a30c2aa7faf0092ff60e4697deebee1b944f1837b883079aee3ab
                                  • Instruction ID: 5c012e89528b3e50fc4895e2d5fe36e3d6d776fd57d3bc56691246e5afe2cb2e
                                  • Opcode Fuzzy Hash: 7223b30dd23a30c2aa7faf0092ff60e4697deebee1b944f1837b883079aee3ab
                                  • Instruction Fuzzy Hash: C2219632608B82A1E770AB10F4506DAB364FB88784FC00136EBCD63A68DF3CD546C750
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                  • String ID: CONOUT$
                                  • API String ID: 3230265001-3130406586
                                  • Opcode ID: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                  • Instruction ID: 4cc02c6ca7853e07924fdd92f94a7b287edf3a4cf937ceaa24599e1c26a2fa4d
                                  • Opcode Fuzzy Hash: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                  • Instruction Fuzzy Hash: 5811B921B18F4396E7A49B02E844325E2A0FB58FE4FC40234EA5EAB7A4DF3CD804C750
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$terminate
                                  • String ID: MOC$RCC$csm
                                  • API String ID: 579254285-2671469338
                                  • Opcode ID: 9c7a60497b8c52de3189ad328f62a3a7d4098e3573e82cc593336359ea62de81
                                  • Instruction ID: 952855fe0d691269f396cac5ecdf5f9ad696c92901ce9d721cae7cc4f0f09dbe
                                  • Opcode Fuzzy Hash: 9c7a60497b8c52de3189ad328f62a3a7d4098e3573e82cc593336359ea62de81
                                  • Instruction Fuzzy Hash: 5BF012B9F08B0686E6657BA6904523C32A5AF98F35F4154F7C50C01372CF7CAD648A52
                                  APIs
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A4528E6
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452919
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452958
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A452979
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A45299C
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000066,?,00007FFE1A45252A), ref: 00007FFE1A4529BA
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort
                                  • String ID:
                                  • API String ID: 4206212132-0
                                  • Opcode ID: e4ab483f4ef964f3aee83e99fc27c46ba6218ad878813aa3894a822b79d211fd
                                  • Instruction ID: 81216c3e0142797c5deb1e7d57646e066934eb01e272817baad40b4d0debdfbc
                                  • Opcode Fuzzy Hash: e4ab483f4ef964f3aee83e99fc27c46ba6218ad878813aa3894a822b79d211fd
                                  • Instruction Fuzzy Hash: C6513DA1F09F8652EB69AB56815037826A0AF54F64F0944F7EF4D067E6DF7CE831D200
                                  APIs
                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F6821D
                                  • K32EnumProcessModules.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F6827A
                                    • Part of subcall function 00007FF733F686B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF733F63FA4,00000000,00007FF733F61925), ref: 00007FF733F686E9
                                  • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F68305
                                  • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F68364
                                  • FreeLibrary.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F68375
                                  • FreeLibrary.KERNEL32(?,00000000,?,00007FF733F639F2), ref: 00007FF733F6838A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                                  • String ID:
                                  • API String ID: 3462794448-0
                                  • Opcode ID: c116373e2a09e68fc95a37a35a910f387ed59b49a7d0ab4690c2b7d3ff367989
                                  • Instruction ID: 127c4985ae82bcade05f9dcece5e2bf8dcebcacf038a66d4f5def909ec200f42
                                  • Opcode Fuzzy Hash: c116373e2a09e68fc95a37a35a910f387ed59b49a7d0ab4690c2b7d3ff367989
                                  • Instruction Fuzzy Hash: 3741E862A1968391EAB0AB12A5012BAB394FF85BC5FC40139DF9D67789DF3CD401D710
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Dealloc$CallMethodObject_SizeTuple_
                                  • String ID:
                                  • API String ID: 3727994145-0
                                  • Opcode ID: 1e5e15aa81331125b7812d0fc3e7b9a7c1acb37b23ce8f04c1f626aa117a153b
                                  • Instruction ID: fee18bb1cce1c9fff9d43064e926c310312c207d18bea73863e2de36584d42f0
                                  • Opcode Fuzzy Hash: 1e5e15aa81331125b7812d0fc3e7b9a7c1acb37b23ce8f04c1f626aa117a153b
                                  • Instruction Fuzzy Hash: 9B318032E18E428AEB598F27A844139BBE0FB64FB4F048574DA2D22674DF3CE481C704
                                  APIs
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFE013A1C29
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFE013A1C7B
                                  • FreeLibraryAndExitThread.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0 ref: 00007FFE013A1CBE
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFE013A1CFF
                                  • ExitThread.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FFE013A1D07
                                    • Part of subcall function 00007FFE01393A40: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,00000000,00007FFE01393484,?,?,?,00007FFE013D39B1,?,?,?,?,00007FFE013978EA,?,?,?), ref: 00007FFE01393AB9
                                    • Part of subcall function 00007FFE01393A40: TlsGetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,00000000,00007FFE01393484,?,?,?,00007FFE013D39B1,?,?,?,?,00007FFE013978EA,?,?,?), ref: 00007FFE013CC59E
                                  • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FFE013D730D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$ExitThread$AddressCloseFreeHandleLibraryProcValue
                                  • String ID:
                                  • API String ID: 1453037571-0
                                  • Opcode ID: 9385413610f64a6426c2931e4861a13ac1805e78321b1171aa409faccdf45293
                                  • Instruction ID: b8a53ac781a05c27b1f0364f46691b7d3cf57b8f3a73deca3c2bede2bd0ad514
                                  • Opcode Fuzzy Hash: 9385413610f64a6426c2931e4861a13ac1805e78321b1171aa409faccdf45293
                                  • Instruction Fuzzy Hash: 8F315E20F0DA4342FF18AB30995527C62A5AF44BB8F560734D97E0E6F6DE7CE8058340
                                  APIs
                                    • Part of subcall function 00007FF733F67B50: GetCurrentProcess.KERNEL32 ref: 00007FF733F67B70
                                    • Part of subcall function 00007FF733F67B50: OpenProcessToken.ADVAPI32 ref: 00007FF733F67B83
                                    • Part of subcall function 00007FF733F67B50: GetTokenInformation.ADVAPI32 ref: 00007FF733F67BA8
                                    • Part of subcall function 00007FF733F67B50: GetLastError.KERNEL32 ref: 00007FF733F67BB2
                                    • Part of subcall function 00007FF733F67B50: GetTokenInformation.ADVAPI32 ref: 00007FF733F67BF2
                                    • Part of subcall function 00007FF733F67B50: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF733F67C0E
                                    • Part of subcall function 00007FF733F67B50: CloseHandle.KERNEL32 ref: 00007FF733F67C26
                                  • LocalFree.KERNEL32(?,00007FF733F63814), ref: 00007FF733F6848C
                                  • LocalFree.KERNEL32(?,00007FF733F63814), ref: 00007FF733F68495
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                  • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                                  • API String ID: 6828938-1529539262
                                  • Opcode ID: 795f95526d0a951be163d7ee57e77295e71c5006ab84a191c0455a0dace466c7
                                  • Instruction ID: 54653d06eb61d8c3b2acdc7475a727a2249e41243b58a9cde377dca619eaa1de
                                  • Opcode Fuzzy Hash: 795f95526d0a951be163d7ee57e77295e71c5006ab84a191c0455a0dace466c7
                                  • Instruction Fuzzy Hash: DB216231A08643A2F6A4BB11E5157E9A3A0FF88780FC44435EA4D67796DF3CD844D760
                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A5E7
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A61D
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A64A
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A65B
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A66C
                                  • SetLastError.KERNEL32(?,?,?,00007FF733F743FD,?,?,?,?,00007FF733F7979A,?,?,?,?,00007FF733F7649F), ref: 00007FF733F7A687
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Value$ErrorLast
                                  • String ID:
                                  • API String ID: 2506987500-0
                                  • Opcode ID: 5dcac91248c0014d458aec840eea87d8b317a92cf5de5997ea3edf93bd94a031
                                  • Instruction ID: 71373358e908a90168074b3e4640e7681ce41a184669075ca2532e7a33cc10a7
                                  • Opcode Fuzzy Hash: 5dcac91248c0014d458aec840eea87d8b317a92cf5de5997ea3edf93bd94a031
                                  • Instruction Fuzzy Hash: CC118C20A0C24362FEF873219A81139E2825F587F5FD54334F83E267E6DE2CA4516721
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+=$Replicator::operator+=
                                  • String ID: ...
                                  • API String ID: 3157425598-440645147
                                  • Opcode ID: c9104c6670451f329dad148e6b4dc02d9787fc759a2c8db3b396c3d6320865ab
                                  • Instruction ID: 17cda1fa0b949b883e58889f92978e252d00fc64ce7d969069c27bec3912a917
                                  • Opcode Fuzzy Hash: c9104c6670451f329dad148e6b4dc02d9787fc759a2c8db3b396c3d6320865ab
                                  • Instruction Fuzzy Hash: AF516962E0D78289FB61CB25E8443793BA2BB86B94F198031DE4D0F7B5CE3DE4458B00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Mem_$FreeMalloc
                                  • String ID: %Id)$%Id,
                                  • API String ID: 3308143561-2823328843
                                  • Opcode ID: 68fba6c65291721555c8f7ebb26129123c55de953727d1d0e97554d30be647cc
                                  • Instruction ID: 5544963a2d7130a2480645a51e735f2812e63b7c5717bbc52779cc2a223fb6e5
                                  • Opcode Fuzzy Hash: 68fba6c65291721555c8f7ebb26129123c55de953727d1d0e97554d30be647cc
                                  • Instruction Fuzzy Hash: 3C41D222B08F8148EB118F17A4102B9A790FB65FE4F488171DE6DA77A1DE3DD446C304
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                  • String ID: Unhandled exception in script
                                  • API String ID: 3081866767-2699770090
                                  • Opcode ID: aa8fae7967b6237ed58108c0441fa719abaab4bc203e45b59d8227776e6be316
                                  • Instruction ID: 62c4f2a70e33314c6c86f62075b6c96047128620ad8bffca1f1979d95223dbb9
                                  • Opcode Fuzzy Hash: aa8fae7967b6237ed58108c0441fa719abaab4bc203e45b59d8227776e6be316
                                  • Instruction Fuzzy Hash: 79315E32608A83A9EB74AF61E8552F9A360FF88784FC40135EA4D6BB69DF3CD504D710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$ExceptionRaise
                                  • String ID: csm
                                  • API String ID: 3453572468-1018135373
                                  • Opcode ID: a0f470496b3338efbe37c9d345d780ede6fcb3b70bc9e3d0c544a15374437034
                                  • Instruction ID: 8ceba50f0c4216ef0fdfa0872625d9cda25de9115554796360efad75f9b9f1ab
                                  • Opcode Fuzzy Hash: a0f470496b3338efbe37c9d345d780ede6fcb3b70bc9e3d0c544a15374437034
                                  • Instruction Fuzzy Hash: 81312CB6B08A4282E761AF56A4406792760FB88F64F1441B7EE5D037A9CF7CE865CA01
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_MallocMem_String
                                  • String ID: abstract class
                                  • API String ID: 3951516270-1623945838
                                  • Opcode ID: 055b77e2e3b80189cc3298ea85d87d91dfed2776ab694d45947f6f6b826b42df
                                  • Instruction ID: 82580703bd96b861690379ab30a2cf0febd2228b5f4341abebe6d3c6d296c015
                                  • Opcode Fuzzy Hash: 055b77e2e3b80189cc3298ea85d87d91dfed2776ab694d45947f6f6b826b42df
                                  • Instruction Fuzzy Hash: F1212F31A09F428AEB848F26E54426873E4FB58FA4F548175CA6E93764EF3CE464C344
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message$ByteCharMultiWide
                                  • String ID: %s%s: %s$Error$Error/warning (ANSI fallback)
                                  • API String ID: 1878133881-640379615
                                  • Opcode ID: 185a5ded7e4d76afdc6dde510c40398ff569d270283616bd23a067f5071c39f1
                                  • Instruction ID: c44cbcfe159336e147c2880705502320c68b89c4bbf5ec16738649c1a1943f9d
                                  • Opcode Fuzzy Hash: 185a5ded7e4d76afdc6dde510c40398ff569d270283616bd23a067f5071c39f1
                                  • Instruction Fuzzy Hash: 7A217172628B87A1E6B0AB10F4517EAA364FF84784FC01036EACC276A9DF7CD645D750
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AttrDict_Err_NextObject_String
                                  • String ID: args not a tuple?$too many initializers
                                  • API String ID: 3352738686-2791065560
                                  • Opcode ID: 2ff835a78943e0d53156706c5d13c88222d5f76d37cafafde7b459920f154dc0
                                  • Instruction ID: 49e130ba8454bc3c020f4c2d468cabfb8182f8afb28fcc90ed248f9ff478a748
                                  • Opcode Fuzzy Hash: 2ff835a78943e0d53156706c5d13c88222d5f76d37cafafde7b459920f154dc0
                                  • Instruction Fuzzy Hash: D1212C61A48E42C5EA108B16E544379A361FBA4FF4F1482B1E97D636F4CF7CE4498704
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AllocFree
                                  • String ID: FlsAlloc$FlsFree$__based(
                                  • API String ID: 265982327-1814498500
                                  • Opcode ID: 54e4ea7337ee46c35fd7b6825b034efbdce11ec9159bc44db4f3c68ed160b025
                                  • Instruction ID: ca081d9a819b62a025a7a841bcc7af0f3cd86a62cf7a932110cfabda60ab6511
                                  • Opcode Fuzzy Hash: 54e4ea7337ee46c35fd7b6825b034efbdce11ec9159bc44db4f3c68ed160b025
                                  • Instruction Fuzzy Hash: DF11FCA4F0DE4791FA58BB22A8510B822626F04F74B4445F7D52E0B2F2EF3CE5699300
                                  APIs
                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,00007FFE0141EEE8), ref: 00007FFE0141D621
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,00007FFE0141EEE8), ref: 00007FFE0141D62D
                                    • Part of subcall function 00007FFE0141D700: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FFE0141D711
                                  • CreateFileW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,?,?,00007FFE0141EEE8), ref: 00007FFE0141D65F
                                  • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,?,?,?,?,?,?,?,00007FFE0141EEE8), ref: 00007FFE0141D680
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                  • String ID: CONOUT$
                                  • API String ID: 3230265001-3130406586
                                  • Opcode ID: e8436ed983646b7741b880c1e310600c66f6064bdfef0de261db91b68aa38882
                                  • Instruction ID: 8c6419654f8f04afc853f8eca34c5d0550483b83751cf9300b12aab11a16ef47
                                  • Opcode Fuzzy Hash: e8436ed983646b7741b880c1e310600c66f6064bdfef0de261db91b68aa38882
                                  • Instruction Fuzzy Hash: C8113976A18A4282E7508F95F44436973A0FB88B9DF104135DA8D4BB38CF7CD855CB01
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FormatFromUnicode_$Dealloc
                                  • String ID: %s(%R)$<%s object at %p>
                                  • API String ID: 1714529502-296555854
                                  • Opcode ID: 8da2c259c459dc00163e45fe031fe5c6f94d91e17c1133588364775a34608aa9
                                  • Instruction ID: de16b4d9a23ca8989f0fe084dc8c064a0d53a3ee9609ae32bc0410041f7168b8
                                  • Opcode Fuzzy Hash: 8da2c259c459dc00163e45fe031fe5c6f94d91e17c1133588364775a34608aa9
                                  • Instruction Fuzzy Hash: C90108A1A09E8689DE049F17E480079A360FB68FE4B089175CE2D573B4DE78D895C308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_Long$Long_MaskOccurredStringSubtypeType_Unsigned
                                  • String ID: int expected instead of float
                                  • API String ID: 3681780221-2411840549
                                  • Opcode ID: 5481670f98ec182ff884156e168aac6c34ddbac41324025a937a719b641be7e4
                                  • Instruction ID: 6c7639b44a23258d1b2103b7a070aeb38e23488d0cc6616a5a37e1c4c86b6db8
                                  • Opcode Fuzzy Hash: 5481670f98ec182ff884156e168aac6c34ddbac41324025a937a719b641be7e4
                                  • Instruction Fuzzy Hash: 69011222F08D4299EA249B27E9440756361AF64FF4B1887B1D93E963F4EF2CE4558208
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_Format$memcpy
                                  • String ID: bytes too long (%zd, maximum length %zd)$expected bytes, %s found
                                  • API String ID: 437140070-1985973764
                                  • Opcode ID: 10fea624f8b6b17753902bd7af56b3cf3030963c9f4ce13bdd61654d3b99bad9
                                  • Instruction ID: 9c006eeeae496f3b81b6c6b5325852a73298774687950b1191b130ae8102f7b6
                                  • Opcode Fuzzy Hash: 10fea624f8b6b17753902bd7af56b3cf3030963c9f4ce13bdd61654d3b99bad9
                                  • Instruction Fuzzy Hash: B3011EA1E08E4A8DEA108B57D4801786360AB75FB4F6093B2C97D732F0CE2CD49D8308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: c6102f14bd0e1dc4eb31f26872076cec08b0579beb4ca12afd9d0d1ba956034a
                                  • Instruction ID: d423d577307a5bfc24f2828d3bbe81d8f2a116cb0934d0f1ea418cd3dd679a5a
                                  • Opcode Fuzzy Hash: c6102f14bd0e1dc4eb31f26872076cec08b0579beb4ca12afd9d0d1ba956034a
                                  • Instruction Fuzzy Hash: 16F0DA61A2DA42C2EB588F25E8943792360AF98789F851435E59F8E2B4DF7CE488D700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                  • Instruction ID: 50dfdac6b36d14276ae87a113e627a7b96d504acd995eabf71d25e6ee50c947a
                                  • Opcode Fuzzy Hash: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                  • Instruction Fuzzy Hash: 95F0C821619707A1EAB46B24E4457399320AF497A2FD40635D57D691F4CF2CD445E320
                                  APIs
                                  • GetCPInfo.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FFE013EED0C
                                  • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FFE013EEE2D
                                  • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FFE013EEF43
                                  • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FFE013EEFC9
                                  • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FFE013EF097
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide$Info
                                  • String ID:
                                  • API String ID: 1775632426-0
                                  • Opcode ID: 37aa3bd256a071d7114397c104d9f3dc587f8c0504604195be426d22ce84bd86
                                  • Instruction ID: 1235af95c111bc7e6c2ca42b1d46d34393d4b0985c0b3ad1cd68bd683768f1f8
                                  • Opcode Fuzzy Hash: 37aa3bd256a071d7114397c104d9f3dc587f8c0504604195be426d22ce84bd86
                                  • Instruction Fuzzy Hash: E0D1DD12E0C38246FB746B55849027E6AD4EF64794F6B4236D95C0FBFCDE7EE8858201
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+$NameName::
                                  • String ID:
                                  • API String ID: 168861036-0
                                  • Opcode ID: 05f6c9b8cef8aaff6f7b8e4e38ae0c77bd3df8e4f84dc53290f47b7289bc6966
                                  • Instruction ID: 454a28f1b2dc78d69c0acde11d3561c1ac256bd0e289c46eed20de02e843d6c8
                                  • Opcode Fuzzy Hash: 05f6c9b8cef8aaff6f7b8e4e38ae0c77bd3df8e4f84dc53290f47b7289bc6966
                                  • Instruction Fuzzy Hash: CC6147B6B08E5198E710DF26E4805BC3BA5EB45B98F8480B7DA4D53BA6DF38D465C700
                                  APIs
                                  • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013A2509), ref: 00007FFE013A257A
                                  • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013A2509), ref: 00007FFE013A25A7
                                  • GetFullPathNameW.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013A2509), ref: 00007FFE013D7555
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013A2509), ref: 00007FFE013D7562
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013A2509), ref: 00007FFE013D7599
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FullNamePath$ErrorLast
                                  • String ID:
                                  • API String ID: 457693415-0
                                  • Opcode ID: 8d511332f94ab66b54b28a8ebd2e96d388545995aa5be56feb9ca80927fc0617
                                  • Instruction ID: 96ff5fa8eb8cff2ca958db7a715bbdcdb40b7f977b5cbd5f358a87fa1e9f431d
                                  • Opcode Fuzzy Hash: 8d511332f94ab66b54b28a8ebd2e96d388545995aa5be56feb9ca80927fc0617
                                  • Instruction Fuzzy Hash: 3B31CD61F08B52C6FB14AB71A8145BD32A5BF48B88F5A4134DE5E6BBB5DF3CE8018341
                                  APIs
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FFE1A4524AF), ref: 00007FFE1A453452
                                    • Part of subcall function 00007FFE1A4548F4: GetLastError.KERNEL32(?,?,?,00007FFE1A451831), ref: 00007FFE1A454918
                                    • Part of subcall function 00007FFE1A4548F4: SetLastError.KERNEL32(?,?,?,00007FFE1A451831), ref: 00007FFE1A4549C0
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FFE1A4524AF), ref: 00007FFE1A45343D
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FFE1A4524AF), ref: 00007FFE1A453444
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FFE1A4524AF), ref: 00007FFE1A45344B
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FFE1A4524AF), ref: 00007FFE1A453459
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$ErrorLast$terminate
                                  • String ID:
                                  • API String ID: 3823219622-0
                                  • Opcode ID: 20405dfbf244a3566e5a1d9f09ca0e0238db28aba3bd7d0cc38adc7fa1fba175
                                  • Instruction ID: 0000d0e68791dc3b55fdb2b5552edc5c41549bea47b95bc3b337256b9b63df7f
                                  • Opcode Fuzzy Hash: 20405dfbf244a3566e5a1d9f09ca0e0238db28aba3bd7d0cc38adc7fa1fba175
                                  • Instruction Fuzzy Hash: A7318AB2B08E8296EA15EB5698500BA2764FF85FA4F1544F3DE0D07762DE3CE461C340
                                  APIs
                                    • Part of subcall function 00007FFE013A18DC: GetModuleHandleExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE013A1868), ref: 00007FFE013A1920
                                  • CreateThread.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FFE013A4F8A
                                  • ResumeThread.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FFE013A4FA3
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFE013D8369
                                  • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FFE013D8385
                                  • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0 ref: 00007FFE013D8394
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: HandleThread$CloseCreateErrorFreeLastLibraryModuleResume
                                  • String ID:
                                  • API String ID: 1364334503-0
                                  • Opcode ID: abb107f651fd450bd483c6b75e6516ba23bdd0948844ca67fb2ffd94d36fe676
                                  • Instruction ID: 25c0ea0b6b581457bf256a36851ea8d614bd96c86ee1ee71ce6438bc74758028
                                  • Opcode Fuzzy Hash: abb107f651fd450bd483c6b75e6516ba23bdd0948844ca67fb2ffd94d36fe676
                                  • Instruction Fuzzy Hash: 1121C025A0EB0386FF149B75A8142B96294AF45BB8F6A0734DA7E0E3F5DF7CE4058200
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _set_statfp
                                  • String ID:
                                  • API String ID: 1156100317-0
                                  • Opcode ID: d87a420c425093582bf0768a505271f7d8736b4892105bec4a5daca04c7c3215
                                  • Instruction ID: e56d3a75fd42949ba64e2dfdd263e08f7a668cddd8ea776ae3bf94bbafd1f98e
                                  • Opcode Fuzzy Hash: d87a420c425093582bf0768a505271f7d8736b4892105bec4a5daca04c7c3215
                                  • Instruction Fuzzy Hash: C5117022E5CA3709FB5411AAE4DA37921417F54378F4B0A38EB6E1E6F7FE2DA8454200
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _set_statfp
                                  • String ID:
                                  • API String ID: 1156100317-0
                                  • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                  • Instruction ID: e732df3242199706d2416e67c00cb830c5709a3f3d7767493264369fc2b661a6
                                  • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                  • Instruction Fuzzy Hash: 4A11E332E1CA1B61FAFC3568D45637981507F54376FD50634EA6EBE6D6CE2CA840A130
                                  APIs
                                  • FlsGetValue.KERNEL32(?,?,?,00007FF733F798B3,?,?,00000000,00007FF733F79B4E,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F7A6BF
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F798B3,?,?,00000000,00007FF733F79B4E,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F7A6DE
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F798B3,?,?,00000000,00007FF733F79B4E,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F7A706
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F798B3,?,?,00000000,00007FF733F79B4E,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F7A717
                                  • FlsSetValue.KERNEL32(?,?,?,00007FF733F798B3,?,?,00000000,00007FF733F79B4E,?,?,?,?,?,00007FF733F79ADA), ref: 00007FF733F7A728
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: 25d361a094b2c99e262beff41eaee06ac9464b6f74968b1c14d3cfe42ff85be4
                                  • Instruction ID: 1722a60fb13c39e38f1e3a1bd63acae9c428f64370a41e0a9169df50994b0cff
                                  • Opcode Fuzzy Hash: 25d361a094b2c99e262beff41eaee06ac9464b6f74968b1c14d3cfe42ff85be4
                                  • Instruction Fuzzy Hash: 7811AF20A0C24322FEF8732555815B9E1915FA83F1FD44334F83D267E6DE2CE852A720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Value
                                  • String ID:
                                  • API String ID: 3702945584-0
                                  • Opcode ID: a853173f6999e7d5ef833d9e4f06cbd56a904a1eb1d6261c936ae8f95b9bedb9
                                  • Instruction ID: 72003bf37c3cee9c15ba18dc83a276cde5b74d6e6415c80d575aba204629b212
                                  • Opcode Fuzzy Hash: a853173f6999e7d5ef833d9e4f06cbd56a904a1eb1d6261c936ae8f95b9bedb9
                                  • Instruction Fuzzy Hash: 93114820A0820322FEF87321049157AA2920F593F6ED81734F93E2A3E2ED2DB4907331
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Value
                                  • String ID: FlsGetValue$__based(
                                  • API String ID: 1883355122-1499225077
                                  • Opcode ID: 3cde031b42971c501b99c4d062fe830ef97904619396822104c6fd8221abb387
                                  • Instruction ID: d33c3c7ce0bc32c51e7dd6365457288edb679615672bbbdee91d89cb0ef70ddf
                                  • Opcode Fuzzy Hash: 3cde031b42971c501b99c4d062fe830ef97904619396822104c6fd8221abb387
                                  • Instruction Fuzzy Hash: DB1130A1B0DF4686EA54BF16A44117973A0AB04FB0B4446F6E66E072E5DF3CE865C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$Value
                                  • String ID: FlsGetValue$__based(
                                  • API String ID: 1883355122-1499225077
                                  • Opcode ID: 1694fcc8876eaf970d65f9f7cf6b22be3eb451f9a49f8659623d94e435215b4e
                                  • Instruction ID: 9c552df1383432e870af1551cb30fdaf83179a7076fe360df967fc763b6401c2
                                  • Opcode Fuzzy Hash: 1694fcc8876eaf970d65f9f7cf6b22be3eb451f9a49f8659623d94e435215b4e
                                  • Instruction Fuzzy Hash: AD119EA0F09F4286EA24BB16A44507963A1BB44FB0B4442F6DA2D037F5DF3CE866C740
                                  APIs
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FFE1A452F17), ref: 00007FFE1A45C1E7
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FFE1A452F17), ref: 00007FFE1A45C1FE
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FFE1A452F17), ref: 00007FFE1A45C219
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FFE1A452F17), ref: 00007FFE1A45C22D
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FFE1A452F17), ref: 00007FFE1A45C247
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$terminate
                                  • String ID:
                                  • API String ID: 579254285-0
                                  • Opcode ID: b9a64d3d6ee68471bce02abac799c6deb2a21801f345f0dcf847466b3a3e6a69
                                  • Instruction ID: 9eb245c514e503856435207a2f27ab983ae5207cf8ddf2a7cd9c8cf9878964d3
                                  • Opcode Fuzzy Hash: b9a64d3d6ee68471bce02abac799c6deb2a21801f345f0dcf847466b3a3e6a69
                                  • Instruction Fuzzy Hash: 85015EB1F09E8691EA28BBA2E04513C2364EF14F74F0848F7DA1C06775DE2CE8A08615
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ArgsCallFunctionObject_$DeallocDict_Err_ErrorItemOccurredWith
                                  • String ID:
                                  • API String ID: 3152022114-0
                                  • Opcode ID: c9dcb3608dc007308e1f26ca52dd96ee1ce58cfc780adf19271e90043c86d229
                                  • Instruction ID: ee593ccdc59f043c8473804bd5ded1eaab1b2bd9fe54d3325e4d115616bf6f44
                                  • Opcode Fuzzy Hash: c9dcb3608dc007308e1f26ca52dd96ee1ce58cfc780adf19271e90043c86d229
                                  • Instruction Fuzzy Hash: 44016752F09E4389FF594B27E9441399391EF68FE0B489474DD2D577B4EE2CE4408718
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: verbose
                                  • API String ID: 3215553584-579935070
                                  • Opcode ID: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                  • Instruction ID: d7d90758f7aca1b777f345628fe6c929d519709113003fee419328733711b7a7
                                  • Opcode Fuzzy Hash: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                  • Instruction Fuzzy Hash: EC91B232A08647A1F7F1AF25D45077DB292AB00BDAFC44136EA5D663D5DE3CE445A320
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                  • API String ID: 3215553584-1196891531
                                  • Opcode ID: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                  • Instruction ID: e244920903333fe87551f4e4a82de5673e5a7682d20df7f3b32f77e43d2d11fb
                                  • Opcode Fuzzy Hash: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                  • Instruction Fuzzy Hash: 7B81C572E08343A5F7F4AF25C110278A6A0AB117CAFD58135EA1DB77A5DF2DE801B721
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 2395640692-1018135373
                                  • Opcode ID: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                  • Instruction ID: f09b2880f5278a1c1969c7b4bc78e4f5769b867669785e20fe265740188b627e
                                  • Opcode Fuzzy Hash: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                  • Instruction Fuzzy Hash: E451C032B19643AADBA4EF15E814A7CB791EB44B88FD08134DA8D53789DF7CE841D710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                  • String ID: csm$csm
                                  • API String ID: 3896166516-3733052814
                                  • Opcode ID: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                  • Instruction ID: 99da21929b2ab92c4d124a699c0a0bfa28dc2102755feada81f05263f0a7558b
                                  • Opcode Fuzzy Hash: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                  • Instruction Fuzzy Hash: 5051A233A182439AEBB4AF119244368B7A0EB75B88FD44135DA6C67BE1CF3CE450DB11
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CallEncodePointerTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 3544855599-2084237596
                                  • Opcode ID: c1bd0f280093dc077c2402edd2c21f20ddcaf15bcc9dc74a739a9fc2baeea3e9
                                  • Instruction ID: 90e4a52ca820647bb133055653ff004d920eb98234683f844b8189f46eb3e3c4
                                  • Opcode Fuzzy Hash: c1bd0f280093dc077c2402edd2c21f20ddcaf15bcc9dc74a739a9fc2baeea3e9
                                  • Instruction Fuzzy Hash: BD61A233908BC696D770AB25E5407AAB7A0FB95788F844235EB9C13B95DF7CE090CB10
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,?,?,?,?,?,?,00007FFE013A40CC), ref: 00007FFE01388172
                                  • LCMapStringW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,?,?,?,?,?,?,00007FFE013A40CC), ref: 00007FFE013CEB3E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProcString
                                  • String ID: IsValidLocaleName$LCMapStringEx
                                  • API String ID: 3874510993-3130311144
                                  • Opcode ID: cbc00fa42a12b1a8c4d9a865d6d9b3df3094b15a043788229a0d056418eaa084
                                  • Instruction ID: a83246c6d2ff71ffcae7479602d41636ec64c99a482dcd6ed233f3e0d07147bc
                                  • Opcode Fuzzy Hash: cbc00fa42a12b1a8c4d9a865d6d9b3df3094b15a043788229a0d056418eaa084
                                  • Instruction Fuzzy Hash: FC41B332B19B4286EB64CB15E81077A67E0BB48BD8F055235ED6D5B7B4EF3CE8058740
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,?,?,?,?,?,?,00007FFE013EF22F), ref: 00007FFE013ED638
                                  • CompareStringW.API-MS-WIN-CORE-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,00007FFE013EF22F), ref: 00007FFE013ED700
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressCompareProcString
                                  • String ID: AppPolicyGetThreadInitializationType$CompareStringEx
                                  • API String ID: 108076903-1200376162
                                  • Opcode ID: 30d2520cc01e508eb23018c8aeae5952f2c3f42758c4307ec194bc7423b5993b
                                  • Instruction ID: 4d8a752273e4bb486abd1c71b8eb7f53340a7ddcdfc4eb91fb41bd14f7c58586
                                  • Opcode Fuzzy Hash: 30d2520cc01e508eb23018c8aeae5952f2c3f42758c4307ec194bc7423b5993b
                                  • Instruction Fuzzy Hash: 8831C032B09B4282EB60CB25F8107A563E0BB58BE8F455135ED5D4B7B8EF3CE8458B40
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,?,?,?,?,00007FFE013D80CD,?,?,?,?,?,?,?,00000000), ref: 00007FFE013ED8A2
                                  • GetDateFormatW.API-MS-WIN-CORE-DATETIME-L1-1-0(?,?,?,?,?,?,?,00007FFE013D80CD,?,?,?,?,?,?,?,00000000), ref: 00007FFE013ED950
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressDateFormatProc
                                  • String ID: GetDateFormatEx$RoInitialize
                                  • API String ID: 2680382325-2816274727
                                  • Opcode ID: 3cbcdcd87a5581ac5b4be722e370957f0920fc86bcbb390c1353a9f807368591
                                  • Instruction ID: 38d832f5797ab5f93f9034a4654189f5e6beb9dddaf46b10aa3f6f29d5431e88
                                  • Opcode Fuzzy Hash: 3cbcdcd87a5581ac5b4be722e370957f0920fc86bcbb390c1353a9f807368591
                                  • Instruction Fuzzy Hash: 74316C72B09B0282FB14CB16E81066567E1BB98BD4F0A5235EE5D5B7F8EF3CE4058740
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,?,?,?,?,00007FFE013D8170,?,?,?,?,?,?,?,00000000), ref: 00007FFE013EDBDE
                                  • GetTimeFormatW.API-MS-WIN-CORE-DATETIME-L1-1-0(?,?,?,?,?,?,?,00007FFE013D8170,?,?,?,?,?,?,?,00000000), ref: 00007FFE013EDC86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressFormatProcTime
                                  • String ID: GetTimeFormatEx$RoInitialize
                                  • API String ID: 3572143191-3078538569
                                  • Opcode ID: 50b84c3166a7a606b15ed9c35499d240a258922d1085a1f3b1407689fb808eb0
                                  • Instruction ID: dcc4b289084f228fbee3b41eb8fa7458daa3df709cf433952d3b256d164cd9c6
                                  • Opcode Fuzzy Hash: 50b84c3166a7a606b15ed9c35499d240a258922d1085a1f3b1407689fb808eb0
                                  • Instruction Fuzzy Hash: 07319C61B09B4282FB14CB16E85056567E1BB98BD4F0A5239EE5D5BBF8EF3CE8058700
                                  APIs
                                  • CreateDirectoryW.KERNEL32(00000000,?,00007FF733F6324C,?,?,00007FF733F63964), ref: 00007FF733F67642
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CreateDirectory
                                  • String ID: %.*s$%s%c$\
                                  • API String ID: 4241100979-1685191245
                                  • Opcode ID: 1156698ca0d33aa8d2468b4f0fdefbfa17a3fd1640f2d1a941dba21d9585616c
                                  • Instruction ID: 4a4899ba0585046ff4067c679a5e6c29bb31e26758fc5971f5e4f6962ab873d7
                                  • Opcode Fuzzy Hash: 1156698ca0d33aa8d2468b4f0fdefbfa17a3fd1640f2d1a941dba21d9585616c
                                  • Instruction Fuzzy Hash: BE310821619AC3A5EAB1AB21E4107AAA354FF84BE0FC04231FE6D537D9EF2CD6059710
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE013934B6,?,?,?,00007FFE013D39B1,?,?,?,?,00007FFE013978EA,?,?,?), ref: 00007FFE01396355
                                  • TlsSetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FFE013934B6,?,?,?,00007FFE013D39B1,?,?,?,?,00007FFE013978EA,?,?,?), ref: 00007FFE013D347A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProcValue
                                  • String ID: FlsSetValue$LCMapStringEx
                                  • API String ID: 1414840956-3586097892
                                  • Opcode ID: e8f73a9f15f5acc4ace477647e8abd823f3b94cfbf3b3b9d69bf812f061f4f2f
                                  • Instruction ID: d3002d9d9561535b864edc7bac68f2e28c9f0c97eac2b45b81994dee7a4134f0
                                  • Opcode Fuzzy Hash: e8f73a9f15f5acc4ace477647e8abd823f3b94cfbf3b3b9d69bf812f061f4f2f
                                  • Instruction Fuzzy Hash: 9621D1A1B0EA0242FB088B15FC501B523A1AF58BD4F495139ED6E4F7F4EF2CE8448380
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE0139E1FB), ref: 00007FFE0139E2E0
                                  • GetUserDefaultLCID.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,?,?,00007FFE0139E1FB), ref: 00007FFE013D605D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressDefaultProcUser
                                  • String ID: GetUserDefaultLocaleName$IsValidLocaleName
                                  • API String ID: 306211784-3812970866
                                  • Opcode ID: 6de41d5f5313b39fdf11730a669525d9c1f1cd8a2f9373217a76878fdf8f655c
                                  • Instruction ID: cc041d0b60f5a4d66791973aca50bccc69ccc18e983f671e19fd100471487a8b
                                  • Opcode Fuzzy Hash: 6de41d5f5313b39fdf11730a669525d9c1f1cd8a2f9373217a76878fdf8f655c
                                  • Instruction Fuzzy Hash: 4C21E0A1B0DA4342FB089B54F8201B513E1AF59BD8F055136ED6D1F7F4EE2CE8488340
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE01396FE6), ref: 00007FFE0139769F
                                  • TlsAlloc.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FFE01396FE6), ref: 00007FFE013976DF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressAllocProc
                                  • String ID: FlsAlloc$LCMapStringEx
                                  • API String ID: 2924745751-1958574131
                                  • Opcode ID: 52871a79671c4f628470ebf279ca615ca428cd953d39a408f8540e4ea56dfa3a
                                  • Instruction ID: d7989099a4991aef03d92236d8b1761e3baabffcc01efcd621f4a3bc2726fa76
                                  • Opcode Fuzzy Hash: 52871a79671c4f628470ebf279ca615ca428cd953d39a408f8540e4ea56dfa3a
                                  • Instruction Fuzzy Hash: F321A462A1A60341FB588758E8505B523A1AF047E8F055135ED6D5F7F4EE2CF8448740
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE013ED154,?,?,?,?,00007FFE0139709B), ref: 00007FFE013ED799
                                  • TlsFree.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FFE013ED154,?,?,?,?,00007FFE0139709B), ref: 00007FFE013ED804
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressFreeProc
                                  • String ID: FlsFree$LCMapStringEx
                                  • API String ID: 4110577592-1627765421
                                  • Opcode ID: 08e3f97a92b361267e144c6ae74d5b496c91b98002f5abc4f9b2827e390f001c
                                  • Instruction ID: b9bd1d6cbf655921ae8baae799e97ba81dfbb37ef863a5fd80d1fda6271d44f2
                                  • Opcode Fuzzy Hash: 08e3f97a92b361267e144c6ae74d5b496c91b98002f5abc4f9b2827e390f001c
                                  • Instruction Fuzzy Hash: 20218061B1DB4242FB188B54E8206B523E1AF59BD8F055239ED2E4F7F8EF2CE9448240
                                  APIs
                                  • TlsSetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FFE013A1F4E,?,?,?,?,?,00007FFE013A1F01), ref: 00007FFE013D3232
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE013A1F4E,?,?,?,?,?,00007FFE013A1F01), ref: 00007FFE013D3248
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProcValue
                                  • String ID: FlsSetValue$LCMapStringEx
                                  • API String ID: 1414840956-3586097892
                                  • Opcode ID: 53de3e512ccb66b431a7c3155f2d458e209e329cd8c00b4f72dde238609dd6ac
                                  • Instruction ID: 4d34fc4f47b66d6f98bea36f691e16aeea5ec073d61c1ef1ae3435c7a1999857
                                  • Opcode Fuzzy Hash: 53de3e512ccb66b431a7c3155f2d458e209e329cd8c00b4f72dde238609dd6ac
                                  • Instruction Fuzzy Hash: 1F213165B1AB0242FB049B29FC5017563926F487B4F059639D96D4B7F4EE2CF8498240
                                  APIs
                                  • TlsSetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FFE013A24DE,?,?,?,?,?,?,?,?,?,00007FFE013A2379), ref: 00007FFE013D32D3
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE013A24DE,?,?,?,?,?,?,?,?,?,00007FFE013A2379), ref: 00007FFE013D32E9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProcValue
                                  • String ID: FlsSetValue$LCMapStringEx
                                  • API String ID: 1414840956-3586097892
                                  • Opcode ID: b6a1fe3d016932c687377a0b0bd6db3313e0398f0c172229d9a6fa604d345480
                                  • Instruction ID: c30292c32f5168afffa18f5df8487b88159038c94a705ed1ea42e25d9a8a5990
                                  • Opcode Fuzzy Hash: b6a1fe3d016932c687377a0b0bd6db3313e0398f0c172229d9a6fa604d345480
                                  • Instruction Fuzzy Hash: 1E213DA5B1AB0242FB449B18F85027523A1BF487A4F159639D96E4F7F8EE7CF8498340
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,00000000,00007FFE01393484,?,?,?,00007FFE013D39B1,?,?,?,?,00007FFE013978EA,?,?,?), ref: 00007FFE01393AB9
                                  • TlsGetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,00000000,00007FFE01393484,?,?,?,00007FFE013D39B1,?,?,?,?,00007FFE013978EA,?,?,?), ref: 00007FFE013CC59E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProcValue
                                  • String ID: FlsGetValue$LCMapStringEx
                                  • API String ID: 1414840956-552164261
                                  • Opcode ID: d64a5d3ffbdea9515a3ca7683bb0a3791a94bfe81829277ad067d39434604beb
                                  • Instruction ID: 95b31fe44b93c85cc3daa446e6fd799ad9d2b9093e375d36829f91ff1fcb40e9
                                  • Opcode Fuzzy Hash: d64a5d3ffbdea9515a3ca7683bb0a3791a94bfe81829277ad067d39434604beb
                                  • Instruction Fuzzy Hash: 1D215061F19B0282FF448B29E8501352391AF587B4F06A639D96D4F7F8EE3CF8898300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: terminate
                                  • String ID: csm
                                  • API String ID: 1821763600-1018135373
                                  • Opcode ID: 438b22e0981f78b69658ddcae18d3ec84825a9baaa088e9bbe4ec400c4afb42d
                                  • Instruction ID: 5fce666970931287aff9fe2a19c91e6931360765b7bf51daedbd625676533d6a
                                  • Opcode Fuzzy Hash: 438b22e0981f78b69658ddcae18d3ec84825a9baaa088e9bbe4ec400c4afb42d
                                  • Instruction Fuzzy Hash: 4E11A2F5F08F8AC1FB69BB6A90841782762FF11F62B5484F6C90D43664DE2DD8E1C201
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message$ByteCharMultiWide
                                  • String ID: Error$Error/warning (ANSI fallback)
                                  • API String ID: 1878133881-653037927
                                  • Opcode ID: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                  • Instruction ID: 60f148c85e90f347b444a7fb86b5c8f9c7badafedda5aa3346994c5e9e13af01
                                  • Opcode Fuzzy Hash: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                  • Instruction Fuzzy Hash: 1511B272628B86A1FBB4AB10F451BA9B364FB44784FD01135DA5C27654DF3DDA05C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Message$ByteCharMultiWide
                                  • String ID: Error/warning (ANSI fallback)$Warning
                                  • API String ID: 1878133881-2698358428
                                  • Opcode ID: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                  • Instruction ID: 0fc75b01671e1ba70352d20c0d425bbb3defb67b954b18866223dc55b52d93d0
                                  • Opcode Fuzzy Hash: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                  • Instruction Fuzzy Hash: 03110472628B86A1FBB0AB00F450BA9B364FF84784FC01135DA9C27654DF3CDA04C710
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_FormatLongLong_SubtypeType_
                                  • String ID: one character bytes, bytearray or integer expected
                                  • API String ID: 1180759657-2748977362
                                  • Opcode ID: f3d724d38b75ea96a8abb4e1a76ba44acfbf27b48ab95195d0f25d8558bf1e96
                                  • Instruction ID: 32f916a66a5aca26af2e5d311dbecd7f8f820555c41d52a9b344267ace044a05
                                  • Opcode Fuzzy Hash: f3d724d38b75ea96a8abb4e1a76ba44acfbf27b48ab95195d0f25d8558bf1e96
                                  • Instruction Fuzzy Hash: 60113361F08E4689FB548F17E54417963A0EF68FA4F5880B1DAAD97770CF2CD498D708
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_StringSubtypeType_
                                  • String ID: can't delete attribute$not a ctype instance
                                  • API String ID: 468607378-2740123057
                                  • Opcode ID: 1fafcbcae81ec3fd018d3d4226a6b337f39236e74224f4e96270f17a336483e8
                                  • Instruction ID: 97a8a4481da00c02e344b8905bdf11a7a41bf26ee02fba052f08f8e555123da1
                                  • Opcode Fuzzy Hash: 1fafcbcae81ec3fd018d3d4226a6b337f39236e74224f4e96270f17a336483e8
                                  • Instruction Fuzzy Hash: 8E110A62B08F4585EB10CB16E440069A760FB68FF4B458271DAAD67B68DF7CD491C708
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: DeallocErr_String
                                  • String ID: _type_ must be a type$_type_ must have storage info
                                  • API String ID: 1259552197-214983684
                                  • Opcode ID: 31ae3acbab6cf956dfcdfe9e0334822512d276cd84fc02f0c011a73acb6f6fc2
                                  • Instruction ID: 95a4cbfe68438fa25f871a27d1c0179fb79d0d147f114edd16fd50a8d8b9db7c
                                  • Opcode Fuzzy Hash: 31ae3acbab6cf956dfcdfe9e0334822512d276cd84fc02f0c011a73acb6f6fc2
                                  • Instruction Fuzzy Hash: 7B0129A5E0CF0689EA548B06D84027863A0FBA5FB0F5481B5C97D763B4DF3CA881C309
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_Long$Long_MaskOccurredStringUnsigned
                                  • String ID: cannot be converted to pointer
                                  • API String ID: 361506457-3065012988
                                  • Opcode ID: 9d78d1695ba62ee1ba72d204a46f331d9aac2d2020aa89fcc41fd74f633a5faa
                                  • Instruction ID: 9f80f08e97daf6f2b75f36234a98e2307e457959331f9ea8cb518dcc091d2a18
                                  • Opcode Fuzzy Hash: 9d78d1695ba62ee1ba72d204a46f331d9aac2d2020aa89fcc41fd74f633a5faa
                                  • Instruction Fuzzy Hash: 03011E21F19E4A89EA149F57E8803786370BF64FE4F1481B1C92D12374DE2CE044C308
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_File_ObjectPrintStringSys_Write__stdio_common_vsprintf
                                  • String ID: stderr
                                  • API String ID: 3428540488-1769798200
                                  • Opcode ID: b85cdcbcb23bfeaac3917966d3ac98d52ea196867f0de5e8bdad10b2158e6464
                                  • Instruction ID: 3ead7f27e1451880e4437819a4b68bfc2c6d79d3e687339f3a2b8dad93fd9453
                                  • Opcode Fuzzy Hash: b85cdcbcb23bfeaac3917966d3ac98d52ea196867f0de5e8bdad10b2158e6464
                                  • Instruction Fuzzy Hash: 4F019E32A29F8186FA609B12F8853A9B3A0FFA8B51F044071CAAD17370DF3CE094C744
                                  APIs
                                  • __C_specific_handler.LIBVCRUNTIME ref: 00007FFE1A45C389
                                    • Part of subcall function 00007FFE1A45C680: _IsNonwritableInCurrentImage.LIBCMT ref: 00007FFE1A45C740
                                    • Part of subcall function 00007FFE1A45C680: RtlUnwindEx.KERNEL32(?,?,?,?,?,?,?,00007FFE1A45C38E), ref: 00007FFE1A45C78F
                                  • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A45C3A1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: C_specific_handlerCurrentImageNonwritableUnwindterminate
                                  • String ID: csm$f
                                  • API String ID: 2215565074-629598281
                                  • Opcode ID: a100106faf02f9425695e37ff6904bd06c41ae4876ec1667ba193be14bb0b118
                                  • Instruction ID: 2ccfb2e6cffbb8ac87f3f49a024c93fc5aad43cac9f6b26326326500d2da16f5
                                  • Opcode Fuzzy Hash: a100106faf02f9425695e37ff6904bd06c41ae4876ec1667ba193be14bb0b118
                                  • Instruction Fuzzy Hash: 40D05EE0F08B4AC2FB343A73944523926845F14F34F0886F2CA08042A18E1E99F5C607
                                  APIs
                                  Strings
                                  • second item in _fields_ tuple (index %zd) must be a C type, xrefs: 00007FFE13337FB0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: DeallocErr_FormatFreeMem_
                                  • String ID: second item in _fields_ tuple (index %zd) must be a C type
                                  • API String ID: 3237669406-2717732800
                                  • Opcode ID: 005435b0ef9407ab09b5a462a8de8b0f0626b263dac59c8c198cb6ebb4c16b1b
                                  • Instruction ID: 2d5fdc33a04d33394618dc46a38f99a30bedac74844deaa3816f6c16e99e52bc
                                  • Opcode Fuzzy Hash: 005435b0ef9407ab09b5a462a8de8b0f0626b263dac59c8c198cb6ebb4c16b1b
                                  • Instruction Fuzzy Hash: 2BE01220F4CE478AE6009B27E8500382320BFA5FB5B1482B1C83FB26B4DF3CA009920D
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: 262d58c94eb70e3f2e97f17b2e8fed4ed4014c40fcaecd92b031746c4b4840c3
                                  • Instruction ID: 84cc6a035341a9d07e47b680511a1fa56fd7df0f9bd1191e8d45a2cbe90a0b15
                                  • Opcode Fuzzy Hash: 262d58c94eb70e3f2e97f17b2e8fed4ed4014c40fcaecd92b031746c4b4840c3
                                  • Instruction Fuzzy Hash: F5318F60F0DA4386FB54AB30E9511B92265BF447A4F150674E9AE0FBF6DE6CF805C300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: 18db2e717d6e9a190dc741c93031587e0ec3cbb847af2f7d68fcb41733bd8954
                                  • Instruction ID: 75b15898a2190620e24e11b7220545c0ff522cf100f2ec76fb0f7e1b9213878a
                                  • Opcode Fuzzy Hash: 18db2e717d6e9a190dc741c93031587e0ec3cbb847af2f7d68fcb41733bd8954
                                  • Instruction Fuzzy Hash: A0319260F0DA4386FB54AB35A9552B96265BF447A4F050734E96E0FBF6DE3CF8058301
                                  APIs
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000001,00007FFE014260F5), ref: 00007FFE01393324
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000001,00007FFE014260F5), ref: 00007FFE01393373
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000001,00007FFE014260F5), ref: 00007FFE01393389
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000001,00007FFE014260F5), ref: 00007FFE013933A1
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000001,00007FFE014260F5), ref: 00007FFE0139340A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: 1ac66b635d249aedb6595ff3c920d5dc40e6242194dc6f8228f48c41243d32ff
                                  • Instruction ID: 4893fab4931243ee8cf002955028934b48ea18d9c2bc1f63d6cb0842355d6d8a
                                  • Opcode Fuzzy Hash: 1ac66b635d249aedb6595ff3c920d5dc40e6242194dc6f8228f48c41243d32ff
                                  • Instruction Fuzzy Hash: 16318D60F0DA4386FB15AB31A9951BD2265BF447A4F060634E96E1FBF6DE7CF8058301
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: 5c77dfd06bf0c4a08de7cbd3e0678428effb9ddff0ba386b0be6a990e184cb36
                                  • Instruction ID: 45868908235a107daf247889f5ea2e2cafb9c46af71aac3079c38b1988e6121f
                                  • Opcode Fuzzy Hash: 5c77dfd06bf0c4a08de7cbd3e0678428effb9ddff0ba386b0be6a990e184cb36
                                  • Instruction Fuzzy Hash: 75317060F0DA4386FB54AB35E99517A6265BF447A4F060634E96E0FBF6DE3CF8058300
                                  APIs
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FFE01382468,?,?,00000000,?,00000000,00007FFE01382036), ref: 00007FFE013937AF
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FFE01382468,?,?,00000000,?,00000000,00007FFE01382036), ref: 00007FFE013937FE
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FFE01382468,?,?,00000000,?,00000000,00007FFE01382036), ref: 00007FFE01393819
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FFE01382468,?,?,00000000,?,00000000,00007FFE01382036), ref: 00007FFE01393831
                                  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000,00007FFE01382468,?,?,00000000,?,00000000,00007FFE01382036), ref: 00007FFE0139389D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: c2ae306a1fc25cde0675015cfd2c7e2ee1f2785b707fe40c3e176b6001e996c2
                                  • Instruction ID: 89bd5dca6eca8b7beed7e872d2e551d7caa354bbbec05a18b65edb61d9d98513
                                  • Opcode Fuzzy Hash: c2ae306a1fc25cde0675015cfd2c7e2ee1f2785b707fe40c3e176b6001e996c2
                                  • Instruction Fuzzy Hash: 64316D60F0DA4386FB54AB35A95517966A5BF447A4F060634E96E0FBF6DE3CF8098300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: 995f622ee0478ad80666a64d0f6f1b33d60a04ac0258514eced1de964909b684
                                  • Instruction ID: aeee2f85fbadcf7683ee3ebd06d4920e71f8a2110ed3e1a62b3b33e5aea198f1
                                  • Opcode Fuzzy Hash: 995f622ee0478ad80666a64d0f6f1b33d60a04ac0258514eced1de964909b684
                                  • Instruction Fuzzy Hash: 61317EA0F0DA4386FB58AB34A95157D62A5BF447A4F060634E96E0FBF6DE3CF8058300
                                  APIs
                                  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139F0A6), ref: 00007FFE0139F2F0
                                  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139F0A6), ref: 00007FFE0139F346
                                  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139F0A6), ref: 00007FFE0139F3BC
                                  • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139F0A6), ref: 00007FFE0139F3D2
                                  • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,?,00007FFE0139F0A6), ref: 00007FFE0139F3EB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CriticalSection$Enter$Leave
                                  • String ID:
                                  • API String ID: 2801635615-0
                                  • Opcode ID: 912060f8c2e11bf4a4245dfa8e8fe6ad5dfb5130a46c5078e16335f9b2efa0b3
                                  • Instruction ID: 9fc52aa7b22e7c85df3d8cbcf0a11d87ee78a503298fe3941b6ea0d225f90dbd
                                  • Opcode Fuzzy Hash: 912060f8c2e11bf4a4245dfa8e8fe6ad5dfb5130a46c5078e16335f9b2efa0b3
                                  • Instruction Fuzzy Hash: DF31B626A19B4682EB548F11E8842796B58FF94BD4F1A1136DD9E4B3F4DFBCE481C300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                  • String ID:
                                  • API String ID: 2718003287-0
                                  • Opcode ID: 0739f85a4d911baae0561c1f2f5b651aa469f8b70ac1dc09fd50f765aaaafbc7
                                  • Instruction ID: 48ef72772ce579b8b5253ca601f6300677c55d129e4cc18e8125638dd54e593c
                                  • Opcode Fuzzy Hash: 0739f85a4d911baae0561c1f2f5b651aa469f8b70ac1dc09fd50f765aaaafbc7
                                  • Instruction Fuzzy Hash: 8BD15832B08A8299E760DF79D4402AC77B1FB457D9BC08235EE5EA7B99DE38D406D310
                                  APIs
                                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF733F7C25B), ref: 00007FF733F7C38C
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF733F7C25B), ref: 00007FF733F7C417
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ConsoleErrorLastMode
                                  • String ID:
                                  • API String ID: 953036326-0
                                  • Opcode ID: 76adbd728b317254a89cb4c791728419eb9f151af89ead0c9a06842c56e3605f
                                  • Instruction ID: 9bdbd287cf07a033e1af24227b8acfea9862b672d82515007b2c1179dedd0a68
                                  • Opcode Fuzzy Hash: 76adbd728b317254a89cb4c791728419eb9f151af89ead0c9a06842c56e3605f
                                  • Instruction Fuzzy Hash: B791C622F08653A5F7B0AF6594406BDABA0BB04BC9FD44135EE4E76A94CF3CD441E720
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+=
                                  • String ID:
                                  • API String ID: 3821211099-0
                                  • Opcode ID: ff692e02c459a60db3a90965a0e40e8b060188389d68a8067c539dd7fc5ea092
                                  • Instruction ID: d89314ddfee0b6b48a3e95a9c7cdbfcd39b63337f576e859d5cde3084192b73b
                                  • Opcode Fuzzy Hash: ff692e02c459a60db3a90965a0e40e8b060188389d68a8067c539dd7fc5ea092
                                  • Instruction Fuzzy Hash: 95418EA6B08F5285FB10EF53C8800BD63A1BB01B94F4448B3DE5C97AAADF38D561C700
                                  APIs
                                    • Part of subcall function 00007FFE013A18DC: GetModuleHandleExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE013A1868), ref: 00007FFE013A1920
                                  • CreateThread.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FFE013A1891
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FFE013D7231
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CreateErrorHandleLastModuleThread
                                  • String ID:
                                  • API String ID: 182981130-0
                                  • Opcode ID: ba78546b4dc13ba6ab3297fd41d521de73a6e816c0c9ce01e36a2a3c0f0ceb39
                                  • Instruction ID: 7dc3074d31e096335ace5e96500cc4969b95218fcc0b9d88354970861141c835
                                  • Opcode Fuzzy Hash: ba78546b4dc13ba6ab3297fd41d521de73a6e816c0c9ce01e36a2a3c0f0ceb39
                                  • Instruction Fuzzy Hash: 9021BE26E0DB4286FF14DF62E45007A66A8BF88B84F5A0530EE4D4B7B5DE3CE4018700
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AdjustPointerabort
                                  • String ID:
                                  • API String ID: 3954111656-0
                                  • Opcode ID: 309a1d1c1b1e5aa468863802a9d91ddaa5992cf4c1454c0b22ad85108a3dbc05
                                  • Instruction ID: 63af29798bcbee8b9db50257fc1c81f6466864dba8c81ec52c70b2f31787f594
                                  • Opcode Fuzzy Hash: 309a1d1c1b1e5aa468863802a9d91ddaa5992cf4c1454c0b22ad85108a3dbc05
                                  • Instruction Fuzzy Hash: 462147A2B08F8292EA20BB57D0950792760FB54FA4F0844F7EB0C47B66CE28F5B58740
                                  APIs
                                  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FFE01423CC2,?,?,?,?,00007FFE013D4EB5,?,?,?,00007FFE0139ADB6,?,?,?), ref: 00007FFE01423B7A
                                  • FlushFileBuffers.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00007FFE01423CC2,?,?,?,?,00007FFE013D4EB5,?,?,?,00007FFE0139ADB6,?,?,?), ref: 00007FFE01423BAB
                                    • Part of subcall function 00007FFE0139F850: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FFE01397C74,?,?,?,00007FFE013978F7,?,?,?,00007FFE0139AC33,?,?,?,00007FFE0139ADB6), ref: 00007FFE0139F85A
                                    • Part of subcall function 00007FFE0139F850: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FFE01397C74,?,?,?,00007FFE013978F7,?,?,?,00007FFE0139AC33,?,?,?,00007FFE0139ADB6), ref: 00007FFE0139F8A0
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FFE01423CC2,?,?,?,?,00007FFE013D4EB5,?,?,?,00007FFE0139ADB6,?,?,?), ref: 00007FFE01423BBF
                                  • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FFE01423CC2,?,?,?,?,00007FFE013D4EB5,?,?,?,00007FFE0139ADB6,?,?,?), ref: 00007FFE01423BEE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CriticalSection$BuffersEnterFileFlushLeave
                                  • String ID:
                                  • API String ID: 1312186065-0
                                  • Opcode ID: 4f2888ff7bbf60e021e831f350996abbc6d04b76299a57556fe12fb360717843
                                  • Instruction ID: 60098e3b1648e97287d31ce210a6020be41115dfd5ff37a8f9fbf69e761e9adc
                                  • Opcode Fuzzy Hash: 4f2888ff7bbf60e021e831f350996abbc6d04b76299a57556fe12fb360717843
                                  • Instruction Fuzzy Hash: C721AC72A25F4682DB10DF29E4941696360FB98F88B844235EA4E4B3B5DF3CE0A4C300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: LongWindow$DialogInvalidateRect
                                  • String ID:
                                  • API String ID: 1956198572-0
                                  • Opcode ID: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                  • Instruction ID: ec6cfded2fce86beb1d9c2eeed7e9172e22a7d679df51475e9a8fd3b802a2d61
                                  • Opcode Fuzzy Hash: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                  • Instruction Fuzzy Hash: DF11AC21E0854771FAE4AB59E5452799251EF84780FD48031DE5D17BAACD2DD8C1A510
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$terminate
                                  • String ID:
                                  • API String ID: 579254285-0
                                  • Opcode ID: 0575d6c39966dbd82ec46a155e414ed2de6267770d3a2ba2e587cfaa28695db4
                                  • Instruction ID: 3b638c0fcc9090a7e277470d24eeb7ab0e49ab8b34b0c039b8ab3ee98d2a16fa
                                  • Opcode Fuzzy Hash: 0575d6c39966dbd82ec46a155e414ed2de6267770d3a2ba2e587cfaa28695db4
                                  • Instruction Fuzzy Hash: 6CF08CA4F09F8651FD187BA3A8450785365AF58F60F0848F7DA1D06767DE2CE4714611
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Dealloc$CallDict_ItemMakeObject_ProxyWeakref_
                                  • String ID:
                                  • API String ID: 1512266493-0
                                  • Opcode ID: ee14201d288885dab2d3b72eca7127d67ec00b39f4c2a441eb93ece7867c3194
                                  • Instruction ID: 01e5b070ef43f61fc4a5fee481780dd53df3b2d080b1cbd48b5cf99d35242561
                                  • Opcode Fuzzy Hash: ee14201d288885dab2d3b72eca7127d67ec00b39f4c2a441eb93ece7867c3194
                                  • Instruction Fuzzy Hash: 7F114231E09E8289EA549F13A840179A3B4EB65FE4B188571DE6E677B9CE3CD4518304
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: 1fefa3f07759f2b27021d6aa4cfab479302c24b9d86d53738b153a3556951b4d
                                  • Instruction ID: c2e5afc26aa5dbb57f1f993cddb28525c685bd772be05ce1c2574cb40dc93e19
                                  • Opcode Fuzzy Hash: 1fefa3f07759f2b27021d6aa4cfab479302c24b9d86d53738b153a3556951b4d
                                  • Instruction Fuzzy Hash: 67113362B04F418AEB20DF61E8551B533A4F70DB68B041AB2EA6D43764DF3CD1B48340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                  • String ID:
                                  • API String ID: 2933794660-0
                                  • Opcode ID: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                  • Instruction ID: c316d20cd5a0da224ab1a50293ecffd0794f29b1361c3616a30ee2636ab98967
                                  • Opcode Fuzzy Hash: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                  • Instruction Fuzzy Hash: BB11A022B14F029AEB50DF60E8442B873A0FB58718F840E30DA2D667B4EF3CD0688390
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Object_memset$Track
                                  • String ID:
                                  • API String ID: 225649448-0
                                  • Opcode ID: a786a447b7de81fdd416b21125803142f81c2d228cba119be79dd88451351a2b
                                  • Instruction ID: 89e6520b509e0bf4d0ab67c48fa7e50fac1cd29ced07de7a24298a70d415d2fa
                                  • Opcode Fuzzy Hash: a786a447b7de81fdd416b21125803142f81c2d228cba119be79dd88451351a2b
                                  • Instruction Fuzzy Hash: BD0180A3A24F458AEB04DF26E5443B86361FB68FA8F444274C71C166A5DF3CD498C344
                                  APIs
                                    • Part of subcall function 00007FFE01392FE0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013F2851), ref: 00007FFE01392FEA
                                    • Part of subcall function 00007FFE01392FE0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FFE013F2851), ref: 00007FFE01393030
                                  • GetACP.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(?,00000092,?,?,?,CCCCCCC338C48348,00007FFE0139013B), ref: 00007FFE0139CCC1
                                  • IsValidCodePage.API-MS-WIN-CORE-LOCALIZATION-L1-2-0 ref: 00007FFE0139CCDF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CodePageValid
                                  • String ID: utf8
                                  • API String ID: 943130320-905460609
                                  • Opcode ID: 077269e3ce0ea29f6dee95bf8b04cfeeb839662aa7eba8c435895ef23497d673
                                  • Instruction ID: 84a2bdbb97d3bd0e3aa6c0e89b135a0da00327c7f682dd7b9917f0c35ba4aec6
                                  • Opcode Fuzzy Hash: 077269e3ce0ea29f6dee95bf8b04cfeeb839662aa7eba8c435895ef23497d673
                                  • Instruction Fuzzy Hash: B1919C72A0868382EB649F21D8506BE27A4FF44B88F565131DE4E5F6E5EF3CE946C340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+Name::operator+=Name::operator=
                                  • String ID: CV:
                                  • API String ID: 2521687178-3725821052
                                  • Opcode ID: d0ba46de3f1c83a20ab42dfcfcdc110b5b72e88ff0278ae87969a8fad92ba96a
                                  • Instruction ID: 360bd24f66831e9a106934faa21535d8339f7bf083869184f21225e81d8ae3d8
                                  • Opcode Fuzzy Hash: d0ba46de3f1c83a20ab42dfcfcdc110b5b72e88ff0278ae87969a8fad92ba96a
                                  • Instruction Fuzzy Hash: CD519CA2F08E4699EB11AB72D4502B83BB1AB44FA4F8440F3D95E877B5CE2CA465C741
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _handle_error
                                  • String ID: !$fmod
                                  • API String ID: 1757819995-3213614193
                                  • Opcode ID: a5046bec0b170f6f65a4cdd1cb73adc953bca75b89e3650b120db442c54fc02e
                                  • Instruction ID: 893eb134f158748ebc43889ea0f7b03dc908eee480769639de42e88f6cfce04a
                                  • Opcode Fuzzy Hash: a5046bec0b170f6f65a4cdd1cb73adc953bca75b89e3650b120db442c54fc02e
                                  • Instruction Fuzzy Hash: EB51D412C2DB8289E367577194117B5B7A8AFA23C4F819332F95E3A5B1DB2DB1538600
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _get_daylight$_invalid_parameter_noinfo
                                  • String ID: ?
                                  • API String ID: 1286766494-1684325040
                                  • Opcode ID: 30789dec6190b383a199f118b84c25ff7dc7ec79571e837530472d1d90a39620
                                  • Instruction ID: e98e930ada494ecf790d7aaf751d3a2bb9f50e452e7429f7d5d635ad2d1e8180
                                  • Opcode Fuzzy Hash: 30789dec6190b383a199f118b84c25ff7dc7ec79571e837530472d1d90a39620
                                  • Instruction Fuzzy Hash: 11410812A18B8366FBB8AB25940137AD690EF90BA4FD04235EE5C2BAD5DF3CD4819710
                                  APIs
                                  • _invalid_parameter_noinfo.LIBCMT ref: 00007FF733F7835E
                                    • Part of subcall function 00007FF733F79C58: HeapFree.KERNEL32(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C6E
                                    • Part of subcall function 00007FF733F79C58: GetLastError.KERNEL32(?,?,?,00007FF733F82032,?,?,?,00007FF733F8206F,?,?,00000000,00007FF733F82535,?,?,?,00007FF733F82467), ref: 00007FF733F79C78
                                  • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF733F6BEC5), ref: 00007FF733F7837C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                  • String ID: C:\Users\user\Desktop\2a2d6bO44t.exe
                                  • API String ID: 3580290477-1624346499
                                  • Opcode ID: b12c586edd81a32e618353e8c6e47471c9321224668f8732ac6121a92b7f4d59
                                  • Instruction ID: 6db0de874b3a6cb19bcfe48443ddc3d2bef5bf11914efecc7a63ca464388074e
                                  • Opcode Fuzzy Hash: b12c586edd81a32e618353e8c6e47471c9321224668f8732ac6121a92b7f4d59
                                  • Instruction Fuzzy Hash: 3841C332A08B43A5EBB4FF2594410BDA394EF457D2BD55035FA5D63B85CE3CE4809320
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CurrentDirectory_invalid_parameter_noinfo
                                  • String ID: .$:
                                  • API String ID: 2020911589-4202072812
                                  • Opcode ID: 7a35d28534e01db8ffeaa6b4fa37230a72ad0a4b96bb2a626ac06d1e353ecb62
                                  • Instruction ID: fd1428bb2faf2dcd3c1aeb7fa1ddf0d57312284e476d9f3295aaf81f229f4fd2
                                  • Opcode Fuzzy Hash: 7a35d28534e01db8ffeaa6b4fa37230a72ad0a4b96bb2a626ac06d1e353ecb62
                                  • Instruction Fuzzy Hash: A141A222F04B53A8FBA1EBB198401FC67746F14789FD40139EE5D77A95DF389442A320
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: U
                                  • API String ID: 442123175-4171548499
                                  • Opcode ID: 8a697203ccd77e4b09c13c65c1c26094ec0dd1f28ad5eedaecdf6916cad97550
                                  • Instruction ID: 32c99ccae5981aa7d1fd2bed284c5f4dffec434ab086722ea2d991b79a8e8e3a
                                  • Opcode Fuzzy Hash: 8a697203ccd77e4b09c13c65c1c26094ec0dd1f28ad5eedaecdf6916cad97550
                                  • Instruction Fuzzy Hash: 0441B222B18A8691DB70AF65E4443A9B7A0FB98BD4FC04035EE4D97798EF3CD441DB50
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID: U
                                  • API String ID: 442123175-4171548499
                                  • Opcode ID: 288c51f84b61f88815cb9e54d337bf8bb85fc5b2dcb5d4d5e2a986185ac6fdb6
                                  • Instruction ID: 5476b16fc7bd57d2efb8b3bf5851894e82f9401c9a1a086d54cb5868ba7a383b
                                  • Opcode Fuzzy Hash: 288c51f84b61f88815cb9e54d337bf8bb85fc5b2dcb5d4d5e2a986185ac6fdb6
                                  • Instruction Fuzzy Hash: 4D41B372B19A4185DB608F25E8443ADB7A1FBA8784F814031EE4D8B7B8DF7CD481CB41
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _handle_errorf
                                  • String ID: "$powf
                                  • API String ID: 2315412904-603753351
                                  • Opcode ID: 9c0c2074deed8049657b9258028c4a6d4fcf62c9ac615ca19d8b2c990d0ceb3c
                                  • Instruction ID: 7d0c71155165813d63a4a93f425072cacd9f9e822d7af249f8e9f4349aadc5ac
                                  • Opcode Fuzzy Hash: 9c0c2074deed8049657b9258028c4a6d4fcf62c9ac615ca19d8b2c990d0ceb3c
                                  • Instruction Fuzzy Hash: 024142B3D28681DBD370CF22E0847AABAA0F79934CF11132AF749059A8DF7DD554AB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: EntryInterlockedListNamePush__un
                                  • String ID:
                                  • API String ID: 524438517-3916222277
                                  • Opcode ID: 47fe8399b7fe3f20832c88d3e99e3460415be596f92942b6acded4595a71f1d9
                                  • Instruction ID: 144c33f46a11c00b24994397be18e73e5460c4072ec6125a7a46a5c1dafd194a
                                  • Opcode Fuzzy Hash: 47fe8399b7fe3f20832c88d3e99e3460415be596f92942b6acded4595a71f1d9
                                  • Instruction Fuzzy Hash: 8C310322B19B8384EB11DF2698045B96394FB18FD4B5A8635EE2C0B3A5DE3DD846C340
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,?,00000000,?,00007FFE01381718), ref: 00007FFE013817A3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: EnumSystemLocalesEx$IsValidLocaleName
                                  • API String ID: 190572456-1098237698
                                  • Opcode ID: 01f6ff738e71fb6d052a19988c064d12b91bbc42d646210aa8682f63498baed6
                                  • Instruction ID: 7d92231539b65bf676a9a5895c1474827fc36007060ed07699a083b25fcdb6d6
                                  • Opcode Fuzzy Hash: 01f6ff738e71fb6d052a19988c064d12b91bbc42d646210aa8682f63498baed6
                                  • Instruction Fuzzy Hash: 8E318B72B09B0282FB049B54E81167A67A1AF44794F465136EE6C4F7B4EF7CF409C780
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE013ED6DD,?,?,?,?,?,?,?,?,?,00007FFE013EF22F), ref: 00007FFE013EDF46
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: IsValidLocaleName$LocaleNameToLCID
                                  • API String ID: 190572456-1205873579
                                  • Opcode ID: da5a0cbb9eed6f49c66cde4c074b3381cfb5118fa4e19aac0d89585cb23fb15e
                                  • Instruction ID: 49a258d814827da35f1c1a9ab2c52186245991b9ba26952904dab95b0f2538e8
                                  • Opcode Fuzzy Hash: da5a0cbb9eed6f49c66cde4c074b3381cfb5118fa4e19aac0d89585cb23fb15e
                                  • Instruction Fuzzy Hash: 8F31B165B1DB4286FB04DB59E41027522D0AF28BD4F465135EE1D5B7F9EF2DF80A8340
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,00002000,00007FFE01399AB1,?,?,00000000,00007FFE013999F9,?,?,?,00007FFE01399768), ref: 00007FFE0139A963
                                  • InitializeCriticalSectionAndSpinCount.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00002000,00007FFE01399AB1,?,?,00000000,00007FFE013999F9,?,?,?,00007FFE01399768), ref: 00007FFE013D4DCF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressCountCriticalInitializeProcSectionSpin
                                  • String ID: InitializeCriticalSectionEx
                                  • API String ID: 1498394645-3084827643
                                  • Opcode ID: aea73f0611dc2c0ae826291492e53037372dc3851cba82ec85974f612158bd10
                                  • Instruction ID: 21c6886f691ee0d6451aa00b38181ad459337cf87df3d4febfe8d22c3e395a46
                                  • Opcode Fuzzy Hash: aea73f0611dc2c0ae826291492e53037372dc3851cba82ec85974f612158bd10
                                  • Instruction Fuzzy Hash: AB21B265B1960342FB548759F82057522A1AF587D8F05A235ED6D4FBF8EE2CE8058340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressLocaleProcValid
                                  • String ID: IsValidLocaleName
                                  • API String ID: 2003423906-4210551052
                                  • Opcode ID: aa0c9484b85fe4de99d01dd0ea85bc865ed249eb48ddc0d080c0ce807d6728e7
                                  • Instruction ID: 106248c661d3daabfbddc847aa2d4e01d68117fc69250f7e827a8b732547026e
                                  • Opcode Fuzzy Hash: aa0c9484b85fe4de99d01dd0ea85bc865ed249eb48ddc0d080c0ce807d6728e7
                                  • Instruction Fuzzy Hash: 71218E21A1960242FB888795E8611B522A1AF59BD8F056235ED2D5F7F8EE2CF9458340
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: CurrentDirectory
                                  • String ID: :
                                  • API String ID: 1611563598-336475711
                                  • Opcode ID: e37c33f8f2befd5fbd3c49cdc0b6d52123385b6fd944ea7372e41dd3f6ca63dc
                                  • Instruction ID: 2b8d3f02e6a5c1a11d40fa25e35832bbc1c1674dfea4ba0f39670aa0f4d8cf9e
                                  • Opcode Fuzzy Hash: e37c33f8f2befd5fbd3c49cdc0b6d52123385b6fd944ea7372e41dd3f6ca63dc
                                  • Instruction Fuzzy Hash: F621D523B0868391EBB4AB15D44427DA3B1FBD4B88FC54036E68D63294DF7CD945D760
                                  APIs
                                    • Part of subcall function 00007FFE1A4584DC: DName::operator+.LIBVCRUNTIME ref: 00007FFE1A458545
                                  • DName::operator+=.LIBVCRUNTIME ref: 00007FFE1A45847C
                                    • Part of subcall function 00007FFE1A45B638: DName::operator+=.LIBVCRUNTIME ref: 00007FFE1A45B653
                                    • Part of subcall function 00007FFE1A45B554: DName::operator=.LIBVCRUNTIME ref: 00007FFE1A45B581
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+=$Name::operator+Name::operator=
                                  • String ID: void
                                  • API String ID: 3725178723-3531332078
                                  • Opcode ID: 9b968bc2e922b99509c453ea154173d36d1b892fe03fcd21ec92663b842f2082
                                  • Instruction ID: a4158a3e9c2e2dcc0c86bc183b8e01a564b8dc8098591d1da260958f65db3f67
                                  • Opcode Fuzzy Hash: 9b968bc2e922b99509c453ea154173d36d1b892fe03fcd21ec92663b842f2082
                                  • Instruction Fuzzy Hash: 6A316FA2F18E4699FB11EB66D8513BC2770AB45B68F6440F3CE0C066B9EF2CE465C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Name::operator+
                                  • String ID: void$void
                                  • API String ID: 2943138195-3746155364
                                  • Opcode ID: 9fed0904b7036b1a7e7c47886692c4ade50ba0f084095a30f4e99b30a35ca245
                                  • Instruction ID: 4b8c1ff4323f0487695b1e615d37e77563b16859f10d0ea7c0af46283c0dcb62
                                  • Opcode Fuzzy Hash: 9fed0904b7036b1a7e7c47886692c4ade50ba0f084095a30f4e99b30a35ca245
                                  • Instruction Fuzzy Hash: 6A3108B2F18A5698FB05ABA2E8400FC37B0FB48B58B4444B7EA0E56B65DF3C9164C710
                                  APIs
                                  • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-1-0(?,?,?,00007FFE013900FD), ref: 00007FFE013A231B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID: AppPolicyGetThreadInitializationType$CompareStringEx
                                  • API String ID: 190572456-1200376162
                                  • Opcode ID: 95f3ea5dba3dd10852bc24ad49b951e7ad07eba23ba389b1255418d767f352e6
                                  • Instruction ID: 6d3a164a47dd01fda526bb2149af75029c3899175eeffc5084a42a7547024e89
                                  • Opcode Fuzzy Hash: 95f3ea5dba3dd10852bc24ad49b951e7ad07eba23ba389b1255418d767f352e6
                                  • Instruction Fuzzy Hash: D921C061E0D60342FB458768E821AB553A1AF593E8F896135ED2D4F7F8EE2CF8458300
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _handle_error
                                  • String ID: "$pow
                                  • API String ID: 1757819995-713443511
                                  • Opcode ID: 2042b7108def7f110b1b6ee9971e6cff704b54fec920353340c6430c5a27a184
                                  • Instruction ID: 65ab7e3518daf57d4a16fa51d97b601458a187c8f24517a25ed1016065245d32
                                  • Opcode Fuzzy Hash: 2042b7108def7f110b1b6ee9971e6cff704b54fec920353340c6430c5a27a184
                                  • Instruction Fuzzy Hash: 542121B2D1CAC587D370CF10E48476AB6B1FBDA348F212325F7891AA64DBBDD5459B00
                                  APIs
                                    • Part of subcall function 00007FFE1A45C1D0: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FFE1A452F17), ref: 00007FFE1A45C1E7
                                    • Part of subcall function 00007FFE1A45C1D0: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FFE1A452F17), ref: 00007FFE1A45C1FE
                                    • Part of subcall function 00007FFE1A45C1D0: terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FFE1A452F17), ref: 00007FFE1A45C219
                                    • Part of subcall function 00007FFE1A45C1D0: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FFE1A452F17), ref: 00007FFE1A45C22D
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A45DA6E
                                  • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A45DA8D
                                    • Part of subcall function 00007FFE1A451B60: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A451B73
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1684120800.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                  • Associated: 00000001.00000002.1684103005.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684178193.00007FFE1A45E000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684198249.00007FFE1A462000.00000004.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000001.00000002.1684215545.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe1a450000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: abort$terminate
                                  • String ID: csm
                                  • API String ID: 579254285-1018135373
                                  • Opcode ID: 009a99e405968afe9082b478891bf969a292b7194393816fbdb550564c4b69a5
                                  • Instruction ID: 80e878c5ca03f558496f020dbb776f9730b8f92fe27edba3fddfe5bf69e4912c
                                  • Opcode Fuzzy Hash: 009a99e405968afe9082b478891bf969a292b7194393816fbdb550564c4b69a5
                                  • Instruction Fuzzy Hash: A2013CA2F4AE4289EF24FF37984117922A0AF15F69F0405F6D94D0B365EE68ED66C200
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ExceptionFileHeaderRaise
                                  • String ID: csm
                                  • API String ID: 2573137834-1018135373
                                  • Opcode ID: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                  • Instruction ID: ecbd0b9d8829c06b549666dc8caf9d83e8cf7b61ed0a324e6760cef28893520b
                                  • Opcode Fuzzy Hash: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                  • Instruction Fuzzy Hash: 6D116D36618B86A2EB659F15F440269B7E0FB88B84F984230DF8D17769DF3CC951CB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_StringSubtypeType_
                                  • String ID: not a ctype instance
                                  • API String ID: 468607378-3181906287
                                  • Opcode ID: f85a89c331f72c57455bf836e543c031331b8f11e23131311cae0cf5cabf6560
                                  • Instruction ID: bcc5d9f11bb25b691b393f4f55f51c14046f60893e27080dab75530005fe9da2
                                  • Opcode Fuzzy Hash: f85a89c331f72c57455bf836e543c031331b8f11e23131311cae0cf5cabf6560
                                  • Instruction Fuzzy Hash: 6E112E21B08F4689EA109B17F850069A760FBA8FE4F188171EEAD57B79DE2CD142C708
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _handle_error_raise_exc
                                  • String ID: !$cos
                                  • API String ID: 1935476177-1949035351
                                  • Opcode ID: 7ba8ba00ffc1273ac1aa930f0eee218aeb9ec048ea360fdf3b4ace5b6e94d22f
                                  • Instruction ID: 8c12a16f9a0fcffa0f056722f0269de4a6bd33306086c25f218b3d7b4da215f7
                                  • Opcode Fuzzy Hash: 7ba8ba00ffc1273ac1aa930f0eee218aeb9ec048ea360fdf3b4ace5b6e94d22f
                                  • Instruction Fuzzy Hash: D4019272A18B8986DB54CF22E44037A7162FF9AB94F104335EB9D0AB98FF7CD1548B00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Err_ItemSequence_String
                                  • String ID: args not a tuple?
                                  • API String ID: 138718260-274370407
                                  • Opcode ID: 44e828a68b22d3fc0c36b88b9c3241d3d631114fdc07080868d32c778c7a5d22
                                  • Instruction ID: 177ceaae2599396c9fac3876a95f5661e8fa3c11856654eab68ed35ba665f3bc
                                  • Opcode Fuzzy Hash: 44e828a68b22d3fc0c36b88b9c3241d3d631114fdc07080868d32c778c7a5d22
                                  • Instruction Fuzzy Hash: 0D019E22B08F42C9E6008B17E440229A360FB95FF0F149671EABDA77A8CF2CD4958704
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1682710937.00007FF733F61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF733F60000, based on PE: true
                                  • Associated: 00000001.00000002.1682639542.00007FF733F60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682755068.00007FF733F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733F9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682790269.00007FF733FA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1682827518.00007FF733FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ff733f60000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: DriveType_invalid_parameter_noinfo
                                  • String ID: :
                                  • API String ID: 2595371189-336475711
                                  • Opcode ID: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                  • Instruction ID: 83ad83fa3896f8672ac92a0bf44c5d0fba3f98f8a6ccd8636f5eecbb7d4f33e6
                                  • Opcode Fuzzy Hash: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                  • Instruction Fuzzy Hash: DA01F22191C703A2FBB0BF60946127EA3A0EF48B89FC00135E55DA7291EF3CE504EB20
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _handle_errorf_raise_excf
                                  • String ID: !$cosf
                                  • API String ID: 3848079588-2208875612
                                  • Opcode ID: 97a513e0f3d115946be92a54d664c20ecc8d6105ebcadbe10c1a652fc4fdf1d4
                                  • Instruction ID: d0e71f03a7dc27a48b76540ab224b879efed5f3dbf6b3edf1573e0d9c4f7b9f9
                                  • Opcode Fuzzy Hash: 97a513e0f3d115946be92a54d664c20ecc8d6105ebcadbe10c1a652fc4fdf1d4
                                  • Instruction Fuzzy Hash: 3A01B9B291C69187F314CB26A88136ABA91FBD4788F314225F7450AAB8DB7CD5815F00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _handle_error_raise_exc
                                  • String ID: !$sin
                                  • API String ID: 1935476177-1565623160
                                  • Opcode ID: 6deb3075f24cc3842db92cd71ec257ce9806b4e46556c94b9afdec1a85de8467
                                  • Instruction ID: 9363bccd187c7b2e1659fae851c4d4e92c648c8e482e592e60aeb2590a2639f5
                                  • Opcode Fuzzy Hash: 6deb3075f24cc3842db92cd71ec257ce9806b4e46556c94b9afdec1a85de8467
                                  • Instruction Fuzzy Hash: E5018871A18BCA42D754CF12D44037A7152BF9A7D4F104325EB5D1AB98FF7CD1448700
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _handle_errorf
                                  • String ID: "$expf
                                  • API String ID: 2315412904-303238936
                                  • Opcode ID: fef54ff7b95874bec43b0b3bdd19ececa4550de330a24f97a3394677f46fc204
                                  • Instruction ID: 862f311dad34450707c4c28e6943119b1a18f3db71a8a36bb90c49713fdc97bc
                                  • Opcode Fuzzy Hash: fef54ff7b95874bec43b0b3bdd19ececa4550de330a24f97a3394677f46fc204
                                  • Instruction Fuzzy Hash: 450182729286C486E330CB21D4893AAB6A0FFE5344F605315E785166B0DF7DD496AB00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _handle_errorf_raise_excf
                                  • String ID: !$sinf
                                  • API String ID: 3848079588-676365165
                                  • Opcode ID: 89606b5e8b4cf005ad09f5a2b269fb4f6582657320634e1412b4497a7eece82f
                                  • Instruction ID: 1bc4d63889173f8b3a9363e4c0762d3b67bfac130338001b26d44a4da7d6a508
                                  • Opcode Fuzzy Hash: 89606b5e8b4cf005ad09f5a2b269fb4f6582657320634e1412b4497a7eece82f
                                  • Instruction Fuzzy Hash: 2401487291C69187F714CB26A8C136ABA91FBD5788F314325E7491A6B8EB7CD4815F00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _handle_errorf_raise_excf
                                  • String ID: !$tanf
                                  • API String ID: 3848079588-3147098732
                                  • Opcode ID: dac575506c6d9ff4d36a2ef70b3c3940e4631d6360e2b511d47d035168ef6ee1
                                  • Instruction ID: a3a80b1d713dcaa0d3e43229888163aad4b7433fed6bfb43c0d2fda234e9076e
                                  • Opcode Fuzzy Hash: dac575506c6d9ff4d36a2ef70b3c3940e4631d6360e2b511d47d035168ef6ee1
                                  • Instruction Fuzzy Hash: 9F01887291C69187F714CB26A88136ABA91FBD5788F314325E7490AAB8EB7CD4805F00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _handle_error
                                  • String ID: "$exp
                                  • API String ID: 1757819995-2878093337
                                  • Opcode ID: c4fcf76e3e29136143e1cba3a9cff0f211c77a69fc1107ed387352c2ebce5c6a
                                  • Instruction ID: a16f734a3819a820d8d74174b79a00c46cf0a667e1e505392810a3b29173c004
                                  • Opcode Fuzzy Hash: c4fcf76e3e29136143e1cba3a9cff0f211c77a69fc1107ed387352c2ebce5c6a
                                  • Instruction Fuzzy Hash: 4701C436A38B88C3E320CF24D4892AA76B1FFEA304F601315E7451A670DB7DD4819B00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: _handle_error_raise_exc
                                  • String ID: !$remainder
                                  • API String ID: 1935476177-2737868549
                                  • Opcode ID: d71720276c73ce426812ee322106430754358d9dc9e8b6e5ee85094765619759
                                  • Instruction ID: c5e7721380de88298d6e4ff0b6b32d3de076c087f5c23f9b3f6bfb52a8e7989e
                                  • Opcode Fuzzy Hash: d71720276c73ce426812ee322106430754358d9dc9e8b6e5ee85094765619759
                                  • Instruction Fuzzy Hash: C4F06D32C28AC483E320DF64E0826AABBA1FFEA348F515715FB8416575DB7DD1868F00
                                  APIs
                                  • try_get_function.LIBVCRUNTIME ref: 00007FFE013CA071
                                  • TlsSetValue.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FFE013C987D,?,?,?,?,00007FFE013C96A1,?,?,?,?,00007FFE01397704), ref: 00007FFE013CA088
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: Valuetry_get_function
                                  • String ID: FlsSetValue
                                  • API String ID: 738293619-3750699315
                                  • Opcode ID: cd84e72994bb106da56984b4955114b205610e10474c783efb8aaa7b71ca3094
                                  • Instruction ID: 047312cd2c66e6a817e92350dc21a32b7469f894b16729e837ff835658b9fd82
                                  • Opcode Fuzzy Hash: cd84e72994bb106da56984b4955114b205610e10474c783efb8aaa7b71ca3094
                                  • Instruction Fuzzy Hash: 30E09263A0860292EB545B90F4440F83322EF887D0F994032D91D0F3B5CE7CE889C304
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683878190.00007FFE13331000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FFE13330000, based on PE: true
                                  • Associated: 00000001.00000002.1683861511.00007FFE13330000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683899472.00007FFE13341000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683916848.00007FFE13348000.00000004.00000001.01000000.00000007.sdmpDownload File
                                  • Associated: 00000001.00000002.1683935915.00007FFE1334C000.00000002.00000001.01000000.00000007.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe13330000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: FormatFromUnicode_
                                  • String ID: <Field type=%s, ofs=%zd, size=%zd>$<Field type=%s, ofs=%zd:%zd, bits=%zd>
                                  • API String ID: 3889672380-2914491812
                                  • Opcode ID: 29b28214dc4daecb7cb1f49bf97f3c6bf41219dbad2afee38a78a522a064f5f8
                                  • Instruction ID: cb7072d28845792b1b8dbfa18491c77df49753f9ca40f8ea861ea421da417903
                                  • Opcode Fuzzy Hash: 29b28214dc4daecb7cb1f49bf97f3c6bf41219dbad2afee38a78a522a064f5f8
                                  • Instruction Fuzzy Hash: F3E0E5A6F04E85C5DA14CF0AE8404697770FB65BA8BA201A6CA5C63370CF38D5A6C758
                                  APIs
                                  • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(?,?,?,?,00000000,00000000,?,?,00000000,00007FFE0138C9C1), ref: 00007FFE0138CBE6
                                  • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(?,?,?,?,00000000,00000000,?,?,00000000,00007FFE0138C9C1), ref: 00007FFE0138CC39
                                  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,00000000,00000000,?,?,00000000,00007FFE0138C9C1), ref: 00007FFE013D09E1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1683624694.00007FFE01381000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FFE01380000, based on PE: true
                                  • Associated: 00000001.00000002.1683604262.00007FFE01380000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683747797.00007FFE01435000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683782209.00007FFE0146F000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000001.00000002.1683801881.00007FFE01472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_7ffe01380000_2a2d6bO44t.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide$ErrorLast
                                  • String ID:
                                  • API String ID: 1717984340-0
                                  • Opcode ID: d72928f14c07642b18a7873c648fbe44bf993ae18c83a1b561327d21b3e4d091
                                  • Instruction ID: 11740bcc2f4d426bf4dead8eec1a843bc809219746968d32fae6032a8b964116
                                  • Opcode Fuzzy Hash: d72928f14c07642b18a7873c648fbe44bf993ae18c83a1b561327d21b3e4d091
                                  • Instruction Fuzzy Hash: 9DB13961E0C74345FB785B64E4905BD66E0EF44B54F665336EA9E0EAF0CF3CE8819212