Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PyIsvSahWy.exe

Overview

General Information

Sample name:PyIsvSahWy.exe
renamed because original name is a hash value
Original sample name:ae601b5d146625e57ed192f334882823.exe
Analysis ID:1577609
MD5:ae601b5d146625e57ed192f334882823
SHA1:882a2f15960cacbe612a73170b2d577e6476730f
SHA256:8a50b6a8a1aaf1304c853d1ff3f6e93d65172b1f0381e2b86cef8d550100627a
Tags:exeuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains an invalid checksum
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • PyIsvSahWy.exe (PID: 3840 cmdline: "C:\Users\user\Desktop\PyIsvSahWy.exe" MD5: AE601B5D146625E57ED192F334882823)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PyIsvSahWy.exeReversingLabs: Detection: 28%
Source: PyIsvSahWy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90785A0 FindFirstFileExW,FindClose,0_2_00007FF6B90785A0
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90779B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF6B90779B0
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9090B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6B9090B84
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9095C740_2_00007FF6B9095C74
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90710000_2_00007FF6B9071000
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9098A380_2_00007FF6B9098A38
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9080A600_2_00007FF6B9080A60
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90812800_2_00007FF6B9081280
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9087AAC0_2_00007FF6B9087AAC
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9078B200_2_00007FF6B9078B20
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B909518C0_2_00007FF6B909518C
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90891B00_2_00007FF6B90891B0
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B908D2000_2_00007FF6B908D200
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9080C640_2_00007FF6B9080C64
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90814840_2_00007FF6B9081484
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9082CC40_2_00007FF6B9082CC4
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9090B840_2_00007FF6B9090B84
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90933BC0_2_00007FF6B90933BC
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90873F40_2_00007FF6B90873F4
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B908FBD80_2_00007FF6B908FBD8
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9080E700_2_00007FF6B9080E70
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9094F100_2_00007FF6B9094F10
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B908FBD80_2_00007FF6B908FBD8
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90957280_2_00007FF6B9095728
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9081F300_2_00007FF6B9081F30
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9092F200_2_00007FF6B9092F20
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B908CD6C0_2_00007FF6B908CD6C
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90795FB0_2_00007FF6B90795FB
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90850400_2_00007FF6B9085040
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90810740_2_00007FF6B9081074
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B908D8800_2_00007FF6B908D880
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90828C00_2_00007FF6B90828C0
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B907979B0_2_00007FF6B907979B
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9079FCD0_2_00007FF6B9079FCD
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: String function: 00007FF6B90725F0 appears 50 times
Source: PyIsvSahWy.exeBinary or memory string: OriginalFilename vs PyIsvSahWy.exe
Source: PyIsvSahWy.exe, 00000000.00000000.2172877691.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewusa.exej% vs PyIsvSahWy.exe
Source: PyIsvSahWy.exeBinary or memory string: OriginalFilenamewusa.exej% vs PyIsvSahWy.exe
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90729E0 GetLastError,FormatMessageW,MessageBoxW,0_2_00007FF6B90729E0
Source: PyIsvSahWy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PyIsvSahWy.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PyIsvSahWy.exeReversingLabs: Detection: 28%
Source: C:\Users\user\Desktop\PyIsvSahWy.exeFile read: C:\Users\user\Desktop\PyIsvSahWy.exeJump to behavior
Source: C:\Users\user\Desktop\PyIsvSahWy.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\PyIsvSahWy.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\PyIsvSahWy.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\PyIsvSahWy.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\PyIsvSahWy.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\PyIsvSahWy.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\PyIsvSahWy.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\PyIsvSahWy.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\PyIsvSahWy.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\PyIsvSahWy.exeSection loaded: wintypes.dllJump to behavior
Source: PyIsvSahWy.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: PyIsvSahWy.exeStatic file information: File size 1803264 > 1048576
Source: PyIsvSahWy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: PyIsvSahWy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: PyIsvSahWy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: PyIsvSahWy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: PyIsvSahWy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: PyIsvSahWy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: PyIsvSahWy.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: PyIsvSahWy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: PyIsvSahWy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: PyIsvSahWy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: PyIsvSahWy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: PyIsvSahWy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: PyIsvSahWy.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: PyIsvSahWy.exeStatic PE information: real checksum: 0x8c8069 should be: 0x1be994
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9076EA0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF6B9076EA0
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-17488
Source: C:\Users\user\Desktop\PyIsvSahWy.exeAPI coverage: 6.4 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90785A0 FindFirstFileExW,FindClose,0_2_00007FF6B90785A0
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B90779B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00007FF6B90779B0
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9090B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6B9090B84
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B907C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6B907C44C
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9092790 GetProcessHeap,0_2_00007FF6B9092790
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B907C44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6B907C44C
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B907BBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6B907BBC0
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B907C62C SetUnhandledExceptionFilter,0_2_00007FF6B907C62C
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9089924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6B9089924
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B9098880 cpuid 0_2_00007FF6B9098880
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B907C330 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6B907C330
Source: C:\Users\user\Desktop\PyIsvSahWy.exeCode function: 0_2_00007FF6B909518C _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF6B909518C
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS13
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PyIsvSahWy.exe29%ReversingLabsWin64.Trojan.Etset
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    high
    ax-0001.ax-msedge.net
    150.171.27.10
    truefalse
      high
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1577609
      Start date and time:2024-12-18 15:53:53 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 14s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:17
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:PyIsvSahWy.exe
      renamed because original name is a hash value
      Original Sample Name:ae601b5d146625e57ed192f334882823.exe
      Detection:MAL
      Classification:mal48.winEXE@1/0@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 98%
      • Number of executed functions: 20
      • Number of non-executed functions: 83
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 13.95.31.18, 92.122.16.236, 13.107.246.63, 20.190.177.148, 20.223.35.26, 2.16.158.33, 4.245.163.56, 150.171.27.10, 2.16.158.176
      • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, tse1.mm.bing.net, ctldl.windowsupdate.com, g.bing.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, login.live.com, e16604.g.akamaiedge.net, glb.cws.prod.dcat.dsp.trafficmanager.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net
      • VT rate limit hit for: PyIsvSahWy.exe
      No simulations
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ax-0001.ax-msedge.netbandwidth_monitor.exeGet hashmaliciousUnknownBrowse
      • 150.171.27.10
      Ball - Temp.data for GCMs.docGet hashmaliciousHTMLPhisherBrowse
      • 150.171.27.10
      https://launch.app/plainsartGet hashmaliciousHTMLPhisherBrowse
      • 150.171.27.10
      random.exe.2.exeGet hashmaliciousLummaCBrowse
      • 150.171.27.10
      stail.exe.3.exeGet hashmaliciousSocks5SystemzBrowse
      • 150.171.28.10
      file.exeGet hashmaliciousUnknownBrowse
      • 150.171.27.10
      R0SkdJNujW.exeGet hashmaliciousUnknownBrowse
      • 150.171.28.10
      index.html.docxGet hashmaliciousUnknownBrowse
      • 150.171.27.10
      99awhy8l.exeGet hashmaliciousLummaCBrowse
      • 150.171.28.10
      Opdxdyeul.exeGet hashmaliciousSystemBCBrowse
      • 150.171.27.10
      bg.microsoft.map.fastly.netPkContent.exeGet hashmaliciousUnknownBrowse
      • 199.232.210.172
      https://launch.app/plainsartGet hashmaliciousHTMLPhisherBrowse
      • 199.232.214.172
      ji2xlo1f.exeGet hashmaliciousLummaCBrowse
      • 199.232.210.172
      Order_948575494759.xlsGet hashmaliciousUnknownBrowse
      • 199.232.214.172
      DocuStream_Scan_l8obgs3v.pdfGet hashmaliciousHTMLPhisherBrowse
      • 199.232.214.172
      stail.exe.3.exeGet hashmaliciousSocks5SystemzBrowse
      • 199.232.214.172
      22TxDBB1.batGet hashmaliciousUnknownBrowse
      • 199.232.214.172
      sxVHUOSqVC.exeGet hashmaliciousUnknownBrowse
      • 199.232.210.172
      pyld611114.exeGet hashmaliciousUnknownBrowse
      • 199.232.210.172
      Lu4421.exeGet hashmaliciousAsyncRAT, DcRat, StealeriumBrowse
      • 199.232.214.172
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32+ executable (GUI) x86-64, for MS Windows
      Entropy (8bit):7.924314180370906
      TrID:
      • Win64 Executable GUI (202006/5) 92.65%
      • Win64 Executable (generic) (12005/4) 5.51%
      • Generic Win/DOS Executable (2004/3) 0.92%
      • DOS Executable Generic (2002/1) 0.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:PyIsvSahWy.exe
      File size:1'803'264 bytes
      MD5:ae601b5d146625e57ed192f334882823
      SHA1:882a2f15960cacbe612a73170b2d577e6476730f
      SHA256:8a50b6a8a1aaf1304c853d1ff3f6e93d65172b1f0381e2b86cef8d550100627a
      SHA512:b78edaeebaf3a206729f528a0bd6e73003a5650ec8f01d0bbd0c87c328fedd865f9443f8302008442d6fd90e20967d33ede942dfd70d3cd78b563c4208b2b876
      SSDEEP:49152:6riCrSsBav5PTa1cluR79QyQsb8QBFO89B:6TSiUlux9XQsb8QzpB
      TLSH:BC851298B3E50EE5FDB7513EC8528607D7B2BC220760DA9F03B046670F136E59D2A792
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Xhc.Xhc.Xhc...`._hc...f..hc...g.Rhc.....[hc...`.Qhc...g.Ihc...f.phc...b.Shc.Xhb..hc.K.g.Ahc.K.a.Yhc.RichXhc.........PE..d..
      Icon Hash:00928e8e8686b000
      Entrypoint:0x14000c0d0
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x140000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
      Time Stamp:0x669909F2 [Thu Jul 18 12:26:26 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:456e8615ad4320c9f54e50319a19df9c
      Signature Valid:
      Signature Issuer:
      Signature Validation Error:
      Error Number:
      Not Before, Not After
        Subject Chain
          Version:
          Thumbprint MD5:
          Thumbprint SHA-1:
          Thumbprint SHA-256:
          Serial:
          Instruction
          dec eax
          sub esp, 28h
          call 00007FB20CAD3AACh
          dec eax
          add esp, 28h
          jmp 00007FB20CAD36CFh
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          dec eax
          sub esp, 28h
          call 00007FB20CAD3E78h
          test eax, eax
          je 00007FB20CAD3873h
          dec eax
          mov eax, dword ptr [00000030h]
          dec eax
          mov ecx, dword ptr [eax+08h]
          jmp 00007FB20CAD3857h
          dec eax
          cmp ecx, eax
          je 00007FB20CAD3866h
          xor eax, eax
          dec eax
          cmpxchg dword ptr [0003843Ch], ecx
          jne 00007FB20CAD3840h
          xor al, al
          dec eax
          add esp, 28h
          ret
          mov al, 01h
          jmp 00007FB20CAD3849h
          int3
          int3
          int3
          dec eax
          sub esp, 28h
          test ecx, ecx
          jne 00007FB20CAD3859h
          mov byte ptr [00038425h], 00000001h
          call 00007FB20CAD2FA5h
          call 00007FB20CAD4290h
          test al, al
          jne 00007FB20CAD3856h
          xor al, al
          jmp 00007FB20CAD3866h
          call 00007FB20CAE0D9Fh
          test al, al
          jne 00007FB20CAD385Bh
          xor ecx, ecx
          call 00007FB20CAD42A0h
          jmp 00007FB20CAD383Ch
          mov al, 01h
          dec eax
          add esp, 28h
          ret
          int3
          int3
          inc eax
          push ebx
          dec eax
          sub esp, 20h
          cmp byte ptr [000383ECh], 00000000h
          mov ebx, ecx
          jne 00007FB20CAD38B9h
          cmp ecx, 01h
          jnbe 00007FB20CAD38BCh
          call 00007FB20CAD3DEEh
          test eax, eax
          je 00007FB20CAD387Ah
          test ebx, ebx
          jne 00007FB20CAD3876h
          dec eax
          lea ecx, dword ptr [000383D6h]
          call 00007FB20CAE0B92h
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x3c76c0x78.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x490000x94c.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x460000x2208.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x8beba30x2448
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x4a0000x768.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x39dc00x1c.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x39c800x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x450.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x292100x29400aca64598002ecff9eefbc96554edf015False0.5511067708333334data6.4784482217419175IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x2b0000x126420x12800707f62f07c15d947659847c2c167585fFalse0.524585620777027data5.750842204545925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x3e0000x73d80xe00d0a288978c66419b180b35f625b6dce7False0.13532366071428573data1.8378139998458343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x460000x22080x240074cf3ea22e0a1756984435d6f80f7da5False0.4671223958333333data5.259201915045256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x490000x94c0xa00c1b8b9c35bd90af92121f3e7dc8cea02False0.428515625data5.096629753028753IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x4a0000x7680x80071de9271648326ec88350e903470cf3eFalse0.5576171875data5.283119454571673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_VERSION0x490a00x39cdata0.45670995670995673
          RT_MANIFEST0x4943c0x50dXML 1.0 document, ASCII text0.4694508894044857
          DLLImport
          USER32.dllCreateWindowExW, PostMessageW, GetMessageW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
          COMCTL32.dll
          KERNEL32.dllGetACP, IsValidCodePage, GetStringTypeW, GetFileAttributesExW, SetEnvironmentVariableW, FlushFileBuffers, GetCurrentDirectoryW, GetOEMCP, GetCPInfo, GetModuleHandleW, MulDiv, GetLastError, FormatMessageW, GetModuleFileNameW, SetDllDirectoryW, CreateSymbolicLinkW, GetProcAddress, CreateDirectoryW, GetCommandLineW, GetEnvironmentVariableW, ExpandEnvironmentStringsW, GetEnvironmentStringsW, FindClose, FindFirstFileW, FindNextFileW, GetDriveTypeW, RemoveDirectoryW, GetTempPathW, CloseHandle, WaitForSingleObject, Sleep, GetCurrentProcess, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LoadLibraryExW, LocalFree, SetConsoleCtrlHandler, K32EnumProcessModules, K32GetModuleFileNameExW, CreateFileW, FindFirstFileExW, GetFinalPathNameByHandleW, MultiByteToWideChar, WideCharToMultiByte, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, IsProcessorFeaturePresent, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, ReadFile, GetFullPathNameW, SetStdHandle, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW
          ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
          GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Dec 18, 2024 15:55:14.254487038 CET1.1.1.1192.168.2.60x1998No error (0)g-bing-com.ax-0001.ax-msedge.netax-0001.ax-msedge.netCNAME (Canonical name)IN (0x0001)false
          Dec 18, 2024 15:55:14.254487038 CET1.1.1.1192.168.2.60x1998No error (0)ax-0001.ax-msedge.net150.171.27.10A (IP address)IN (0x0001)false
          Dec 18, 2024 15:55:14.254487038 CET1.1.1.1192.168.2.60x1998No error (0)ax-0001.ax-msedge.net150.171.28.10A (IP address)IN (0x0001)false
          Dec 18, 2024 15:55:37.865242958 CET1.1.1.1192.168.2.60xb3e9No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
          Dec 18, 2024 15:55:37.865242958 CET1.1.1.1192.168.2.60xb3e9No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:09:54:49
          Start date:18/12/2024
          Path:C:\Users\user\Desktop\PyIsvSahWy.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\PyIsvSahWy.exe"
          Imagebase:0x7ff6b9070000
          File size:1'803'264 bytes
          MD5 hash:AE601B5D146625E57ED192F334882823
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:5.2%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:19.8%
            Total number of Nodes:2000
            Total number of Limit Nodes:23
            execution_graph 19379 7ff6b90909c0 19390 7ff6b90966f4 19379->19390 19391 7ff6b9096701 19390->19391 19392 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19391->19392 19394 7ff6b909671d 19391->19394 19392->19391 19393 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19393->19394 19394->19393 19395 7ff6b90909c9 19394->19395 19396 7ff6b908f5e8 EnterCriticalSection 19395->19396 18793 7ff6b907be70 18794 7ff6b907be80 18793->18794 18810 7ff6b9088ec0 18794->18810 18796 7ff6b907be8c 18816 7ff6b907c168 18796->18816 18798 7ff6b907bea4 _RTC_Initialize 18808 7ff6b907bef9 18798->18808 18821 7ff6b907c318 18798->18821 18799 7ff6b907c44c 7 API calls 18800 7ff6b907bf25 18799->18800 18802 7ff6b907beb9 18824 7ff6b908832c 18802->18824 18808->18799 18809 7ff6b907bf15 18808->18809 18811 7ff6b9088ed1 18810->18811 18812 7ff6b90843f4 memcpy_s 11 API calls 18811->18812 18815 7ff6b9088ed9 18811->18815 18813 7ff6b9088ee8 18812->18813 18814 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 18813->18814 18814->18815 18815->18796 18817 7ff6b907c179 18816->18817 18820 7ff6b907c17e __scrt_acquire_startup_lock 18816->18820 18818 7ff6b907c44c 7 API calls 18817->18818 18817->18820 18819 7ff6b907c1f2 18818->18819 18820->18798 18849 7ff6b907c2dc 18821->18849 18823 7ff6b907c321 18823->18802 18825 7ff6b908834c 18824->18825 18839 7ff6b907bec5 18824->18839 18826 7ff6b9088354 18825->18826 18827 7ff6b908836a GetModuleFileNameW 18825->18827 18828 7ff6b90843f4 memcpy_s 11 API calls 18826->18828 18831 7ff6b9088395 18827->18831 18829 7ff6b9088359 18828->18829 18830 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 18829->18830 18830->18839 18864 7ff6b90882cc 18831->18864 18834 7ff6b90883dd 18835 7ff6b90843f4 memcpy_s 11 API calls 18834->18835 18836 7ff6b90883e2 18835->18836 18837 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18836->18837 18837->18839 18838 7ff6b90883f5 18841 7ff6b9088443 18838->18841 18843 7ff6b908845c 18838->18843 18846 7ff6b9088417 18838->18846 18839->18808 18848 7ff6b907c3ec InitializeSListHead 18839->18848 18840 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18840->18839 18842 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18841->18842 18845 7ff6b908844c 18842->18845 18844 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18843->18844 18844->18846 18847 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18845->18847 18846->18840 18847->18839 18850 7ff6b907c2f6 18849->18850 18851 7ff6b907c2ef 18849->18851 18853 7ff6b90894fc 18850->18853 18851->18823 18856 7ff6b9089138 18853->18856 18863 7ff6b908f5e8 EnterCriticalSection 18856->18863 18865 7ff6b90882e4 18864->18865 18869 7ff6b908831c 18864->18869 18866 7ff6b908dea8 memcpy_s 11 API calls 18865->18866 18865->18869 18867 7ff6b9088312 18866->18867 18868 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18867->18868 18868->18869 18869->18834 18869->18838 15754 7ff6b907bf5c 15775 7ff6b907c12c 15754->15775 15757 7ff6b907c0a8 15902 7ff6b907c44c IsProcessorFeaturePresent 15757->15902 15758 7ff6b907bf78 __scrt_acquire_startup_lock 15760 7ff6b907c0b2 15758->15760 15766 7ff6b907bf96 __scrt_release_startup_lock 15758->15766 15761 7ff6b907c44c 7 API calls 15760->15761 15763 7ff6b907c0bd __GetCurrentState 15761->15763 15762 7ff6b907bfbb 15764 7ff6b907c041 15781 7ff6b907c594 15764->15781 15766->15762 15766->15764 15891 7ff6b9088e44 15766->15891 15767 7ff6b907c046 15784 7ff6b9071000 15767->15784 15772 7ff6b907c069 15772->15763 15898 7ff6b907c2b0 15772->15898 15776 7ff6b907c134 15775->15776 15777 7ff6b907c140 __scrt_dllmain_crt_thread_attach 15776->15777 15778 7ff6b907c14d 15777->15778 15780 7ff6b907bf70 15777->15780 15778->15780 15909 7ff6b907cba8 15778->15909 15780->15757 15780->15758 15936 7ff6b90997e0 15781->15936 15785 7ff6b9071009 15784->15785 15938 7ff6b9084794 15785->15938 15787 7ff6b907352b 15945 7ff6b90733e0 15787->15945 15794 7ff6b907356c 16041 7ff6b9071bf0 15794->16041 15795 7ff6b9073736 16007 7ff6b9073f70 15795->16007 15799 7ff6b9073785 16030 7ff6b90725f0 15799->16030 15803 7ff6b9073538 16063 7ff6b907b870 15803->16063 15804 7ff6b907365f __std_exception_copy 15809 7ff6b9073844 15804->15809 15813 7ff6b9077e10 14 API calls 15804->15813 15805 7ff6b9073778 15806 7ff6b907377d 15805->15806 15807 7ff6b907379f 15805->15807 16026 7ff6b907f36c 15806->16026 15808 7ff6b9071bf0 49 API calls 15807->15808 15811 7ff6b90737be 15808->15811 16121 7ff6b9073e90 15809->16121 15820 7ff6b90718f0 115 API calls 15811->15820 15812 7ff6b9073588 16045 7ff6b9077e10 15812->16045 15815 7ff6b90736ae 15813->15815 16058 7ff6b9077f80 15815->16058 15816 7ff6b9073852 15818 7ff6b9073865 15816->15818 15819 7ff6b9073871 15816->15819 16124 7ff6b9073fe0 15818->16124 15823 7ff6b9071bf0 49 API calls 15819->15823 15824 7ff6b90737df 15820->15824 15821 7ff6b90736bd 15825 7ff6b907380f 15821->15825 15828 7ff6b90736cf 15821->15828 15840 7ff6b9073805 __std_exception_copy 15823->15840 15824->15812 15827 7ff6b90737ef 15824->15827 16072 7ff6b9078400 15825->16072 15832 7ff6b90725f0 53 API calls 15827->15832 15833 7ff6b9071bf0 49 API calls 15828->15833 15831 7ff6b907389e SetDllDirectoryW 15838 7ff6b90738c3 15831->15838 15832->15803 15836 7ff6b90736f1 15833->15836 15839 7ff6b90736fc 15836->15839 15836->15840 15843 7ff6b9073a50 15838->15843 16132 7ff6b9076560 15838->16132 15841 7ff6b90725f0 53 API calls 15839->15841 16127 7ff6b90786b0 15840->16127 15841->15803 15845 7ff6b9073a7d 15843->15845 15846 7ff6b9073a5a PostMessageW GetMessageW 15843->15846 16227 7ff6b9073080 15845->16227 15846->15845 15849 7ff6b90738ea 15851 7ff6b9073947 15849->15851 15858 7ff6b9073901 15849->15858 16152 7ff6b90765a0 15849->16152 15851->15843 15856 7ff6b907395c 15851->15856 16207 7ff6b90730e0 15856->16207 15866 7ff6b9073905 15858->15866 16173 7ff6b9076970 15858->16173 15861 7ff6b9076780 FreeLibrary 15864 7ff6b9073aa3 15861->15864 15865 7ff6b907396c 16226 7ff6b90783e0 LocalFree 15865->16226 15866->15851 16189 7ff6b9072870 15866->16189 15892 7ff6b9088e5b 15891->15892 15893 7ff6b9088e7c 15891->15893 15892->15764 18414 7ff6b90896e8 15893->18414 15896 7ff6b907c5d8 GetModuleHandleW 15897 7ff6b907c5e9 15896->15897 15897->15772 15899 7ff6b907c2c1 15898->15899 15900 7ff6b907c080 15899->15900 15901 7ff6b907cba8 7 API calls 15899->15901 15900->15762 15901->15900 15903 7ff6b907c472 _isindst __scrt_get_show_window_mode 15902->15903 15904 7ff6b907c491 RtlCaptureContext RtlLookupFunctionEntry 15903->15904 15905 7ff6b907c4ba RtlVirtualUnwind 15904->15905 15906 7ff6b907c4f6 __scrt_get_show_window_mode 15904->15906 15905->15906 15907 7ff6b907c528 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15906->15907 15908 7ff6b907c576 _isindst 15907->15908 15908->15760 15910 7ff6b907cbba 15909->15910 15911 7ff6b907cbb0 15909->15911 15910->15780 15915 7ff6b907cf44 15911->15915 15916 7ff6b907cf53 15915->15916 15917 7ff6b907cbb5 15915->15917 15923 7ff6b907d180 15916->15923 15919 7ff6b907cfb0 15917->15919 15920 7ff6b907cfdb 15919->15920 15921 7ff6b907cfdf 15920->15921 15922 7ff6b907cfbe DeleteCriticalSection 15920->15922 15921->15910 15922->15920 15927 7ff6b907cfe8 15923->15927 15928 7ff6b907d02c __vcrt_FlsAlloc 15927->15928 15934 7ff6b907d0d2 TlsFree 15927->15934 15929 7ff6b907d05a LoadLibraryExW 15928->15929 15930 7ff6b907d119 GetProcAddress 15928->15930 15928->15934 15935 7ff6b907d09d LoadLibraryExW 15928->15935 15931 7ff6b907d07b GetLastError 15929->15931 15932 7ff6b907d0f9 15929->15932 15930->15934 15931->15928 15932->15930 15933 7ff6b907d110 FreeLibrary 15932->15933 15933->15930 15935->15928 15935->15932 15937 7ff6b907c5ab GetStartupInfoW 15936->15937 15937->15767 15941 7ff6b908e790 15938->15941 15939 7ff6b908e7e3 16240 7ff6b9089b24 15939->16240 15941->15939 15942 7ff6b908e836 15941->15942 16250 7ff6b908e668 15942->16250 15944 7ff6b908e80c 15944->15787 16357 7ff6b907bb70 15945->16357 15948 7ff6b907341b 16364 7ff6b90729e0 15948->16364 15949 7ff6b9073438 16359 7ff6b90785a0 FindFirstFileExW 15949->16359 15952 7ff6b907342e 15956 7ff6b907b870 _log10_special 8 API calls 15952->15956 15954 7ff6b907344b 16374 7ff6b9078620 CreateFileW 15954->16374 15955 7ff6b90734a5 16383 7ff6b9078760 15955->16383 15960 7ff6b90734dd 15956->15960 15959 7ff6b90734b3 15959->15952 15964 7ff6b90726c0 49 API calls 15959->15964 15960->15803 15967 7ff6b90718f0 15960->15967 15962 7ff6b907345c 16377 7ff6b90726c0 15962->16377 15963 7ff6b9073474 __vcrt_FlsAlloc 15963->15955 15964->15952 15968 7ff6b9073f70 108 API calls 15967->15968 15969 7ff6b9071925 15968->15969 15970 7ff6b9071bb6 15969->15970 15972 7ff6b90776a0 83 API calls 15969->15972 15971 7ff6b907b870 _log10_special 8 API calls 15970->15971 15973 7ff6b9071bd1 15971->15973 15974 7ff6b907196b 15972->15974 15973->15794 15973->15795 16006 7ff6b907199c 15974->16006 16788 7ff6b907f9f4 15974->16788 15976 7ff6b907f36c 74 API calls 15976->15970 15977 7ff6b9071985 15978 7ff6b9071989 15977->15978 15979 7ff6b90719a1 15977->15979 16792 7ff6b9072760 15978->16792 16809 7ff6b907f6bc 15979->16809 15983 7ff6b90719d7 15986 7ff6b9071a06 15983->15986 15987 7ff6b90719ee 15983->15987 15984 7ff6b90719bf 15985 7ff6b9072760 53 API calls 15984->15985 15985->16006 15989 7ff6b9071bf0 49 API calls 15986->15989 15988 7ff6b9072760 53 API calls 15987->15988 15988->16006 15990 7ff6b9071a1d 15989->15990 15991 7ff6b9071bf0 49 API calls 15990->15991 15992 7ff6b9071a68 15991->15992 15993 7ff6b907f9f4 73 API calls 15992->15993 15994 7ff6b9071a8c 15993->15994 15995 7ff6b9071ab9 15994->15995 15996 7ff6b9071aa1 15994->15996 15998 7ff6b907f6bc _fread_nolock 53 API calls 15995->15998 15997 7ff6b9072760 53 API calls 15996->15997 15997->16006 15999 7ff6b9071ace 15998->15999 16000 7ff6b9071aec 15999->16000 16001 7ff6b9071ad4 15999->16001 16812 7ff6b907f430 16000->16812 16002 7ff6b9072760 53 API calls 16001->16002 16002->16006 16005 7ff6b90725f0 53 API calls 16005->16006 16006->15976 16008 7ff6b9073f7c 16007->16008 16009 7ff6b90786b0 2 API calls 16008->16009 16010 7ff6b9073fa4 16009->16010 16011 7ff6b90786b0 2 API calls 16010->16011 16012 7ff6b9073fb7 16011->16012 17021 7ff6b90852a4 16012->17021 16015 7ff6b907b870 _log10_special 8 API calls 16016 7ff6b9073746 16015->16016 16016->15799 16017 7ff6b90776a0 16016->16017 16018 7ff6b90776c4 16017->16018 16019 7ff6b907f9f4 73 API calls 16018->16019 16020 7ff6b907779b __std_exception_copy 16018->16020 16021 7ff6b90776e0 16019->16021 16020->15805 16021->16020 17437 7ff6b9086bd8 16021->17437 16023 7ff6b907f9f4 73 API calls 16025 7ff6b90776f5 16023->16025 16024 7ff6b907f6bc _fread_nolock 53 API calls 16024->16025 16025->16020 16025->16023 16025->16024 16027 7ff6b907f39c 16026->16027 17452 7ff6b907f148 16027->17452 16029 7ff6b907f3b5 16029->15799 16031 7ff6b907262a 16030->16031 16032 7ff6b9083ca4 49 API calls 16031->16032 16033 7ff6b9072652 16032->16033 16034 7ff6b90786b0 2 API calls 16033->16034 16035 7ff6b907266a 16034->16035 16036 7ff6b9072677 MessageBoxW 16035->16036 16037 7ff6b907268e MessageBoxA 16035->16037 16038 7ff6b90726a0 16036->16038 16037->16038 16039 7ff6b907b870 _log10_special 8 API calls 16038->16039 16040 7ff6b90726b0 16039->16040 16040->15803 16042 7ff6b9071c15 16041->16042 16043 7ff6b9083ca4 49 API calls 16042->16043 16044 7ff6b9071c38 16043->16044 16044->15812 16046 7ff6b9077e1a 16045->16046 16047 7ff6b90786b0 2 API calls 16046->16047 16048 7ff6b9077e39 GetEnvironmentVariableW 16047->16048 16049 7ff6b9077e56 ExpandEnvironmentStringsW 16048->16049 16050 7ff6b9077ea2 16048->16050 16049->16050 16051 7ff6b9077e78 16049->16051 16052 7ff6b907b870 _log10_special 8 API calls 16050->16052 16053 7ff6b9078760 2 API calls 16051->16053 16054 7ff6b9077eb4 16052->16054 16055 7ff6b9077e8a 16053->16055 16054->15804 16056 7ff6b907b870 _log10_special 8 API calls 16055->16056 16057 7ff6b9077e9a 16056->16057 16057->15804 16059 7ff6b90786b0 2 API calls 16058->16059 16060 7ff6b9077f94 16059->16060 17463 7ff6b9087548 16060->17463 16062 7ff6b9077fa6 __std_exception_copy 16062->15821 16064 7ff6b907b879 16063->16064 16065 7ff6b907372a 16064->16065 16066 7ff6b907bc00 IsProcessorFeaturePresent 16064->16066 16065->15896 16067 7ff6b907bc18 16066->16067 17481 7ff6b907bdf8 RtlCaptureContext 16067->17481 16073 7ff6b9078415 16072->16073 17486 7ff6b9077b50 GetCurrentProcess OpenProcessToken 16073->17486 16076 7ff6b9077b50 7 API calls 16077 7ff6b9078441 16076->16077 16078 7ff6b907845a 16077->16078 16079 7ff6b9078474 16077->16079 16080 7ff6b9072590 48 API calls 16078->16080 16081 7ff6b9072590 48 API calls 16079->16081 16082 7ff6b9078472 16080->16082 16083 7ff6b9078487 LocalFree LocalFree 16081->16083 16082->16083 16084 7ff6b90784a3 16083->16084 16086 7ff6b90784af 16083->16086 17496 7ff6b9072940 16084->17496 16087 7ff6b907b870 _log10_special 8 API calls 16086->16087 16088 7ff6b9073814 16087->16088 16089 7ff6b9077c40 16088->16089 16090 7ff6b9077c58 16089->16090 16091 7ff6b9077cda GetTempPathW 16090->16091 16093 7ff6b9077e10 14 API calls 16090->16093 16092 7ff6b9077cef 16091->16092 17534 7ff6b9072530 16092->17534 16094 7ff6b9077c88 16093->16094 17502 7ff6b90777d0 16094->17502 16103 7ff6b9077d08 __std_exception_copy 16122 7ff6b9071bf0 49 API calls 16121->16122 16123 7ff6b9073ead 16122->16123 16123->15816 16125 7ff6b9071bf0 49 API calls 16124->16125 16126 7ff6b9074010 16125->16126 16126->15840 16126->16126 16128 7ff6b90786d2 MultiByteToWideChar 16127->16128 16130 7ff6b90786f6 16127->16130 16128->16130 16131 7ff6b907870c __std_exception_copy 16128->16131 16129 7ff6b9078713 MultiByteToWideChar 16129->16131 16130->16129 16130->16131 16131->15831 16133 7ff6b9076575 16132->16133 16134 7ff6b90738d5 16133->16134 16135 7ff6b9072760 53 API calls 16133->16135 16136 7ff6b9076b00 16134->16136 16135->16134 16137 7ff6b9076b30 16136->16137 16150 7ff6b9076b4a __std_exception_copy 16136->16150 16137->16150 17772 7ff6b9071440 16137->17772 16139 7ff6b9076b54 16140 7ff6b9073fe0 49 API calls 16139->16140 16139->16150 16141 7ff6b9076b76 16140->16141 16142 7ff6b9076b7b 16141->16142 16143 7ff6b9073fe0 49 API calls 16141->16143 16145 7ff6b9072870 53 API calls 16142->16145 16144 7ff6b9076b9a 16143->16144 16144->16142 16146 7ff6b9073fe0 49 API calls 16144->16146 16145->16150 16147 7ff6b9076bb6 16146->16147 16147->16142 16148 7ff6b9076bbf 16147->16148 16149 7ff6b90725f0 53 API calls 16148->16149 16151 7ff6b9076c2f __std_exception_copy memcpy_s 16148->16151 16149->16150 16150->15849 16151->15849 16156 7ff6b90765bc 16152->16156 16153 7ff6b907b870 _log10_special 8 API calls 16155 7ff6b90766f1 16153->16155 16155->15858 16157 7ff6b907675d 16156->16157 16158 7ff6b9071bf0 49 API calls 16156->16158 16160 7ff6b907674a 16156->16160 16163 7ff6b907670d 16156->16163 16166 7ff6b9072870 53 API calls 16156->16166 16167 7ff6b90766df 16156->16167 16168 7ff6b9076737 16156->16168 16171 7ff6b9076720 16156->16171 17833 7ff6b90717e0 16156->17833 17837 7ff6b9073f10 16156->17837 17843 7ff6b9077530 16156->17843 17854 7ff6b90715c0 16156->17854 16159 7ff6b90725f0 53 API calls 16157->16159 16158->16156 16159->16167 16161 7ff6b90725f0 53 API calls 16160->16161 16161->16167 16165 7ff6b90725f0 53 API calls 16163->16165 16165->16167 16166->16156 16167->16153 16170 7ff6b90725f0 53 API calls 16168->16170 16170->16167 16172 7ff6b90725f0 53 API calls 16171->16172 16172->16167 17946 7ff6b90781a0 16173->17946 16175 7ff6b9076989 16176 7ff6b90781a0 3 API calls 16175->16176 16177 7ff6b907699c 16176->16177 16178 7ff6b90769cf 16177->16178 16179 7ff6b90769b4 16177->16179 16180 7ff6b90725f0 53 API calls 16178->16180 17950 7ff6b9076ea0 GetProcAddress 16179->17950 16182 7ff6b9073916 16180->16182 16182->15866 16183 7ff6b9076cd0 16182->16183 16184 7ff6b9076ced 16183->16184 16185 7ff6b90725f0 53 API calls 16184->16185 16188 7ff6b9076d58 16184->16188 16186 7ff6b9076d40 16185->16186 16188->15866 16190 7ff6b90728aa 16189->16190 16191 7ff6b9083ca4 49 API calls 16190->16191 16192 7ff6b90728d2 16191->16192 16193 7ff6b90786b0 2 API calls 16192->16193 16194 7ff6b90728ea 16193->16194 16195 7ff6b90728f7 MessageBoxW 16194->16195 16196 7ff6b907290e MessageBoxA 16194->16196 16197 7ff6b9072920 16195->16197 16196->16197 16198 7ff6b907b870 _log10_special 8 API calls 16197->16198 16199 7ff6b9072930 16198->16199 16200 7ff6b9076780 16199->16200 16201 7ff6b90768d6 16200->16201 16206 7ff6b9076792 16200->16206 16201->15851 16202 7ff6b90768aa 16204 7ff6b90768c2 16202->16204 18014 7ff6b9078180 FreeLibrary 16202->18014 16204->15851 16206->16202 18013 7ff6b9078180 FreeLibrary 16206->18013 16208 7ff6b90730ee __scrt_get_show_window_mode 16207->16208 16212 7ff6b90732e7 16208->16212 16213 7ff6b9071bf0 49 API calls 16208->16213 16214 7ff6b9073309 16208->16214 16215 7ff6b9073f10 10 API calls 16208->16215 16217 7ff6b9077530 52 API calls 16208->16217 16219 7ff6b90732e9 16208->16219 16220 7ff6b9072870 53 API calls 16208->16220 16223 7ff6b90715c0 118 API calls 16208->16223 16224 7ff6b90732f7 16208->16224 18015 7ff6b90768e0 16208->18015 18019 7ff6b9073b40 16208->18019 18063 7ff6b9073e00 16208->18063 16209 7ff6b907b870 _log10_special 8 API calls 16210 7ff6b907338e 16209->16210 16210->15803 16210->15865 16212->16209 16213->16208 16216 7ff6b90725f0 53 API calls 16214->16216 16215->16208 16216->16212 16217->16208 16221 7ff6b90725f0 53 API calls 16219->16221 16220->16208 16221->16212 16223->16208 16225 7ff6b90725f0 53 API calls 16224->16225 16225->16212 18125 7ff6b9075af0 16227->18125 16230 7ff6b90730b9 16236 7ff6b90733a0 16230->16236 16232 7ff6b90730a1 16232->16230 18195 7ff6b9075800 16232->18195 16238 7ff6b90733ae 16236->16238 16237 7ff6b90733bf 16237->15861 16238->16237 18413 7ff6b9078180 FreeLibrary 16238->18413 16257 7ff6b908986c 16240->16257 16243 7ff6b9089b5f 16243->15944 16356 7ff6b908477c EnterCriticalSection 16250->16356 16258 7ff6b90898c3 16257->16258 16259 7ff6b9089888 GetLastError 16257->16259 16258->16243 16263 7ff6b90898d8 16258->16263 16260 7ff6b9089898 16259->16260 16270 7ff6b908a6a0 16260->16270 16264 7ff6b90898f4 GetLastError SetLastError 16263->16264 16265 7ff6b908990c 16263->16265 16264->16265 16265->16243 16266 7ff6b9089c10 IsProcessorFeaturePresent 16265->16266 16267 7ff6b9089c23 16266->16267 16348 7ff6b9089924 16267->16348 16271 7ff6b908a6bf FlsGetValue 16270->16271 16272 7ff6b908a6da FlsSetValue 16270->16272 16274 7ff6b908a6d4 16271->16274 16276 7ff6b90898b3 SetLastError 16271->16276 16273 7ff6b908a6e7 16272->16273 16272->16276 16287 7ff6b908dea8 16273->16287 16274->16272 16276->16258 16277 7ff6b908a6f6 16278 7ff6b908a714 FlsSetValue 16277->16278 16279 7ff6b908a704 FlsSetValue 16277->16279 16281 7ff6b908a720 FlsSetValue 16278->16281 16282 7ff6b908a732 16278->16282 16280 7ff6b908a70d 16279->16280 16294 7ff6b9089c58 16280->16294 16281->16280 16300 7ff6b908a204 16282->16300 16292 7ff6b908deb9 memcpy_s 16287->16292 16288 7ff6b908df0a 16308 7ff6b90843f4 16288->16308 16289 7ff6b908deee HeapAlloc 16290 7ff6b908df08 16289->16290 16289->16292 16290->16277 16292->16288 16292->16289 16305 7ff6b90928a0 16292->16305 16295 7ff6b9089c8c 16294->16295 16296 7ff6b9089c5d HeapFree 16294->16296 16295->16276 16296->16295 16297 7ff6b9089c78 GetLastError 16296->16297 16298 7ff6b9089c85 Concurrency::details::SchedulerProxy::DeleteThis 16297->16298 16299 7ff6b90843f4 memcpy_s 9 API calls 16298->16299 16299->16295 16334 7ff6b908a0dc 16300->16334 16311 7ff6b90928e0 16305->16311 16317 7ff6b908a5d8 GetLastError 16308->16317 16310 7ff6b90843fd 16310->16290 16316 7ff6b908f5e8 EnterCriticalSection 16311->16316 16318 7ff6b908a619 FlsSetValue 16317->16318 16322 7ff6b908a5fc 16317->16322 16319 7ff6b908a62b 16318->16319 16331 7ff6b908a609 16318->16331 16321 7ff6b908dea8 memcpy_s 5 API calls 16319->16321 16320 7ff6b908a685 SetLastError 16320->16310 16323 7ff6b908a63a 16321->16323 16322->16318 16322->16331 16324 7ff6b908a658 FlsSetValue 16323->16324 16325 7ff6b908a648 FlsSetValue 16323->16325 16326 7ff6b908a664 FlsSetValue 16324->16326 16327 7ff6b908a676 16324->16327 16328 7ff6b908a651 16325->16328 16326->16328 16329 7ff6b908a204 memcpy_s 5 API calls 16327->16329 16330 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 16328->16330 16332 7ff6b908a67e 16329->16332 16330->16331 16331->16320 16333 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 16332->16333 16333->16320 16346 7ff6b908f5e8 EnterCriticalSection 16334->16346 16349 7ff6b908995e _isindst __scrt_get_show_window_mode 16348->16349 16350 7ff6b9089986 RtlCaptureContext RtlLookupFunctionEntry 16349->16350 16351 7ff6b90899c0 RtlVirtualUnwind 16350->16351 16352 7ff6b90899f6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16350->16352 16351->16352 16354 7ff6b9089a48 _isindst 16352->16354 16353 7ff6b907b870 _log10_special 8 API calls 16355 7ff6b9089a67 GetCurrentProcess TerminateProcess 16353->16355 16354->16353 16358 7ff6b90733ec GetModuleFileNameW 16357->16358 16358->15948 16358->15949 16360 7ff6b90785f2 16359->16360 16361 7ff6b90785df FindClose 16359->16361 16362 7ff6b907b870 _log10_special 8 API calls 16360->16362 16361->16360 16363 7ff6b9073442 16362->16363 16363->15954 16363->15955 16365 7ff6b907bb70 16364->16365 16366 7ff6b90729fc GetLastError 16365->16366 16367 7ff6b9072a29 16366->16367 16388 7ff6b9083ef8 16367->16388 16372 7ff6b907b870 _log10_special 8 API calls 16373 7ff6b9072ae5 16372->16373 16373->15952 16375 7ff6b9073458 16374->16375 16376 7ff6b9078660 GetFinalPathNameByHandleW CloseHandle 16374->16376 16375->15962 16375->15963 16376->16375 16378 7ff6b90726fa 16377->16378 16379 7ff6b9083ef8 48 API calls 16378->16379 16380 7ff6b9072722 MessageBoxW 16379->16380 16381 7ff6b907b870 _log10_special 8 API calls 16380->16381 16382 7ff6b907274c 16381->16382 16382->15952 16384 7ff6b907878a WideCharToMultiByte 16383->16384 16385 7ff6b90787b5 16383->16385 16384->16385 16387 7ff6b90787cb __std_exception_copy 16384->16387 16386 7ff6b90787d2 WideCharToMultiByte 16385->16386 16385->16387 16386->16387 16387->15959 16392 7ff6b9083f52 16388->16392 16389 7ff6b9083f77 16390 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16389->16390 16394 7ff6b9083fa1 16390->16394 16391 7ff6b9083fb3 16410 7ff6b90822b0 16391->16410 16392->16389 16392->16391 16396 7ff6b907b870 _log10_special 8 API calls 16394->16396 16395 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16395->16394 16398 7ff6b9072a54 FormatMessageW 16396->16398 16406 7ff6b9072590 16398->16406 16399 7ff6b90840ba 16401 7ff6b90840c4 16399->16401 16404 7ff6b9084094 16399->16404 16400 7ff6b9084060 16403 7ff6b9084069 16400->16403 16400->16404 16405 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16401->16405 16402 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16402->16394 16403->16402 16404->16395 16405->16394 16407 7ff6b90725b5 16406->16407 16408 7ff6b9083ef8 48 API calls 16407->16408 16409 7ff6b90725d8 MessageBoxW 16408->16409 16409->16372 16411 7ff6b90822ee 16410->16411 16412 7ff6b90822de 16410->16412 16413 7ff6b90822f7 16411->16413 16419 7ff6b9082325 16411->16419 16414 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16412->16414 16415 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16413->16415 16416 7ff6b908231d 16414->16416 16415->16416 16416->16399 16416->16400 16416->16403 16416->16404 16419->16412 16419->16416 16421 7ff6b9082cc4 16419->16421 16454 7ff6b9082710 16419->16454 16491 7ff6b9081ea0 16419->16491 16422 7ff6b9082d77 16421->16422 16423 7ff6b9082d06 16421->16423 16424 7ff6b9082d7c 16422->16424 16425 7ff6b9082dd0 16422->16425 16426 7ff6b9082d0c 16423->16426 16427 7ff6b9082da1 16423->16427 16428 7ff6b9082db1 16424->16428 16429 7ff6b9082d7e 16424->16429 16433 7ff6b9082dda 16425->16433 16434 7ff6b9082de7 16425->16434 16439 7ff6b9082ddf 16425->16439 16430 7ff6b9082d11 16426->16430 16431 7ff6b9082d40 16426->16431 16514 7ff6b9081074 16427->16514 16521 7ff6b9080c64 16428->16521 16432 7ff6b9082d20 16429->16432 16442 7ff6b9082d8d 16429->16442 16430->16434 16436 7ff6b9082d17 16430->16436 16431->16436 16431->16439 16452 7ff6b9082e10 16432->16452 16494 7ff6b9083478 16432->16494 16433->16427 16433->16439 16528 7ff6b90839cc 16434->16528 16436->16432 16441 7ff6b9082d52 16436->16441 16449 7ff6b9082d3b 16436->16449 16439->16452 16532 7ff6b9081484 16439->16532 16441->16452 16504 7ff6b90837b4 16441->16504 16442->16427 16444 7ff6b9082d92 16442->16444 16444->16452 16510 7ff6b9083878 16444->16510 16446 7ff6b907b870 _log10_special 8 API calls 16448 7ff6b908310a 16446->16448 16448->16419 16449->16452 16453 7ff6b9082ffc 16449->16453 16539 7ff6b9083ae0 16449->16539 16452->16446 16453->16452 16545 7ff6b908dd18 16453->16545 16455 7ff6b9082734 16454->16455 16456 7ff6b908271e 16454->16456 16457 7ff6b9082774 16455->16457 16460 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16455->16460 16456->16457 16458 7ff6b9082d77 16456->16458 16459 7ff6b9082d06 16456->16459 16457->16419 16461 7ff6b9082d7c 16458->16461 16462 7ff6b9082dd0 16458->16462 16463 7ff6b9082d0c 16459->16463 16464 7ff6b9082da1 16459->16464 16460->16457 16465 7ff6b9082db1 16461->16465 16466 7ff6b9082d7e 16461->16466 16470 7ff6b9082dda 16462->16470 16471 7ff6b9082de7 16462->16471 16476 7ff6b9082ddf 16462->16476 16467 7ff6b9082d11 16463->16467 16468 7ff6b9082d40 16463->16468 16472 7ff6b9081074 38 API calls 16464->16472 16474 7ff6b9080c64 38 API calls 16465->16474 16469 7ff6b9082d20 16466->16469 16480 7ff6b9082d8d 16466->16480 16467->16471 16473 7ff6b9082d17 16467->16473 16468->16473 16468->16476 16475 7ff6b9083478 47 API calls 16469->16475 16490 7ff6b9082e10 16469->16490 16470->16464 16470->16476 16477 7ff6b90839cc 45 API calls 16471->16477 16488 7ff6b9082d3b 16472->16488 16473->16469 16478 7ff6b9082d52 16473->16478 16473->16488 16474->16488 16475->16488 16479 7ff6b9081484 38 API calls 16476->16479 16476->16490 16477->16488 16481 7ff6b90837b4 46 API calls 16478->16481 16478->16490 16479->16488 16480->16464 16482 7ff6b9082d92 16480->16482 16481->16488 16484 7ff6b9083878 37 API calls 16482->16484 16482->16490 16483 7ff6b907b870 _log10_special 8 API calls 16485 7ff6b908310a 16483->16485 16484->16488 16485->16419 16486 7ff6b9083ae0 45 API calls 16489 7ff6b9082ffc 16486->16489 16487 7ff6b908dd18 46 API calls 16487->16489 16488->16486 16488->16489 16488->16490 16489->16487 16489->16490 16490->16483 16771 7ff6b90802e8 16491->16771 16495 7ff6b908349e 16494->16495 16557 7ff6b907fea0 16495->16557 16500 7ff6b9083ae0 45 API calls 16502 7ff6b90835e3 16500->16502 16501 7ff6b9083671 16501->16449 16502->16501 16503 7ff6b9083ae0 45 API calls 16502->16503 16503->16501 16505 7ff6b90837e9 16504->16505 16506 7ff6b908382e 16505->16506 16507 7ff6b9083807 16505->16507 16508 7ff6b9083ae0 45 API calls 16505->16508 16506->16449 16509 7ff6b908dd18 46 API calls 16507->16509 16508->16507 16509->16506 16513 7ff6b9083899 16510->16513 16511 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16512 7ff6b90838ca 16511->16512 16512->16449 16513->16511 16513->16512 16515 7ff6b90810a7 16514->16515 16516 7ff6b90810d6 16515->16516 16518 7ff6b9081193 16515->16518 16519 7ff6b9081113 16516->16519 16703 7ff6b907ff48 16516->16703 16520 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16518->16520 16519->16449 16520->16519 16522 7ff6b9080c97 16521->16522 16523 7ff6b9080cc6 16522->16523 16525 7ff6b9080d83 16522->16525 16524 7ff6b907ff48 12 API calls 16523->16524 16527 7ff6b9080d03 16523->16527 16524->16527 16526 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16525->16526 16526->16527 16527->16449 16529 7ff6b9083a0f 16528->16529 16531 7ff6b9083a13 __crtLCMapStringW 16529->16531 16711 7ff6b9083a68 16529->16711 16531->16449 16533 7ff6b90814b7 16532->16533 16534 7ff6b90814e6 16533->16534 16536 7ff6b90815a3 16533->16536 16535 7ff6b907ff48 12 API calls 16534->16535 16538 7ff6b9081523 16534->16538 16535->16538 16537 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16536->16537 16537->16538 16538->16449 16540 7ff6b9083af7 16539->16540 16715 7ff6b908ccc8 16540->16715 16546 7ff6b908dd49 16545->16546 16554 7ff6b908dd57 16545->16554 16547 7ff6b908dd77 16546->16547 16548 7ff6b9083ae0 45 API calls 16546->16548 16546->16554 16549 7ff6b908ddaf 16547->16549 16550 7ff6b908dd88 16547->16550 16548->16547 16552 7ff6b908ddd9 16549->16552 16553 7ff6b908de3a 16549->16553 16549->16554 16761 7ff6b908f3b0 16550->16761 16552->16554 16764 7ff6b908ebb0 16552->16764 16555 7ff6b908ebb0 _fread_nolock MultiByteToWideChar 16553->16555 16554->16453 16555->16554 16558 7ff6b907fed7 16557->16558 16564 7ff6b907fec6 16557->16564 16558->16564 16587 7ff6b908c90c 16558->16587 16561 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16563 7ff6b907ff18 16561->16563 16562 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16562->16564 16563->16562 16565 7ff6b908d880 16564->16565 16566 7ff6b908d8d0 16565->16566 16567 7ff6b908d89d 16565->16567 16566->16567 16569 7ff6b908d902 16566->16569 16568 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16567->16568 16578 7ff6b90835c1 16568->16578 16572 7ff6b908da15 16569->16572 16582 7ff6b908d94a 16569->16582 16570 7ff6b908db07 16627 7ff6b908cd6c 16570->16627 16572->16570 16573 7ff6b908dacd 16572->16573 16575 7ff6b908da9c 16572->16575 16577 7ff6b908da5f 16572->16577 16580 7ff6b908da55 16572->16580 16620 7ff6b908d104 16573->16620 16613 7ff6b908d3e4 16575->16613 16603 7ff6b908d614 16577->16603 16578->16500 16578->16502 16580->16573 16581 7ff6b908da5a 16580->16581 16581->16575 16581->16577 16582->16578 16594 7ff6b90897b4 16582->16594 16585 7ff6b9089c10 _isindst 17 API calls 16586 7ff6b908db64 16585->16586 16588 7ff6b908c957 16587->16588 16592 7ff6b908c91b memcpy_s 16587->16592 16590 7ff6b90843f4 memcpy_s 11 API calls 16588->16590 16589 7ff6b908c93e HeapAlloc 16591 7ff6b907ff04 16589->16591 16589->16592 16590->16591 16591->16561 16591->16563 16592->16588 16592->16589 16593 7ff6b90928a0 memcpy_s 2 API calls 16592->16593 16593->16592 16595 7ff6b90897c1 16594->16595 16596 7ff6b90897cb 16594->16596 16595->16596 16601 7ff6b90897e6 16595->16601 16597 7ff6b90843f4 memcpy_s 11 API calls 16596->16597 16598 7ff6b90897d2 16597->16598 16636 7ff6b9089bf0 16598->16636 16600 7ff6b90897de 16600->16578 16600->16585 16601->16600 16602 7ff6b90843f4 memcpy_s 11 API calls 16601->16602 16602->16598 16639 7ff6b90933bc 16603->16639 16607 7ff6b908d6bc 16608 7ff6b908d711 16607->16608 16610 7ff6b908d6dc 16607->16610 16612 7ff6b908d6c0 16607->16612 16692 7ff6b908d200 16608->16692 16688 7ff6b908d4bc 16610->16688 16612->16578 16614 7ff6b90933bc 38 API calls 16613->16614 16615 7ff6b908d42e 16614->16615 16616 7ff6b9092e04 37 API calls 16615->16616 16618 7ff6b908d47e 16616->16618 16617 7ff6b908d482 16617->16578 16618->16617 16619 7ff6b908d4bc 45 API calls 16618->16619 16619->16617 16621 7ff6b90933bc 38 API calls 16620->16621 16622 7ff6b908d14f 16621->16622 16623 7ff6b9092e04 37 API calls 16622->16623 16624 7ff6b908d1a7 16623->16624 16625 7ff6b908d1ab 16624->16625 16626 7ff6b908d200 45 API calls 16624->16626 16625->16578 16626->16625 16628 7ff6b908cdb1 16627->16628 16629 7ff6b908cde4 16627->16629 16630 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16628->16630 16631 7ff6b908cdfc 16629->16631 16633 7ff6b908ce7d 16629->16633 16635 7ff6b908cddd __scrt_get_show_window_mode 16630->16635 16632 7ff6b908d104 46 API calls 16631->16632 16632->16635 16634 7ff6b9083ae0 45 API calls 16633->16634 16633->16635 16634->16635 16635->16578 16637 7ff6b9089a88 _invalid_parameter_noinfo 37 API calls 16636->16637 16638 7ff6b9089c09 16637->16638 16638->16600 16640 7ff6b909340f fegetenv 16639->16640 16641 7ff6b909713c 37 API calls 16640->16641 16645 7ff6b9093462 16641->16645 16642 7ff6b9093552 16644 7ff6b909713c 37 API calls 16642->16644 16643 7ff6b909348f 16647 7ff6b90897b4 __std_exception_copy 37 API calls 16643->16647 16646 7ff6b909357c 16644->16646 16645->16642 16648 7ff6b909347d 16645->16648 16649 7ff6b909352c 16645->16649 16650 7ff6b909713c 37 API calls 16646->16650 16651 7ff6b909350d 16647->16651 16648->16642 16648->16643 16653 7ff6b90897b4 __std_exception_copy 37 API calls 16649->16653 16654 7ff6b909358d 16650->16654 16652 7ff6b9094634 16651->16652 16659 7ff6b9093515 16651->16659 16655 7ff6b9089c10 _isindst 17 API calls 16652->16655 16653->16651 16656 7ff6b9097330 20 API calls 16654->16656 16657 7ff6b9094649 16655->16657 16666 7ff6b90935f6 __scrt_get_show_window_mode 16656->16666 16658 7ff6b907b870 _log10_special 8 API calls 16660 7ff6b908d661 16658->16660 16659->16658 16684 7ff6b9092e04 16660->16684 16661 7ff6b909399f __scrt_get_show_window_mode 16662 7ff6b9093637 memcpy_s 16674 7ff6b9093a93 memcpy_s __scrt_get_show_window_mode 16662->16674 16679 7ff6b9093f7b memcpy_s __scrt_get_show_window_mode 16662->16679 16663 7ff6b9093cdf 16664 7ff6b9092f20 37 API calls 16663->16664 16668 7ff6b90943f7 16664->16668 16665 7ff6b9093c8b 16665->16663 16665->16665 16667 7ff6b909464c memcpy_s 37 API calls 16665->16667 16666->16661 16666->16662 16669 7ff6b90843f4 memcpy_s 11 API calls 16666->16669 16667->16663 16668->16668 16673 7ff6b909464c memcpy_s 37 API calls 16668->16673 16683 7ff6b9094452 16668->16683 16671 7ff6b9093a70 16669->16671 16670 7ff6b90945d8 16676 7ff6b909713c 37 API calls 16670->16676 16672 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 16671->16672 16672->16662 16673->16683 16674->16665 16677 7ff6b90843f4 11 API calls memcpy_s 16674->16677 16681 7ff6b9089bf0 37 API calls _invalid_parameter_noinfo 16674->16681 16675 7ff6b90843f4 11 API calls memcpy_s 16675->16679 16676->16659 16677->16674 16678 7ff6b9089bf0 37 API calls _invalid_parameter_noinfo 16678->16679 16679->16663 16679->16665 16679->16675 16679->16678 16680 7ff6b9092f20 37 API calls 16680->16683 16681->16674 16682 7ff6b909464c memcpy_s 37 API calls 16682->16683 16683->16670 16683->16680 16683->16682 16686 7ff6b9092e23 16684->16686 16685 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16687 7ff6b9092e4e memcpy_s 16685->16687 16686->16685 16686->16687 16687->16607 16689 7ff6b908d4e8 memcpy_s 16688->16689 16690 7ff6b9083ae0 45 API calls 16689->16690 16691 7ff6b908d5a2 memcpy_s __scrt_get_show_window_mode 16689->16691 16690->16691 16691->16612 16693 7ff6b908d23b 16692->16693 16698 7ff6b908d288 memcpy_s 16692->16698 16694 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16693->16694 16695 7ff6b908d267 16694->16695 16695->16612 16696 7ff6b908d2f3 16697 7ff6b90897b4 __std_exception_copy 37 API calls 16696->16697 16702 7ff6b908d335 memcpy_s 16697->16702 16698->16696 16699 7ff6b9083ae0 45 API calls 16698->16699 16699->16696 16700 7ff6b9089c10 _isindst 17 API calls 16701 7ff6b908d3e0 16700->16701 16702->16700 16704 7ff6b907ff7f 16703->16704 16705 7ff6b907ff6e 16703->16705 16704->16705 16706 7ff6b908c90c _fread_nolock 12 API calls 16704->16706 16705->16519 16707 7ff6b907ffb0 16706->16707 16708 7ff6b907ffc4 16707->16708 16709 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16707->16709 16710 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16708->16710 16709->16708 16710->16705 16712 7ff6b9083a86 16711->16712 16714 7ff6b9083a8e 16711->16714 16713 7ff6b9083ae0 45 API calls 16712->16713 16713->16714 16714->16531 16716 7ff6b908cce1 16715->16716 16717 7ff6b9083b1f 16715->16717 16716->16717 16723 7ff6b9092614 16716->16723 16719 7ff6b908cd34 16717->16719 16720 7ff6b908cd4d 16719->16720 16722 7ff6b9083b2f 16719->16722 16720->16722 16758 7ff6b9091960 16720->16758 16722->16453 16735 7ff6b908a460 GetLastError 16723->16735 16726 7ff6b909266e 16726->16717 16736 7ff6b908a4a1 FlsSetValue 16735->16736 16737 7ff6b908a484 FlsGetValue 16735->16737 16738 7ff6b908a491 16736->16738 16739 7ff6b908a4b3 16736->16739 16737->16738 16740 7ff6b908a49b 16737->16740 16741 7ff6b908a50d SetLastError 16738->16741 16742 7ff6b908dea8 memcpy_s 11 API calls 16739->16742 16740->16736 16744 7ff6b908a51a 16741->16744 16745 7ff6b908a52d 16741->16745 16743 7ff6b908a4c2 16742->16743 16747 7ff6b908a4e0 FlsSetValue 16743->16747 16748 7ff6b908a4d0 FlsSetValue 16743->16748 16744->16726 16757 7ff6b908f5e8 EnterCriticalSection 16744->16757 16746 7ff6b9089814 __GetCurrentState 38 API calls 16745->16746 16749 7ff6b908a532 16746->16749 16751 7ff6b908a4fe 16747->16751 16752 7ff6b908a4ec FlsSetValue 16747->16752 16750 7ff6b908a4d9 16748->16750 16753 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16750->16753 16754 7ff6b908a204 memcpy_s 11 API calls 16751->16754 16752->16750 16753->16738 16755 7ff6b908a506 16754->16755 16756 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16755->16756 16756->16741 16759 7ff6b908a460 __GetCurrentState 45 API calls 16758->16759 16760 7ff6b9091969 16759->16760 16767 7ff6b9096098 16761->16767 16766 7ff6b908ebb9 MultiByteToWideChar 16764->16766 16768 7ff6b90960fc 16767->16768 16769 7ff6b907b870 _log10_special 8 API calls 16768->16769 16770 7ff6b908f3cd 16769->16770 16770->16554 16772 7ff6b908031d 16771->16772 16773 7ff6b908032f 16771->16773 16774 7ff6b90843f4 memcpy_s 11 API calls 16772->16774 16776 7ff6b908033d 16773->16776 16780 7ff6b9080379 16773->16780 16775 7ff6b9080322 16774->16775 16778 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 16775->16778 16777 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16776->16777 16785 7ff6b908032d 16777->16785 16778->16785 16779 7ff6b90806f5 16781 7ff6b90843f4 memcpy_s 11 API calls 16779->16781 16779->16785 16780->16779 16782 7ff6b90843f4 memcpy_s 11 API calls 16780->16782 16783 7ff6b9080989 16781->16783 16784 7ff6b90806ea 16782->16784 16786 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 16783->16786 16787 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 16784->16787 16785->16419 16786->16785 16787->16779 16789 7ff6b907fa24 16788->16789 16818 7ff6b907f784 16789->16818 16791 7ff6b907fa3d 16791->15977 16793 7ff6b907277c 16792->16793 16794 7ff6b90843f4 memcpy_s 11 API calls 16793->16794 16795 7ff6b9072799 16794->16795 16830 7ff6b9083ca4 16795->16830 16800 7ff6b9071bf0 49 API calls 16801 7ff6b9072807 16800->16801 16802 7ff6b90786b0 2 API calls 16801->16802 16803 7ff6b907281f 16802->16803 16804 7ff6b907282c MessageBoxW 16803->16804 16805 7ff6b9072843 MessageBoxA 16803->16805 16806 7ff6b9072855 16804->16806 16805->16806 16807 7ff6b907b870 _log10_special 8 API calls 16806->16807 16808 7ff6b9072865 16807->16808 16808->16006 17007 7ff6b907f6dc 16809->17007 16813 7ff6b907f439 16812->16813 16815 7ff6b9071b06 16812->16815 16814 7ff6b90843f4 memcpy_s 11 API calls 16813->16814 16816 7ff6b907f43e 16814->16816 16815->16005 16815->16006 16817 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 16816->16817 16817->16815 16819 7ff6b907f7ee 16818->16819 16820 7ff6b907f7ae 16818->16820 16819->16820 16822 7ff6b907f7fa 16819->16822 16821 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16820->16821 16828 7ff6b907f7d5 16821->16828 16829 7ff6b908477c EnterCriticalSection 16822->16829 16828->16791 16833 7ff6b9083cfe 16830->16833 16831 7ff6b9083d23 16832 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16831->16832 16836 7ff6b9083d4d 16832->16836 16833->16831 16834 7ff6b9083d5f 16833->16834 16860 7ff6b9081f30 16834->16860 16838 7ff6b907b870 _log10_special 8 API calls 16836->16838 16837 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16837->16836 16839 7ff6b90727d8 16838->16839 16848 7ff6b9084480 16839->16848 16841 7ff6b9083e60 16844 7ff6b9083e6a 16841->16844 16846 7ff6b9083e3c 16841->16846 16842 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16842->16836 16843 7ff6b9083e08 16845 7ff6b9083e11 16843->16845 16843->16846 16847 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16844->16847 16845->16842 16846->16837 16847->16836 16849 7ff6b908a5d8 memcpy_s 11 API calls 16848->16849 16850 7ff6b9084497 16849->16850 16851 7ff6b90727df 16850->16851 16852 7ff6b908dea8 memcpy_s 11 API calls 16850->16852 16855 7ff6b90844d7 16850->16855 16851->16800 16853 7ff6b90844cc 16852->16853 16854 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16853->16854 16854->16855 16855->16851 16998 7ff6b908df30 16855->16998 16858 7ff6b9089c10 _isindst 17 API calls 16859 7ff6b908451c 16858->16859 16861 7ff6b9081f6e 16860->16861 16866 7ff6b9081f5e 16860->16866 16862 7ff6b9081f77 16861->16862 16870 7ff6b9081fa5 16861->16870 16863 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16862->16863 16865 7ff6b9081f9d 16863->16865 16864 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16864->16865 16865->16841 16865->16843 16865->16845 16865->16846 16866->16864 16867 7ff6b9083ae0 45 API calls 16867->16870 16869 7ff6b9082254 16872 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16869->16872 16870->16865 16870->16866 16870->16867 16870->16869 16874 7ff6b90828c0 16870->16874 16900 7ff6b9082588 16870->16900 16930 7ff6b9081e10 16870->16930 16872->16866 16875 7ff6b9082975 16874->16875 16876 7ff6b9082902 16874->16876 16879 7ff6b908297a 16875->16879 16880 7ff6b90829cf 16875->16880 16877 7ff6b9082908 16876->16877 16878 7ff6b908299f 16876->16878 16885 7ff6b908290d 16877->16885 16889 7ff6b90829de 16877->16889 16947 7ff6b9080e70 16878->16947 16881 7ff6b908297c 16879->16881 16882 7ff6b90829af 16879->16882 16880->16878 16880->16889 16898 7ff6b9082938 16880->16898 16884 7ff6b908291d 16881->16884 16888 7ff6b908298b 16881->16888 16954 7ff6b9080a60 16882->16954 16899 7ff6b9082a0d 16884->16899 16933 7ff6b9083224 16884->16933 16885->16884 16890 7ff6b9082950 16885->16890 16885->16898 16888->16878 16892 7ff6b9082990 16888->16892 16889->16899 16961 7ff6b9081280 16889->16961 16890->16899 16943 7ff6b90836e0 16890->16943 16895 7ff6b9083878 37 API calls 16892->16895 16892->16899 16894 7ff6b907b870 _log10_special 8 API calls 16896 7ff6b9082ca3 16894->16896 16895->16898 16896->16870 16898->16899 16968 7ff6b908db68 16898->16968 16899->16894 16901 7ff6b90825a9 16900->16901 16902 7ff6b9082593 16900->16902 16905 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16901->16905 16906 7ff6b90825e7 16901->16906 16903 7ff6b9082975 16902->16903 16904 7ff6b9082902 16902->16904 16902->16906 16909 7ff6b908297a 16903->16909 16910 7ff6b90829cf 16903->16910 16907 7ff6b9082908 16904->16907 16908 7ff6b908299f 16904->16908 16905->16906 16906->16870 16915 7ff6b908290d 16907->16915 16918 7ff6b90829de 16907->16918 16913 7ff6b9080e70 38 API calls 16908->16913 16911 7ff6b908297c 16909->16911 16912 7ff6b90829af 16909->16912 16910->16908 16910->16918 16928 7ff6b9082938 16910->16928 16914 7ff6b908291d 16911->16914 16921 7ff6b908298b 16911->16921 16916 7ff6b9080a60 38 API calls 16912->16916 16913->16928 16917 7ff6b9083224 47 API calls 16914->16917 16929 7ff6b9082a0d 16914->16929 16915->16914 16919 7ff6b9082950 16915->16919 16915->16928 16916->16928 16917->16928 16920 7ff6b9081280 38 API calls 16918->16920 16918->16929 16922 7ff6b90836e0 47 API calls 16919->16922 16919->16929 16920->16928 16921->16908 16923 7ff6b9082990 16921->16923 16922->16928 16925 7ff6b9083878 37 API calls 16923->16925 16923->16929 16924 7ff6b907b870 _log10_special 8 API calls 16926 7ff6b9082ca3 16924->16926 16925->16928 16926->16870 16927 7ff6b908db68 47 API calls 16927->16928 16928->16927 16928->16929 16929->16924 16981 7ff6b9080034 16930->16981 16934 7ff6b9083246 16933->16934 16935 7ff6b907fea0 12 API calls 16934->16935 16936 7ff6b908328e 16935->16936 16937 7ff6b908d880 46 API calls 16936->16937 16938 7ff6b9083361 16937->16938 16939 7ff6b9083ae0 45 API calls 16938->16939 16942 7ff6b9083383 16938->16942 16939->16942 16940 7ff6b9083ae0 45 API calls 16941 7ff6b908340c 16940->16941 16941->16898 16942->16940 16942->16941 16942->16942 16944 7ff6b90836f8 16943->16944 16946 7ff6b9083760 16943->16946 16945 7ff6b908db68 47 API calls 16944->16945 16944->16946 16945->16946 16946->16898 16948 7ff6b9080ea3 16947->16948 16949 7ff6b9080ed2 16948->16949 16951 7ff6b9080f8f 16948->16951 16950 7ff6b907fea0 12 API calls 16949->16950 16953 7ff6b9080f0f 16949->16953 16950->16953 16952 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16951->16952 16952->16953 16953->16898 16955 7ff6b9080a93 16954->16955 16956 7ff6b9080ac2 16955->16956 16958 7ff6b9080b7f 16955->16958 16957 7ff6b907fea0 12 API calls 16956->16957 16960 7ff6b9080aff 16956->16960 16957->16960 16959 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16958->16959 16959->16960 16960->16898 16962 7ff6b90812b3 16961->16962 16963 7ff6b90812e2 16962->16963 16965 7ff6b908139f 16962->16965 16964 7ff6b907fea0 12 API calls 16963->16964 16967 7ff6b908131f 16963->16967 16964->16967 16966 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16965->16966 16966->16967 16967->16898 16969 7ff6b908db90 16968->16969 16970 7ff6b908dbd5 16969->16970 16972 7ff6b9083ae0 45 API calls 16969->16972 16973 7ff6b908dbbe __scrt_get_show_window_mode 16969->16973 16977 7ff6b908db95 __scrt_get_show_window_mode 16969->16977 16970->16973 16970->16977 16978 7ff6b908faf8 16970->16978 16971 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16971->16977 16972->16970 16973->16971 16973->16977 16977->16898 16979 7ff6b908fb1c WideCharToMultiByte 16978->16979 16982 7ff6b9080073 16981->16982 16983 7ff6b9080061 16981->16983 16986 7ff6b9080080 16982->16986 16989 7ff6b90800bd 16982->16989 16984 7ff6b90843f4 memcpy_s 11 API calls 16983->16984 16985 7ff6b9080066 16984->16985 16987 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 16985->16987 16988 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 16986->16988 16995 7ff6b9080071 16987->16995 16988->16995 16990 7ff6b9080166 16989->16990 16991 7ff6b90843f4 memcpy_s 11 API calls 16989->16991 16992 7ff6b90843f4 memcpy_s 11 API calls 16990->16992 16990->16995 16993 7ff6b908015b 16991->16993 16994 7ff6b9080210 16992->16994 16996 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 16993->16996 16997 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 16994->16997 16995->16870 16996->16990 16997->16995 17003 7ff6b908df4d 16998->17003 16999 7ff6b908df52 17000 7ff6b90844fd 16999->17000 17001 7ff6b90843f4 memcpy_s 11 API calls 16999->17001 17000->16851 17000->16858 17002 7ff6b908df5c 17001->17002 17004 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 17002->17004 17003->16999 17003->17000 17005 7ff6b908df9c 17003->17005 17004->17000 17005->17000 17006 7ff6b90843f4 memcpy_s 11 API calls 17005->17006 17006->17002 17008 7ff6b907f706 17007->17008 17019 7ff6b90719b9 17007->17019 17009 7ff6b907f715 __scrt_get_show_window_mode 17008->17009 17010 7ff6b907f752 17008->17010 17008->17019 17013 7ff6b90843f4 memcpy_s 11 API calls 17009->17013 17020 7ff6b908477c EnterCriticalSection 17010->17020 17015 7ff6b907f72a 17013->17015 17017 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 17015->17017 17017->17019 17019->15983 17019->15984 17022 7ff6b90851d8 17021->17022 17023 7ff6b90851fe 17022->17023 17025 7ff6b9085231 17022->17025 17024 7ff6b90843f4 memcpy_s 11 API calls 17023->17024 17026 7ff6b9085203 17024->17026 17027 7ff6b9085237 17025->17027 17028 7ff6b9085244 17025->17028 17029 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 17026->17029 17030 7ff6b90843f4 memcpy_s 11 API calls 17027->17030 17040 7ff6b9089f38 17028->17040 17032 7ff6b9073fc6 17029->17032 17030->17032 17032->16015 17053 7ff6b908f5e8 EnterCriticalSection 17040->17053 17438 7ff6b9086c08 17437->17438 17441 7ff6b90866e4 17438->17441 17440 7ff6b9086c21 17440->16025 17442 7ff6b90866ff 17441->17442 17443 7ff6b908672e 17441->17443 17445 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 17442->17445 17451 7ff6b908477c EnterCriticalSection 17443->17451 17450 7ff6b908671f 17445->17450 17450->17440 17453 7ff6b907f163 17452->17453 17454 7ff6b907f191 17452->17454 17455 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 17453->17455 17461 7ff6b907f183 17454->17461 17462 7ff6b908477c EnterCriticalSection 17454->17462 17455->17461 17461->16029 17464 7ff6b9087568 17463->17464 17465 7ff6b9087555 17463->17465 17473 7ff6b90871cc 17464->17473 17467 7ff6b90843f4 memcpy_s 11 API calls 17465->17467 17469 7ff6b908755a 17467->17469 17471 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 17469->17471 17470 7ff6b9087566 17470->16062 17471->17470 17480 7ff6b908f5e8 EnterCriticalSection 17473->17480 17482 7ff6b907be12 RtlLookupFunctionEntry 17481->17482 17483 7ff6b907be28 RtlVirtualUnwind 17482->17483 17484 7ff6b907bc2b 17482->17484 17483->17482 17483->17484 17485 7ff6b907bbc0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17484->17485 17487 7ff6b9077c13 __std_exception_copy 17486->17487 17488 7ff6b9077b91 GetTokenInformation 17486->17488 17491 7ff6b9077c2c 17487->17491 17492 7ff6b9077c26 CloseHandle 17487->17492 17489 7ff6b9077bbd 17488->17489 17490 7ff6b9077bb2 GetLastError 17488->17490 17489->17487 17493 7ff6b9077bd9 GetTokenInformation 17489->17493 17490->17487 17490->17489 17491->16076 17492->17491 17493->17487 17495 7ff6b9077bfc 17493->17495 17494 7ff6b9077c06 ConvertSidToStringSidW 17494->17487 17495->17487 17495->17494 17497 7ff6b907297a 17496->17497 17498 7ff6b9083ef8 48 API calls 17497->17498 17499 7ff6b90729a2 MessageBoxW 17498->17499 17500 7ff6b907b870 _log10_special 8 API calls 17499->17500 17501 7ff6b90729cc 17500->17501 17501->16086 17503 7ff6b90777dc 17502->17503 17504 7ff6b90786b0 2 API calls 17503->17504 17505 7ff6b90777fb 17504->17505 17506 7ff6b9077816 ExpandEnvironmentStringsW 17505->17506 17507 7ff6b9077803 17505->17507 17535 7ff6b9072555 17534->17535 17536 7ff6b9083ef8 48 API calls 17535->17536 17537 7ff6b9072574 17536->17537 17537->16103 17773 7ff6b9073f70 108 API calls 17772->17773 17774 7ff6b9071463 17773->17774 17775 7ff6b907148c 17774->17775 17776 7ff6b907146b 17774->17776 17778 7ff6b907f9f4 73 API calls 17775->17778 17777 7ff6b90725f0 53 API calls 17776->17777 17779 7ff6b907147b 17777->17779 17780 7ff6b90714a1 17778->17780 17779->16139 17781 7ff6b90714a5 17780->17781 17782 7ff6b90714c1 17780->17782 17783 7ff6b9072760 53 API calls 17781->17783 17784 7ff6b90714f1 17782->17784 17785 7ff6b90714d1 17782->17785 17791 7ff6b90714bc __std_exception_copy 17783->17791 17788 7ff6b90714f7 17784->17788 17793 7ff6b907150a 17784->17793 17786 7ff6b9072760 53 API calls 17785->17786 17786->17791 17787 7ff6b907f36c 74 API calls 17789 7ff6b9071584 17787->17789 17796 7ff6b90711f0 17788->17796 17789->16139 17791->17787 17792 7ff6b907f6bc _fread_nolock 53 API calls 17792->17793 17793->17791 17793->17792 17794 7ff6b9071596 17793->17794 17795 7ff6b9072760 53 API calls 17794->17795 17795->17791 17797 7ff6b9071248 17796->17797 17798 7ff6b9071277 17797->17798 17799 7ff6b907124f 17797->17799 17802 7ff6b90712ad 17798->17802 17803 7ff6b9071291 17798->17803 17800 7ff6b90725f0 53 API calls 17799->17800 17801 7ff6b9071262 17800->17801 17801->17791 17805 7ff6b90712bf 17802->17805 17812 7ff6b90712db memcpy_s 17802->17812 17804 7ff6b9072760 53 API calls 17803->17804 17808 7ff6b90712a8 __std_exception_copy 17804->17808 17806 7ff6b9072760 53 API calls 17805->17806 17806->17808 17807 7ff6b907f6bc _fread_nolock 53 API calls 17807->17812 17808->17791 17809 7ff6b907139f 17810 7ff6b90725f0 53 API calls 17809->17810 17810->17808 17812->17807 17812->17808 17812->17809 17813 7ff6b907f430 37 API calls 17812->17813 17814 7ff6b907fdfc 17812->17814 17813->17812 17815 7ff6b907fe2c 17814->17815 17818 7ff6b907fb4c 17815->17818 17819 7ff6b907fb6c 17818->17819 17820 7ff6b907fb99 17818->17820 17819->17820 17835 7ff6b9071875 17833->17835 17836 7ff6b9071805 17833->17836 17835->16156 17836->17835 17892 7ff6b9084250 17836->17892 17838 7ff6b9073f1a 17837->17838 17839 7ff6b90786b0 2 API calls 17838->17839 17840 7ff6b9073f3f 17839->17840 17841 7ff6b907b870 _log10_special 8 API calls 17840->17841 17842 7ff6b9073f67 17841->17842 17842->16156 17845 7ff6b907753e 17843->17845 17844 7ff6b9077662 17848 7ff6b907b870 _log10_special 8 API calls 17844->17848 17845->17844 17846 7ff6b9071bf0 49 API calls 17845->17846 17847 7ff6b90775c5 17846->17847 17847->17844 17850 7ff6b9071bf0 49 API calls 17847->17850 17851 7ff6b9073f10 10 API calls 17847->17851 17852 7ff6b90786b0 2 API calls 17847->17852 17849 7ff6b9077693 17848->17849 17849->16156 17850->17847 17851->17847 17853 7ff6b9077633 CreateDirectoryW 17852->17853 17853->17844 17853->17847 17855 7ff6b90715f7 17854->17855 17856 7ff6b90715d3 17854->17856 17857 7ff6b9073f70 108 API calls 17855->17857 17907 7ff6b9071050 17856->17907 17859 7ff6b907160b 17857->17859 17861 7ff6b907163b 17859->17861 17862 7ff6b9071613 17859->17862 17860 7ff6b90715d8 17863 7ff6b90715ee 17860->17863 17866 7ff6b90725f0 53 API calls 17860->17866 17865 7ff6b9073f70 108 API calls 17861->17865 17864 7ff6b9072760 53 API calls 17862->17864 17863->16156 17867 7ff6b907162a 17864->17867 17868 7ff6b907164f 17865->17868 17866->17863 17867->16156 17869 7ff6b9071657 17868->17869 17870 7ff6b9071671 17868->17870 17871 7ff6b90725f0 53 API calls 17869->17871 17872 7ff6b907f9f4 73 API calls 17870->17872 17873 7ff6b9071667 17871->17873 17874 7ff6b9071686 17872->17874 17879 7ff6b907f36c 74 API calls 17873->17879 17875 7ff6b907168a 17874->17875 17876 7ff6b90716ab 17874->17876 17877 7ff6b9072760 53 API calls 17875->17877 17878 7ff6b90716b1 17876->17878 17882 7ff6b90716c9 17876->17882 17886 7ff6b90716a1 __std_exception_copy 17877->17886 17880 7ff6b90711f0 92 API calls 17878->17880 17881 7ff6b90717cd 17879->17881 17880->17886 17881->16156 17884 7ff6b90716eb 17882->17884 17890 7ff6b907170c 17882->17890 17883 7ff6b907f36c 74 API calls 17883->17873 17885 7ff6b9072760 53 API calls 17884->17885 17885->17886 17886->17883 17887 7ff6b907f6bc _fread_nolock 53 API calls 17887->17890 17888 7ff6b9071775 17891 7ff6b9072760 53 API calls 17888->17891 17889 7ff6b907fdfc 76 API calls 17889->17890 17890->17886 17890->17887 17890->17888 17890->17889 17891->17886 17893 7ff6b908425d 17892->17893 17894 7ff6b908428a 17892->17894 17896 7ff6b90843f4 memcpy_s 11 API calls 17893->17896 17904 7ff6b9084214 17893->17904 17895 7ff6b90842ad 17894->17895 17899 7ff6b90842c9 17894->17899 17898 7ff6b90843f4 memcpy_s 11 API calls 17895->17898 17897 7ff6b9084267 17896->17897 17900 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 17897->17900 17901 7ff6b90842b2 17898->17901 17902 7ff6b9084178 45 API calls 17899->17902 17903 7ff6b9084272 17900->17903 17905 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 17901->17905 17906 7ff6b90842bd 17902->17906 17903->17836 17904->17836 17905->17906 17906->17836 17908 7ff6b9073f70 108 API calls 17907->17908 17909 7ff6b907108b 17908->17909 17910 7ff6b90710a8 17909->17910 17911 7ff6b9071093 17909->17911 17912 7ff6b907f9f4 73 API calls 17910->17912 17913 7ff6b90725f0 53 API calls 17911->17913 17914 7ff6b90710bd 17912->17914 17918 7ff6b90710a3 __std_exception_copy 17913->17918 17915 7ff6b90710dd 17914->17915 17916 7ff6b90710c1 17914->17916 17919 7ff6b907110d 17915->17919 17920 7ff6b90710ed 17915->17920 17917 7ff6b9072760 53 API calls 17916->17917 17926 7ff6b90710d8 __std_exception_copy 17917->17926 17918->17860 17923 7ff6b9071113 17919->17923 17929 7ff6b9071126 17919->17929 17921 7ff6b9072760 53 API calls 17920->17921 17921->17926 17922 7ff6b907f36c 74 API calls 17924 7ff6b9071194 17922->17924 17925 7ff6b90711f0 92 API calls 17923->17925 17924->17918 17932 7ff6b90740a0 17924->17932 17925->17926 17926->17922 17927 7ff6b907f6bc _fread_nolock 53 API calls 17927->17929 17929->17926 17929->17927 17930 7ff6b90711cc 17929->17930 17931 7ff6b9072760 53 API calls 17930->17931 17931->17926 17933 7ff6b90740b0 17932->17933 17947 7ff6b90786b0 2 API calls 17946->17947 17948 7ff6b90781b4 LoadLibraryExW 17947->17948 17949 7ff6b90781d3 __std_exception_copy 17948->17949 17949->16175 17951 7ff6b9076ec9 17950->17951 17952 7ff6b9076ef3 GetProcAddress 17950->17952 17954 7ff6b90729e0 51 API calls 17951->17954 17952->17951 17953 7ff6b9076f18 GetProcAddress 17952->17953 17953->17951 17955 7ff6b9076f3d GetProcAddress 17953->17955 17956 7ff6b9076ee3 17954->17956 17955->17951 17957 7ff6b9076f65 GetProcAddress 17955->17957 17956->16182 17957->17951 17958 7ff6b9076f8d GetProcAddress 17957->17958 17958->17951 18013->16202 18014->16204 18016 7ff6b9076904 18015->18016 18018 7ff6b907694b 18015->18018 18017 7ff6b9084250 45 API calls 18016->18017 18016->18018 18017->18016 18018->16208 18020 7ff6b9073b51 18019->18020 18021 7ff6b9073e90 49 API calls 18020->18021 18022 7ff6b9073b8b 18021->18022 18023 7ff6b9073e90 49 API calls 18022->18023 18024 7ff6b9073b9b 18023->18024 18025 7ff6b9073bec 18024->18025 18026 7ff6b9073bbd 18024->18026 18028 7ff6b9073ac0 51 API calls 18025->18028 18066 7ff6b9073ac0 18026->18066 18029 7ff6b9073bea 18028->18029 18030 7ff6b9073c4c 18029->18030 18031 7ff6b9073c17 18029->18031 18032 7ff6b9073ac0 51 API calls 18030->18032 18073 7ff6b9077400 18031->18073 18034 7ff6b9073c70 18032->18034 18064 7ff6b9071bf0 49 API calls 18063->18064 18065 7ff6b9073e24 18064->18065 18065->16208 18065->18065 18067 7ff6b9073ae6 18066->18067 18068 7ff6b9083ca4 49 API calls 18067->18068 18069 7ff6b9073b0c 18068->18069 18070 7ff6b9073b1d 18069->18070 18071 7ff6b9073f10 10 API calls 18069->18071 18070->18029 18072 7ff6b9073b2f 18071->18072 18072->18029 18074 7ff6b9077415 18073->18074 18075 7ff6b9073f70 108 API calls 18074->18075 18126 7ff6b9075b05 18125->18126 18127 7ff6b9071bf0 49 API calls 18126->18127 18128 7ff6b9075b41 18127->18128 18129 7ff6b9075b6d 18128->18129 18130 7ff6b9075b4a 18128->18130 18132 7ff6b9073fe0 49 API calls 18129->18132 18131 7ff6b90725f0 53 API calls 18130->18131 18148 7ff6b9075b63 18131->18148 18133 7ff6b9075b85 18132->18133 18134 7ff6b9075ba3 18133->18134 18135 7ff6b90725f0 53 API calls 18133->18135 18136 7ff6b9073f10 10 API calls 18134->18136 18135->18134 18138 7ff6b9075bad 18136->18138 18137 7ff6b907b870 _log10_special 8 API calls 18139 7ff6b907308e 18137->18139 18140 7ff6b9075bbb 18138->18140 18141 7ff6b90781a0 3 API calls 18138->18141 18139->16230 18156 7ff6b9075c80 18139->18156 18142 7ff6b9073fe0 49 API calls 18140->18142 18141->18140 18143 7ff6b9075bd4 18142->18143 18144 7ff6b9075bf9 18143->18144 18145 7ff6b9075bd9 18143->18145 18147 7ff6b90781a0 3 API calls 18144->18147 18146 7ff6b90725f0 53 API calls 18145->18146 18146->18148 18149 7ff6b9075c06 18147->18149 18148->18137 18150 7ff6b9075c49 18149->18150 18151 7ff6b9075c12 18149->18151 18210 7ff6b90750b0 GetProcAddress 18150->18210 18152 7ff6b90786b0 2 API calls 18151->18152 18154 7ff6b9075c2a 18152->18154 18295 7ff6b9074c80 18156->18295 18158 7ff6b9075cba 18159 7ff6b9075cc2 18158->18159 18160 7ff6b9075cd3 18158->18160 18161 7ff6b90725f0 53 API calls 18159->18161 18302 7ff6b9074450 18160->18302 18167 7ff6b9075cce 18161->18167 18164 7ff6b9075cf0 18165 7ff6b9075cdf 18167->16232 18196 7ff6b9075820 18195->18196 18196->18196 18211 7ff6b90750f7 GetProcAddress 18210->18211 18212 7ff6b90750d2 18210->18212 18211->18212 18297 7ff6b9074cac 18295->18297 18296 7ff6b9074cb4 18296->18158 18297->18296 18300 7ff6b9074e54 18297->18300 18333 7ff6b9085db4 18297->18333 18298 7ff6b9075017 __std_exception_copy 18298->18158 18299 7ff6b9074180 47 API calls 18299->18300 18300->18298 18300->18299 18303 7ff6b9074480 18302->18303 18304 7ff6b907b870 _log10_special 8 API calls 18303->18304 18305 7ff6b90744ea 18304->18305 18305->18164 18305->18165 18334 7ff6b9085de4 18333->18334 18337 7ff6b90852b0 18334->18337 18338 7ff6b90852f3 18337->18338 18339 7ff6b90852e1 18337->18339 18341 7ff6b908533d 18338->18341 18344 7ff6b9085300 18338->18344 18340 7ff6b90843f4 memcpy_s 11 API calls 18339->18340 18343 7ff6b90852e6 18340->18343 18342 7ff6b9085358 18341->18342 18345 7ff6b9083ae0 45 API calls 18341->18345 18349 7ff6b908537a 18342->18349 18358 7ff6b9085d3c 18342->18358 18347 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 18343->18347 18348 7ff6b9089b24 _invalid_parameter_noinfo 37 API calls 18344->18348 18345->18342 18353 7ff6b90852f1 18347->18353 18348->18353 18413->16237 18415 7ff6b908a460 __GetCurrentState 45 API calls 18414->18415 18416 7ff6b90896f1 18415->18416 18419 7ff6b9089814 18416->18419 18428 7ff6b9092960 18419->18428 18454 7ff6b9092918 18428->18454 18459 7ff6b908f5e8 EnterCriticalSection 18454->18459 18870 7ff6b9089060 18873 7ff6b9088fe4 18870->18873 18880 7ff6b908f5e8 EnterCriticalSection 18873->18880 19435 7ff6b908a2e0 19436 7ff6b908a2fa 19435->19436 19437 7ff6b908a2e5 19435->19437 19441 7ff6b908a300 19437->19441 19442 7ff6b908a34a 19441->19442 19443 7ff6b908a342 19441->19443 19445 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19442->19445 19444 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19443->19444 19444->19442 19446 7ff6b908a357 19445->19446 19447 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19446->19447 19448 7ff6b908a364 19447->19448 19449 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19448->19449 19450 7ff6b908a371 19449->19450 19451 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19450->19451 19452 7ff6b908a37e 19451->19452 19453 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19452->19453 19454 7ff6b908a38b 19453->19454 19455 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19454->19455 19456 7ff6b908a398 19455->19456 19457 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19456->19457 19458 7ff6b908a3a5 19457->19458 19459 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19458->19459 19460 7ff6b908a3b5 19459->19460 19461 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19460->19461 19462 7ff6b908a3c5 19461->19462 19467 7ff6b908a1a4 19462->19467 19481 7ff6b908f5e8 EnterCriticalSection 19467->19481 19496 7ff6b908fbd8 19497 7ff6b908fbfc 19496->19497 19499 7ff6b908fc0c 19496->19499 19498 7ff6b90843f4 memcpy_s 11 API calls 19497->19498 19518 7ff6b908fc01 19498->19518 19500 7ff6b908feec 19499->19500 19501 7ff6b908fc2e 19499->19501 19502 7ff6b90843f4 memcpy_s 11 API calls 19500->19502 19503 7ff6b908fc4f 19501->19503 19627 7ff6b9090294 19501->19627 19504 7ff6b908fef1 19502->19504 19507 7ff6b908fcc1 19503->19507 19509 7ff6b908fc75 19503->19509 19514 7ff6b908fcb5 19503->19514 19506 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19504->19506 19506->19518 19511 7ff6b908dea8 memcpy_s 11 API calls 19507->19511 19528 7ff6b908fc84 19507->19528 19508 7ff6b908fd6e 19517 7ff6b908fd8b 19508->19517 19525 7ff6b908fddd 19508->19525 19642 7ff6b90889d8 19509->19642 19515 7ff6b908fcd7 19511->19515 19513 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19513->19518 19514->19508 19514->19528 19648 7ff6b909643c 19514->19648 19519 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19515->19519 19522 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19517->19522 19523 7ff6b908fce5 19519->19523 19520 7ff6b908fc7f 19524 7ff6b90843f4 memcpy_s 11 API calls 19520->19524 19521 7ff6b908fc9d 19521->19514 19527 7ff6b9090294 45 API calls 19521->19527 19526 7ff6b908fd94 19522->19526 19523->19514 19523->19528 19531 7ff6b908dea8 memcpy_s 11 API calls 19523->19531 19524->19528 19525->19528 19529 7ff6b90926ec 40 API calls 19525->19529 19538 7ff6b908fd99 19526->19538 19684 7ff6b90926ec 19526->19684 19527->19514 19528->19513 19530 7ff6b908fe1a 19529->19530 19532 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19530->19532 19534 7ff6b908fd07 19531->19534 19536 7ff6b908fe24 19532->19536 19535 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19534->19535 19535->19514 19536->19528 19536->19538 19537 7ff6b908fee0 19540 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19537->19540 19538->19537 19542 7ff6b908dea8 memcpy_s 11 API calls 19538->19542 19539 7ff6b908fdc5 19541 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19539->19541 19540->19518 19541->19538 19543 7ff6b908fe68 19542->19543 19544 7ff6b908fe70 19543->19544 19545 7ff6b908fe79 19543->19545 19547 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19544->19547 19546 7ff6b90897b4 __std_exception_copy 37 API calls 19545->19546 19548 7ff6b908fe88 19546->19548 19549 7ff6b908fe77 19547->19549 19550 7ff6b908fe90 19548->19550 19551 7ff6b908ff1b 19548->19551 19554 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19549->19554 19693 7ff6b9096554 19550->19693 19553 7ff6b9089c10 _isindst 17 API calls 19551->19553 19556 7ff6b908ff2f 19553->19556 19554->19518 19559 7ff6b908ff58 19556->19559 19565 7ff6b908ff68 19556->19565 19557 7ff6b908feb7 19560 7ff6b90843f4 memcpy_s 11 API calls 19557->19560 19558 7ff6b908fed8 19562 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19558->19562 19561 7ff6b90843f4 memcpy_s 11 API calls 19559->19561 19563 7ff6b908febc 19560->19563 19564 7ff6b908ff5d 19561->19564 19562->19537 19567 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19563->19567 19566 7ff6b909024b 19565->19566 19568 7ff6b908ff8a 19565->19568 19569 7ff6b90843f4 memcpy_s 11 API calls 19566->19569 19567->19549 19570 7ff6b908ffa7 19568->19570 19712 7ff6b909037c 19568->19712 19571 7ff6b9090250 19569->19571 19574 7ff6b909001b 19570->19574 19575 7ff6b909000f 19570->19575 19577 7ff6b908ffcf 19570->19577 19573 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19571->19573 19573->19564 19576 7ff6b908ffde 19574->19576 19583 7ff6b908dea8 memcpy_s 11 API calls 19574->19583 19597 7ff6b9090043 19574->19597 19575->19576 19592 7ff6b90900ce 19575->19592 19733 7ff6b90962fc 19575->19733 19582 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19576->19582 19727 7ff6b9088a14 19577->19727 19580 7ff6b909013e 19580->19576 19598 7ff6b90926ec 40 API calls 19580->19598 19581 7ff6b908dea8 memcpy_s 11 API calls 19586 7ff6b9090065 19581->19586 19582->19564 19587 7ff6b9090035 19583->19587 19585 7ff6b90900eb 19589 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19585->19589 19590 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19586->19590 19593 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19587->19593 19588 7ff6b908ffd9 19594 7ff6b90843f4 memcpy_s 11 API calls 19588->19594 19595 7ff6b90900f4 19589->19595 19590->19575 19591 7ff6b908fff7 19591->19575 19596 7ff6b909037c 45 API calls 19591->19596 19592->19580 19592->19585 19593->19597 19594->19576 19601 7ff6b90926ec 40 API calls 19595->19601 19604 7ff6b90900fa 19595->19604 19596->19575 19597->19575 19597->19576 19597->19581 19599 7ff6b909017c 19598->19599 19600 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19599->19600 19602 7ff6b9090186 19600->19602 19605 7ff6b9090126 19601->19605 19602->19576 19602->19604 19603 7ff6b909023f 19606 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19603->19606 19604->19603 19608 7ff6b908dea8 memcpy_s 11 API calls 19604->19608 19607 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19605->19607 19606->19564 19607->19604 19609 7ff6b90901cb 19608->19609 19610 7ff6b90901d3 19609->19610 19611 7ff6b90901dc 19609->19611 19612 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19610->19612 19613 7ff6b908f784 37 API calls 19611->19613 19614 7ff6b90901da 19612->19614 19615 7ff6b90901ea 19613->19615 19621 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19614->19621 19616 7ff6b909027f 19615->19616 19617 7ff6b90901f2 SetEnvironmentVariableW 19615->19617 19620 7ff6b9089c10 _isindst 17 API calls 19616->19620 19618 7ff6b9090216 19617->19618 19619 7ff6b9090237 19617->19619 19622 7ff6b90843f4 memcpy_s 11 API calls 19618->19622 19624 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19619->19624 19623 7ff6b9090293 19620->19623 19621->19564 19625 7ff6b909021b 19622->19625 19624->19603 19626 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19625->19626 19626->19614 19628 7ff6b90902c9 19627->19628 19634 7ff6b90902b1 19627->19634 19629 7ff6b908dea8 memcpy_s 11 API calls 19628->19629 19637 7ff6b90902ed 19629->19637 19630 7ff6b9089814 __GetCurrentState 45 API calls 19632 7ff6b9090378 19630->19632 19631 7ff6b909034e 19633 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19631->19633 19633->19634 19634->19503 19635 7ff6b908dea8 memcpy_s 11 API calls 19635->19637 19636 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19636->19637 19637->19631 19637->19635 19637->19636 19638 7ff6b90897b4 __std_exception_copy 37 API calls 19637->19638 19639 7ff6b909035d 19637->19639 19641 7ff6b9090372 19637->19641 19638->19637 19640 7ff6b9089c10 _isindst 17 API calls 19639->19640 19640->19641 19641->19630 19643 7ff6b90889f1 19642->19643 19644 7ff6b90889e8 19642->19644 19643->19520 19643->19521 19644->19643 19757 7ff6b90884b0 19644->19757 19649 7ff6b9095564 19648->19649 19650 7ff6b9096449 19648->19650 19651 7ff6b9095571 19649->19651 19656 7ff6b90955a7 19649->19656 19652 7ff6b9084178 45 API calls 19650->19652 19655 7ff6b90843f4 memcpy_s 11 API calls 19651->19655 19670 7ff6b9095518 19651->19670 19653 7ff6b909647d 19652->19653 19657 7ff6b9096482 19653->19657 19661 7ff6b9096493 19653->19661 19664 7ff6b90964aa 19653->19664 19654 7ff6b90955d1 19658 7ff6b90843f4 memcpy_s 11 API calls 19654->19658 19659 7ff6b909557b 19655->19659 19656->19654 19660 7ff6b90955f6 19656->19660 19657->19514 19662 7ff6b90955d6 19658->19662 19663 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 19659->19663 19671 7ff6b9084178 45 API calls 19660->19671 19674 7ff6b90955e1 19660->19674 19665 7ff6b90843f4 memcpy_s 11 API calls 19661->19665 19666 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 19662->19666 19667 7ff6b9095586 19663->19667 19668 7ff6b90964b4 19664->19668 19669 7ff6b90964c6 19664->19669 19672 7ff6b9096498 19665->19672 19666->19674 19667->19514 19673 7ff6b90843f4 memcpy_s 11 API calls 19668->19673 19675 7ff6b90964ee 19669->19675 19676 7ff6b90964d7 19669->19676 19670->19514 19671->19674 19677 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 19672->19677 19678 7ff6b90964b9 19673->19678 19674->19514 19983 7ff6b909825c 19675->19983 19974 7ff6b90955b4 19676->19974 19677->19657 19681 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 19678->19681 19681->19657 19683 7ff6b90843f4 memcpy_s 11 API calls 19683->19657 19685 7ff6b909270e 19684->19685 19687 7ff6b909272b 19684->19687 19686 7ff6b909271c 19685->19686 19685->19687 19689 7ff6b90843f4 memcpy_s 11 API calls 19686->19689 19688 7ff6b9092735 19687->19688 20023 7ff6b9096f48 19687->20023 20030 7ff6b9096f84 19688->20030 19692 7ff6b9092721 __scrt_get_show_window_mode 19689->19692 19692->19539 19694 7ff6b9084178 45 API calls 19693->19694 19695 7ff6b90965ba 19694->19695 19696 7ff6b90965c8 19695->19696 20042 7ff6b908e234 19695->20042 20045 7ff6b90847bc 19696->20045 19700 7ff6b90966b4 19702 7ff6b90966c5 19700->19702 19705 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19700->19705 19701 7ff6b9084178 45 API calls 19703 7ff6b9096637 19701->19703 19706 7ff6b908feb3 19702->19706 19708 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19702->19708 19704 7ff6b9096640 19703->19704 19707 7ff6b908e234 5 API calls 19703->19707 19709 7ff6b90847bc 14 API calls 19704->19709 19705->19702 19706->19557 19706->19558 19707->19704 19708->19706 19710 7ff6b909669b 19709->19710 19710->19700 19711 7ff6b90966a3 SetEnvironmentVariableW 19710->19711 19711->19700 19713 7ff6b909039f 19712->19713 19714 7ff6b90903bc 19712->19714 19713->19570 19715 7ff6b908dea8 memcpy_s 11 API calls 19714->19715 19722 7ff6b90903e0 19715->19722 19716 7ff6b9090464 19718 7ff6b9089814 __GetCurrentState 45 API calls 19716->19718 19717 7ff6b9090441 19719 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19717->19719 19720 7ff6b909046a 19718->19720 19719->19713 19721 7ff6b908dea8 memcpy_s 11 API calls 19721->19722 19722->19716 19722->19717 19722->19721 19723 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19722->19723 19724 7ff6b908f784 37 API calls 19722->19724 19725 7ff6b9090450 19722->19725 19723->19722 19724->19722 19726 7ff6b9089c10 _isindst 17 API calls 19725->19726 19726->19716 19728 7ff6b9088a24 19727->19728 19729 7ff6b9088a2d 19727->19729 19728->19729 20067 7ff6b9088524 19728->20067 19729->19588 19729->19591 19734 7ff6b9096309 19733->19734 19738 7ff6b9096336 19733->19738 19735 7ff6b909630e 19734->19735 19734->19738 19736 7ff6b90843f4 memcpy_s 11 API calls 19735->19736 19737 7ff6b9096313 19736->19737 19740 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 19737->19740 19739 7ff6b909637a 19738->19739 19741 7ff6b9096399 19738->19741 19755 7ff6b909636e __crtLCMapStringW 19738->19755 19742 7ff6b90843f4 memcpy_s 11 API calls 19739->19742 19743 7ff6b909631e 19740->19743 19744 7ff6b90963a3 19741->19744 19745 7ff6b90963b5 19741->19745 19746 7ff6b909637f 19742->19746 19743->19575 19747 7ff6b90843f4 memcpy_s 11 API calls 19744->19747 19748 7ff6b9084178 45 API calls 19745->19748 19749 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 19746->19749 19750 7ff6b90963a8 19747->19750 19751 7ff6b90963c2 19748->19751 19749->19755 19752 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 19750->19752 19751->19755 20114 7ff6b9097e18 19751->20114 19752->19755 19755->19575 19756 7ff6b90843f4 memcpy_s 11 API calls 19756->19755 19758 7ff6b90884c9 19757->19758 19771 7ff6b90884c5 19757->19771 19780 7ff6b9091900 19758->19780 19763 7ff6b90884e7 19806 7ff6b9088594 19763->19806 19764 7ff6b90884db 19765 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19764->19765 19765->19771 19768 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19769 7ff6b908850e 19768->19769 19770 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19769->19770 19770->19771 19771->19643 19772 7ff6b9088804 19771->19772 19773 7ff6b908882d 19772->19773 19778 7ff6b9088846 19772->19778 19773->19643 19774 7ff6b908dea8 memcpy_s 11 API calls 19774->19778 19775 7ff6b90888d6 19777 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19775->19777 19776 7ff6b908faf8 WideCharToMultiByte 19776->19778 19777->19773 19778->19773 19778->19774 19778->19775 19778->19776 19779 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19778->19779 19779->19778 19781 7ff6b90884ce 19780->19781 19782 7ff6b909190d 19780->19782 19786 7ff6b9091c3c GetEnvironmentStringsW 19781->19786 19825 7ff6b908a534 19782->19825 19787 7ff6b90884d3 19786->19787 19788 7ff6b9091c6c 19786->19788 19787->19763 19787->19764 19789 7ff6b908faf8 WideCharToMultiByte 19788->19789 19790 7ff6b9091cbd 19789->19790 19791 7ff6b9091cc4 FreeEnvironmentStringsW 19790->19791 19792 7ff6b908c90c _fread_nolock 12 API calls 19790->19792 19791->19787 19793 7ff6b9091cd7 19792->19793 19794 7ff6b9091cdf 19793->19794 19795 7ff6b9091ce8 19793->19795 19796 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19794->19796 19797 7ff6b908faf8 WideCharToMultiByte 19795->19797 19798 7ff6b9091ce6 19796->19798 19799 7ff6b9091d0b 19797->19799 19798->19791 19800 7ff6b9091d0f 19799->19800 19801 7ff6b9091d19 19799->19801 19802 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19800->19802 19803 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19801->19803 19804 7ff6b9091d17 FreeEnvironmentStringsW 19802->19804 19803->19804 19804->19787 19807 7ff6b90885b9 19806->19807 19808 7ff6b908dea8 memcpy_s 11 API calls 19807->19808 19820 7ff6b90885ef 19808->19820 19809 7ff6b90885f7 19810 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19809->19810 19811 7ff6b90884ef 19810->19811 19811->19768 19812 7ff6b908866a 19813 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19812->19813 19813->19811 19814 7ff6b908dea8 memcpy_s 11 API calls 19814->19820 19815 7ff6b9088659 19817 7ff6b90887c0 11 API calls 19815->19817 19816 7ff6b90897b4 __std_exception_copy 37 API calls 19816->19820 19818 7ff6b9088661 19817->19818 19821 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19818->19821 19819 7ff6b908868f 19822 7ff6b9089c10 _isindst 17 API calls 19819->19822 19820->19809 19820->19812 19820->19814 19820->19815 19820->19816 19820->19819 19823 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19820->19823 19821->19809 19824 7ff6b90886a2 19822->19824 19823->19820 19826 7ff6b908a560 FlsSetValue 19825->19826 19827 7ff6b908a545 FlsGetValue 19825->19827 19828 7ff6b908a552 19826->19828 19830 7ff6b908a56d 19826->19830 19827->19828 19829 7ff6b908a55a 19827->19829 19831 7ff6b908a558 19828->19831 19832 7ff6b9089814 __GetCurrentState 45 API calls 19828->19832 19829->19826 19833 7ff6b908dea8 memcpy_s 11 API calls 19830->19833 19845 7ff6b90915d4 19831->19845 19834 7ff6b908a5d5 19832->19834 19835 7ff6b908a57c 19833->19835 19836 7ff6b908a59a FlsSetValue 19835->19836 19837 7ff6b908a58a FlsSetValue 19835->19837 19839 7ff6b908a5a6 FlsSetValue 19836->19839 19840 7ff6b908a5b8 19836->19840 19838 7ff6b908a593 19837->19838 19842 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19838->19842 19839->19838 19841 7ff6b908a204 memcpy_s 11 API calls 19840->19841 19843 7ff6b908a5c0 19841->19843 19842->19828 19844 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19843->19844 19844->19831 19868 7ff6b9091844 19845->19868 19847 7ff6b9091609 19883 7ff6b90912d4 19847->19883 19850 7ff6b9091626 19850->19781 19851 7ff6b908c90c _fread_nolock 12 API calls 19852 7ff6b9091637 19851->19852 19853 7ff6b909163f 19852->19853 19855 7ff6b909164e 19852->19855 19854 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19853->19854 19854->19850 19855->19855 19890 7ff6b909197c 19855->19890 19858 7ff6b909174a 19859 7ff6b90843f4 memcpy_s 11 API calls 19858->19859 19861 7ff6b909174f 19859->19861 19860 7ff6b90917a5 19863 7ff6b909180c 19860->19863 19901 7ff6b9091104 19860->19901 19864 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19861->19864 19862 7ff6b9091764 19862->19860 19865 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19862->19865 19867 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19863->19867 19864->19850 19865->19860 19867->19850 19869 7ff6b9091867 19868->19869 19871 7ff6b9091871 19869->19871 19916 7ff6b908f5e8 EnterCriticalSection 19869->19916 19872 7ff6b90918e3 19871->19872 19875 7ff6b9089814 __GetCurrentState 45 API calls 19871->19875 19872->19847 19877 7ff6b90918fb 19875->19877 19879 7ff6b9091952 19877->19879 19880 7ff6b908a534 50 API calls 19877->19880 19879->19847 19881 7ff6b909193c 19880->19881 19882 7ff6b90915d4 65 API calls 19881->19882 19882->19879 19884 7ff6b9084178 45 API calls 19883->19884 19885 7ff6b90912e8 19884->19885 19886 7ff6b90912f4 GetOEMCP 19885->19886 19887 7ff6b9091306 19885->19887 19888 7ff6b909131b 19886->19888 19887->19888 19889 7ff6b909130b GetACP 19887->19889 19888->19850 19888->19851 19889->19888 19891 7ff6b90912d4 47 API calls 19890->19891 19892 7ff6b90919a9 19891->19892 19893 7ff6b9091aff 19892->19893 19894 7ff6b90919e6 IsValidCodePage 19892->19894 19900 7ff6b9091a00 __scrt_get_show_window_mode 19892->19900 19895 7ff6b907b870 _log10_special 8 API calls 19893->19895 19894->19893 19896 7ff6b90919f7 19894->19896 19897 7ff6b9091741 19895->19897 19898 7ff6b9091a26 GetCPInfo 19896->19898 19896->19900 19897->19858 19897->19862 19898->19893 19898->19900 19917 7ff6b90913ec 19900->19917 19973 7ff6b908f5e8 EnterCriticalSection 19901->19973 19918 7ff6b9091429 GetCPInfo 19917->19918 19919 7ff6b909151f 19917->19919 19918->19919 19924 7ff6b909143c 19918->19924 19920 7ff6b907b870 _log10_special 8 API calls 19919->19920 19922 7ff6b90915be 19920->19922 19921 7ff6b9092150 48 API calls 19923 7ff6b90914b3 19921->19923 19922->19893 19928 7ff6b9096e94 19923->19928 19924->19921 19927 7ff6b9096e94 54 API calls 19927->19919 19929 7ff6b9084178 45 API calls 19928->19929 19930 7ff6b9096eb9 19929->19930 19933 7ff6b9096b60 19930->19933 19934 7ff6b9096ba1 19933->19934 19935 7ff6b908ebb0 _fread_nolock MultiByteToWideChar 19934->19935 19938 7ff6b9096beb 19935->19938 19936 7ff6b9096e69 19937 7ff6b907b870 _log10_special 8 API calls 19936->19937 19939 7ff6b90914e6 19937->19939 19938->19936 19940 7ff6b908c90c _fread_nolock 12 API calls 19938->19940 19941 7ff6b9096d21 19938->19941 19943 7ff6b9096c23 19938->19943 19939->19927 19940->19943 19941->19936 19942 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19941->19942 19942->19936 19943->19941 19944 7ff6b908ebb0 _fread_nolock MultiByteToWideChar 19943->19944 19945 7ff6b9096c96 19944->19945 19945->19941 19964 7ff6b908e3f4 19945->19964 19948 7ff6b9096ce1 19948->19941 19951 7ff6b908e3f4 __crtLCMapStringW 6 API calls 19948->19951 19949 7ff6b9096d32 19950 7ff6b908c90c _fread_nolock 12 API calls 19949->19950 19952 7ff6b9096e04 19949->19952 19954 7ff6b9096d50 19949->19954 19950->19954 19951->19941 19952->19941 19953 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19952->19953 19953->19941 19954->19941 19955 7ff6b908e3f4 __crtLCMapStringW 6 API calls 19954->19955 19956 7ff6b9096dd0 19955->19956 19956->19952 19957 7ff6b9096df0 19956->19957 19958 7ff6b9096e06 19956->19958 19959 7ff6b908faf8 WideCharToMultiByte 19957->19959 19960 7ff6b908faf8 WideCharToMultiByte 19958->19960 19961 7ff6b9096dfe 19959->19961 19960->19961 19961->19952 19962 7ff6b9096e1e 19961->19962 19962->19941 19963 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19962->19963 19963->19941 19965 7ff6b908e020 __crtLCMapStringW 5 API calls 19964->19965 19966 7ff6b908e432 19965->19966 19967 7ff6b908e43a 19966->19967 19970 7ff6b908e4e0 19966->19970 19967->19941 19967->19948 19967->19949 19969 7ff6b908e4a3 LCMapStringW 19969->19967 19971 7ff6b908e020 __crtLCMapStringW 5 API calls 19970->19971 19972 7ff6b908e50e __crtLCMapStringW 19971->19972 19972->19969 19975 7ff6b90955d1 19974->19975 19976 7ff6b90955e8 19974->19976 19977 7ff6b90843f4 memcpy_s 11 API calls 19975->19977 19976->19975 19978 7ff6b90955f6 19976->19978 19979 7ff6b90955d6 19977->19979 19981 7ff6b9084178 45 API calls 19978->19981 19982 7ff6b90955e1 19978->19982 19980 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 19979->19980 19980->19982 19981->19982 19982->19657 19984 7ff6b9084178 45 API calls 19983->19984 19985 7ff6b9098281 19984->19985 19988 7ff6b9097ed8 19985->19988 19991 7ff6b9097f26 19988->19991 19989 7ff6b907b870 _log10_special 8 API calls 19990 7ff6b9096515 19989->19990 19990->19657 19990->19683 19992 7ff6b9097fad 19991->19992 19994 7ff6b9097f98 GetCPInfo 19991->19994 19997 7ff6b9097fb1 19991->19997 19993 7ff6b908ebb0 _fread_nolock MultiByteToWideChar 19992->19993 19992->19997 19995 7ff6b9098045 19993->19995 19994->19992 19994->19997 19996 7ff6b908c90c _fread_nolock 12 API calls 19995->19996 19995->19997 19998 7ff6b909807c 19995->19998 19996->19998 19997->19989 19998->19997 19999 7ff6b908ebb0 _fread_nolock MultiByteToWideChar 19998->19999 20000 7ff6b90980ea 19999->20000 20001 7ff6b90981cc 20000->20001 20002 7ff6b908ebb0 _fread_nolock MultiByteToWideChar 20000->20002 20001->19997 20003 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20001->20003 20004 7ff6b9098110 20002->20004 20003->19997 20004->20001 20005 7ff6b908c90c _fread_nolock 12 API calls 20004->20005 20006 7ff6b909813d 20004->20006 20005->20006 20006->20001 20007 7ff6b908ebb0 _fread_nolock MultiByteToWideChar 20006->20007 20008 7ff6b90981b4 20007->20008 20009 7ff6b90981d4 20008->20009 20010 7ff6b90981ba 20008->20010 20017 7ff6b908e278 20009->20017 20010->20001 20013 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20010->20013 20013->20001 20014 7ff6b9098213 20014->19997 20016 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20014->20016 20015 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20015->20014 20016->19997 20018 7ff6b908e020 __crtLCMapStringW 5 API calls 20017->20018 20019 7ff6b908e2b6 20018->20019 20020 7ff6b908e4e0 __crtLCMapStringW 5 API calls 20019->20020 20022 7ff6b908e2be 20019->20022 20021 7ff6b908e327 CompareStringW 20020->20021 20021->20022 20022->20014 20022->20015 20024 7ff6b9096f51 20023->20024 20025 7ff6b9096f6a HeapSize 20023->20025 20026 7ff6b90843f4 memcpy_s 11 API calls 20024->20026 20027 7ff6b9096f56 20026->20027 20028 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 20027->20028 20029 7ff6b9096f61 20028->20029 20029->19688 20031 7ff6b9096fa3 20030->20031 20032 7ff6b9096f99 20030->20032 20034 7ff6b9096fa8 20031->20034 20040 7ff6b9096faf memcpy_s 20031->20040 20033 7ff6b908c90c _fread_nolock 12 API calls 20032->20033 20038 7ff6b9096fa1 20033->20038 20035 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20034->20035 20035->20038 20036 7ff6b9096fe2 HeapReAlloc 20036->20038 20036->20040 20037 7ff6b9096fb5 20039 7ff6b90843f4 memcpy_s 11 API calls 20037->20039 20038->19692 20039->20038 20040->20036 20040->20037 20041 7ff6b90928a0 memcpy_s 2 API calls 20040->20041 20041->20040 20043 7ff6b908e020 __crtLCMapStringW 5 API calls 20042->20043 20044 7ff6b908e254 20043->20044 20044->19696 20046 7ff6b908480a 20045->20046 20047 7ff6b90847e6 20045->20047 20048 7ff6b9084864 20046->20048 20049 7ff6b908480f 20046->20049 20051 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20047->20051 20052 7ff6b90847f5 20047->20052 20050 7ff6b908ebb0 _fread_nolock MultiByteToWideChar 20048->20050 20049->20052 20053 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20049->20053 20057 7ff6b9084824 20049->20057 20059 7ff6b9084880 20050->20059 20051->20052 20052->19700 20052->19701 20053->20057 20054 7ff6b908c90c _fread_nolock 12 API calls 20054->20052 20055 7ff6b9084887 GetLastError 20058 7ff6b9084368 _fread_nolock 11 API calls 20055->20058 20056 7ff6b90848c2 20056->20052 20061 7ff6b908ebb0 _fread_nolock MultiByteToWideChar 20056->20061 20057->20054 20062 7ff6b9084894 20058->20062 20059->20055 20059->20056 20060 7ff6b90848b5 20059->20060 20063 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20059->20063 20064 7ff6b908c90c _fread_nolock 12 API calls 20060->20064 20065 7ff6b9084906 20061->20065 20066 7ff6b90843f4 memcpy_s 11 API calls 20062->20066 20063->20060 20064->20056 20065->20052 20065->20055 20066->20052 20068 7ff6b9088539 20067->20068 20069 7ff6b908853d 20067->20069 20068->19729 20080 7ff6b90888e4 20068->20080 20088 7ff6b9091d4c GetEnvironmentStringsW 20069->20088 20072 7ff6b9088556 20095 7ff6b90886a4 20072->20095 20073 7ff6b908854a 20074 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20073->20074 20074->20068 20077 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20078 7ff6b908857d 20077->20078 20079 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20078->20079 20079->20068 20081 7ff6b9088907 20080->20081 20086 7ff6b908891e 20080->20086 20081->19729 20082 7ff6b908dea8 memcpy_s 11 API calls 20082->20086 20083 7ff6b9088992 20085 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20083->20085 20084 7ff6b908ebb0 MultiByteToWideChar _fread_nolock 20084->20086 20085->20081 20086->20081 20086->20082 20086->20083 20086->20084 20087 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20086->20087 20087->20086 20089 7ff6b9091d70 20088->20089 20090 7ff6b9088542 20088->20090 20091 7ff6b908c90c _fread_nolock 12 API calls 20089->20091 20090->20072 20090->20073 20092 7ff6b9091da7 memcpy_s 20091->20092 20093 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20092->20093 20094 7ff6b9091dc7 FreeEnvironmentStringsW 20093->20094 20094->20090 20096 7ff6b90886cc 20095->20096 20097 7ff6b908dea8 memcpy_s 11 API calls 20096->20097 20108 7ff6b9088707 20097->20108 20098 7ff6b908870f 20099 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20098->20099 20100 7ff6b908855e 20099->20100 20100->20077 20101 7ff6b9088789 20102 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20101->20102 20102->20100 20103 7ff6b908dea8 memcpy_s 11 API calls 20103->20108 20104 7ff6b9088778 20106 7ff6b90887c0 11 API calls 20104->20106 20105 7ff6b908f784 37 API calls 20105->20108 20107 7ff6b9088780 20106->20107 20110 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20107->20110 20108->20098 20108->20101 20108->20103 20108->20104 20108->20105 20109 7ff6b90887ac 20108->20109 20112 7ff6b9089c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20108->20112 20111 7ff6b9089c10 _isindst 17 API calls 20109->20111 20110->20098 20113 7ff6b90887be 20111->20113 20112->20108 20115 7ff6b9097e41 __crtLCMapStringW 20114->20115 20116 7ff6b908e278 6 API calls 20115->20116 20117 7ff6b90963fe 20115->20117 20116->20117 20117->19755 20117->19756 20160 7ff6b909a10e 20161 7ff6b909a127 20160->20161 20162 7ff6b909a11d 20160->20162 20164 7ff6b908f648 LeaveCriticalSection 20162->20164 18463 7ff6b907fdfc 18464 7ff6b907fe2c 18463->18464 18465 7ff6b907fb4c 76 API calls 18464->18465 18466 7ff6b907fe4a 18465->18466 18467 7ff6b9088c79 18468 7ff6b90896e8 45 API calls 18467->18468 18469 7ff6b9088c7e 18468->18469 18470 7ff6b9088cef 18469->18470 18471 7ff6b9088ca5 GetModuleHandleW 18469->18471 18479 7ff6b9088b7c 18470->18479 18471->18470 18477 7ff6b9088cb2 18471->18477 18477->18470 18493 7ff6b9088da0 GetModuleHandleExW 18477->18493 18499 7ff6b908f5e8 EnterCriticalSection 18479->18499 18494 7ff6b9088dd4 GetProcAddress 18493->18494 18495 7ff6b9088dfd 18493->18495 18496 7ff6b9088de6 18494->18496 18497 7ff6b9088e02 FreeLibrary 18495->18497 18498 7ff6b9088e09 18495->18498 18496->18495 18497->18498 18498->18470 20241 7ff6b908b830 20252 7ff6b908f5e8 EnterCriticalSection 20241->20252 20280 7ff6b9084720 20281 7ff6b908472b 20280->20281 20289 7ff6b908e5b4 20281->20289 20302 7ff6b908f5e8 EnterCriticalSection 20289->20302 19276 7ff6b908ec9c 19277 7ff6b908ee8e 19276->19277 19279 7ff6b908ecde _isindst 19276->19279 19278 7ff6b90843f4 memcpy_s 11 API calls 19277->19278 19296 7ff6b908ee7e 19278->19296 19279->19277 19282 7ff6b908ed5e _isindst 19279->19282 19280 7ff6b907b870 _log10_special 8 API calls 19281 7ff6b908eea9 19280->19281 19297 7ff6b90954a4 19282->19297 19287 7ff6b908eeba 19289 7ff6b9089c10 _isindst 17 API calls 19287->19289 19291 7ff6b908eece 19289->19291 19294 7ff6b908edbb 19294->19296 19321 7ff6b90954e8 19294->19321 19296->19280 19298 7ff6b908ed7c 19297->19298 19299 7ff6b90954b3 19297->19299 19303 7ff6b90948a8 19298->19303 19328 7ff6b908f5e8 EnterCriticalSection 19299->19328 19304 7ff6b90948b1 19303->19304 19305 7ff6b908ed91 19303->19305 19306 7ff6b90843f4 memcpy_s 11 API calls 19304->19306 19305->19287 19309 7ff6b90948d8 19305->19309 19307 7ff6b90948b6 19306->19307 19308 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 19307->19308 19308->19305 19310 7ff6b90948e1 19309->19310 19311 7ff6b908eda2 19309->19311 19312 7ff6b90843f4 memcpy_s 11 API calls 19310->19312 19311->19287 19315 7ff6b9094908 19311->19315 19313 7ff6b90948e6 19312->19313 19314 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 19313->19314 19314->19311 19316 7ff6b9094911 19315->19316 19320 7ff6b908edb3 19315->19320 19317 7ff6b90843f4 memcpy_s 11 API calls 19316->19317 19318 7ff6b9094916 19317->19318 19319 7ff6b9089bf0 _invalid_parameter_noinfo 37 API calls 19318->19319 19319->19320 19320->19287 19320->19294 19329 7ff6b908f5e8 EnterCriticalSection 19321->19329

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 7ff6b9071000-7ff6b9073536 call 7ff6b907f138 call 7ff6b907f140 call 7ff6b907bb70 call 7ff6b9084700 call 7ff6b9084794 call 7ff6b90733e0 14 7ff6b9073538-7ff6b907353f 0->14 15 7ff6b9073544-7ff6b9073566 call 7ff6b90718f0 0->15 16 7ff6b907371a-7ff6b9073735 call 7ff6b907b870 14->16 21 7ff6b907356c-7ff6b9073583 call 7ff6b9071bf0 15->21 22 7ff6b9073736-7ff6b907374c call 7ff6b9073f70 15->22 26 7ff6b9073588-7ff6b90735c1 21->26 27 7ff6b9073785-7ff6b9073793 call 7ff6b90725f0 22->27 28 7ff6b907374e-7ff6b907377b call 7ff6b90776a0 22->28 29 7ff6b90735c7-7ff6b90735cb 26->29 30 7ff6b9073653-7ff6b907366d call 7ff6b9077e10 26->30 36 7ff6b9073798-7ff6b907379a 27->36 45 7ff6b907377d-7ff6b9073780 call 7ff6b907f36c 28->45 46 7ff6b907379f-7ff6b90737be call 7ff6b9071bf0 28->46 33 7ff6b90735cd-7ff6b90735e5 call 7ff6b9084560 29->33 34 7ff6b9073638-7ff6b907364d call 7ff6b90718e0 29->34 43 7ff6b9073695-7ff6b907369c 30->43 44 7ff6b907366f-7ff6b9073675 30->44 48 7ff6b90735e7-7ff6b90735eb 33->48 49 7ff6b90735f2-7ff6b907360a call 7ff6b9084560 33->49 34->29 34->30 41 7ff6b9073712 36->41 41->16 53 7ff6b9073844-7ff6b9073863 call 7ff6b9073e90 43->53 54 7ff6b90736a2-7ff6b90736c0 call 7ff6b9077e10 call 7ff6b9077f80 43->54 50 7ff6b9073677-7ff6b9073680 44->50 51 7ff6b9073682-7ff6b9073690 call 7ff6b908415c 44->51 45->27 61 7ff6b90737c1-7ff6b90737ca 46->61 48->49 66 7ff6b907360c-7ff6b9073610 49->66 67 7ff6b9073617-7ff6b907362f call 7ff6b9084560 49->67 50->51 51->43 69 7ff6b9073865-7ff6b907386f call 7ff6b9073fe0 53->69 70 7ff6b9073871-7ff6b9073882 call 7ff6b9071bf0 53->70 79 7ff6b90736c6-7ff6b90736c9 54->79 80 7ff6b907380f-7ff6b907381e call 7ff6b9078400 54->80 61->61 65 7ff6b90737cc-7ff6b90737e9 call 7ff6b90718f0 61->65 65->26 83 7ff6b90737ef-7ff6b9073800 call 7ff6b90725f0 65->83 66->67 67->34 84 7ff6b9073631 67->84 76 7ff6b9073887-7ff6b90738a1 call 7ff6b90786b0 69->76 70->76 93 7ff6b90738a3 76->93 94 7ff6b90738af-7ff6b90738c1 SetDllDirectoryW 76->94 79->80 85 7ff6b90736cf-7ff6b90736f6 call 7ff6b9071bf0 79->85 91 7ff6b907382c-7ff6b9073836 call 7ff6b9077c40 80->91 92 7ff6b9073820 80->92 83->41 84->34 100 7ff6b90736fc-7ff6b9073703 call 7ff6b90725f0 85->100 101 7ff6b9073805-7ff6b907380d call 7ff6b908415c 85->101 91->76 110 7ff6b9073838 91->110 92->91 93->94 98 7ff6b90738c3-7ff6b90738ca 94->98 99 7ff6b90738d0-7ff6b90738ec call 7ff6b9076560 call 7ff6b9076b00 94->99 98->99 104 7ff6b9073a50-7ff6b9073a58 98->104 118 7ff6b9073947-7ff6b907394a call 7ff6b9076510 99->118 119 7ff6b90738ee-7ff6b90738f4 99->119 107 7ff6b9073708-7ff6b907370a 100->107 101->76 108 7ff6b9073a7d-7ff6b9073aaf call 7ff6b90733d0 call 7ff6b9073080 call 7ff6b90733a0 call 7ff6b9076780 call 7ff6b9076510 104->108 109 7ff6b9073a5a-7ff6b9073a77 PostMessageW GetMessageW 104->109 107->41 109->108 110->53 127 7ff6b907394f-7ff6b9073956 118->127 121 7ff6b90738f6-7ff6b9073903 call 7ff6b90765a0 119->121 122 7ff6b907390e-7ff6b9073918 call 7ff6b9076970 119->122 121->122 132 7ff6b9073905-7ff6b907390c 121->132 134 7ff6b907391a-7ff6b9073921 122->134 135 7ff6b9073923-7ff6b9073931 call 7ff6b9076cd0 122->135 127->104 128 7ff6b907395c-7ff6b9073966 call 7ff6b90730e0 127->128 128->107 141 7ff6b907396c-7ff6b9073980 call 7ff6b90783e0 128->141 137 7ff6b907393a-7ff6b9073942 call 7ff6b9072870 call 7ff6b9076780 132->137 134->137 135->127 146 7ff6b9073933 135->146 137->118 151 7ff6b90739a5-7ff6b90739e8 call 7ff6b9077f20 call 7ff6b9077fc0 call 7ff6b9076780 call 7ff6b9076510 call 7ff6b9077ec0 141->151 152 7ff6b9073982-7ff6b907399f PostMessageW GetMessageW 141->152 146->137 163 7ff6b9073a3d-7ff6b9073a4b call 7ff6b90718a0 151->163 164 7ff6b90739ea-7ff6b9073a00 call 7ff6b90781f0 call 7ff6b9077ec0 151->164 152->151 163->107 164->163 171 7ff6b9073a02-7ff6b9073a10 164->171 172 7ff6b9073a12-7ff6b9073a2c call 7ff6b90725f0 call 7ff6b90718a0 171->172 173 7ff6b9073a31-7ff6b9073a38 call 7ff6b9072870 171->173 172->107 173->163
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: FileModuleName
            • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$ERROR: failed to remove temporary directory: %s$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$MEI$PYINSTALLER_STRICT_UNPACK_MODE$Path exceeds PYI_PATH_MAX limit.$WARNING: failed to remove temporary directory: %s$_MEIPASS2$bye-runtime-tmpdir$pkg$pyi-contents-directory$pyi-disable-windowed-traceback
            • API String ID: 514040917-1099759049
            • Opcode ID: ec9c6756989ef5fd9ea5977df3e9171bdd9129db5db0c6cc95fad3a29ce92e3f
            • Instruction ID: 8555319f143c1c809de93393045b31b83dd8a0d2983c65f2aa7e42a6d00691a8
            • Opcode Fuzzy Hash: ec9c6756989ef5fd9ea5977df3e9171bdd9129db5db0c6cc95fad3a29ce92e3f
            • Instruction Fuzzy Hash: ADF14B22B08683A2FA19DF2DE5552F96361AF947A0F84403ADB5DC36D7EF2CE558C300

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 245 7ff6b9095c74-7ff6b9095ce7 call 7ff6b90959a8 248 7ff6b9095d01-7ff6b9095d0b call 7ff6b9087830 245->248 249 7ff6b9095ce9-7ff6b9095cf2 call 7ff6b90843d4 245->249 255 7ff6b9095d26-7ff6b9095d8f CreateFileW 248->255 256 7ff6b9095d0d-7ff6b9095d24 call 7ff6b90843d4 call 7ff6b90843f4 248->256 254 7ff6b9095cf5-7ff6b9095cfc call 7ff6b90843f4 249->254 272 7ff6b9096042-7ff6b9096062 254->272 257 7ff6b9095d91-7ff6b9095d97 255->257 258 7ff6b9095e0c-7ff6b9095e17 GetFileType 255->258 256->254 262 7ff6b9095dd9-7ff6b9095e07 GetLastError call 7ff6b9084368 257->262 263 7ff6b9095d99-7ff6b9095d9d 257->263 265 7ff6b9095e19-7ff6b9095e54 GetLastError call 7ff6b9084368 CloseHandle 258->265 266 7ff6b9095e6a-7ff6b9095e71 258->266 262->254 263->262 270 7ff6b9095d9f-7ff6b9095dd7 CreateFileW 263->270 265->254 280 7ff6b9095e5a-7ff6b9095e65 call 7ff6b90843f4 265->280 268 7ff6b9095e73-7ff6b9095e77 266->268 269 7ff6b9095e79-7ff6b9095e7c 266->269 275 7ff6b9095e82-7ff6b9095ed7 call 7ff6b9087748 268->275 269->275 276 7ff6b9095e7e 269->276 270->258 270->262 284 7ff6b9095ef6-7ff6b9095f27 call 7ff6b9095728 275->284 285 7ff6b9095ed9-7ff6b9095ee5 call 7ff6b9095bb0 275->285 276->275 280->254 290 7ff6b9095f29-7ff6b9095f2b 284->290 291 7ff6b9095f2d-7ff6b9095f6f 284->291 285->284 292 7ff6b9095ee7 285->292 293 7ff6b9095ee9-7ff6b9095ef1 call 7ff6b9089dd0 290->293 294 7ff6b9095f91-7ff6b9095f9c 291->294 295 7ff6b9095f71-7ff6b9095f75 291->295 292->293 293->272 297 7ff6b9096040 294->297 298 7ff6b9095fa2-7ff6b9095fa6 294->298 295->294 296 7ff6b9095f77-7ff6b9095f8c 295->296 296->294 297->272 298->297 300 7ff6b9095fac-7ff6b9095ff1 CloseHandle CreateFileW 298->300 302 7ff6b9095ff3-7ff6b9096021 GetLastError call 7ff6b9084368 call 7ff6b9087970 300->302 303 7ff6b9096026-7ff6b909603b 300->303 302->303 303->297
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
            • String ID:
            • API String ID: 1617910340-0
            • Opcode ID: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
            • Instruction ID: 2459e239f82df1881487f74244d1ea0d590648262fb8a422e6242ec1f8474693
            • Opcode Fuzzy Hash: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
            • Instruction Fuzzy Hash: B9C1B036B28A4186EB14CF6DC4946AD3761FB89BA8F011239DF2E97795DF38E451C300

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Find$CloseFileFirst
            • String ID:
            • API String ID: 2295610775-0
            • Opcode ID: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
            • Instruction ID: 460ff9f58614ebdb91519e1e078c09ef6aeec9346a754e29b501c0220d7e81de
            • Opcode Fuzzy Hash: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
            • Instruction Fuzzy Hash: 5DF06262A1D64286F7A08F68B4997667390AB84778F44033DDB6D426D4DF3CE059CA04

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 179 7ff6b90718f0-7ff6b907192b call 7ff6b9073f70 182 7ff6b9071bc1-7ff6b9071be5 call 7ff6b907b870 179->182 183 7ff6b9071931-7ff6b9071971 call 7ff6b90776a0 179->183 188 7ff6b9071977-7ff6b9071987 call 7ff6b907f9f4 183->188 189 7ff6b9071bae-7ff6b9071bb1 call 7ff6b907f36c 183->189 194 7ff6b9071989-7ff6b907199c call 7ff6b9072760 188->194 195 7ff6b90719a1-7ff6b90719bd call 7ff6b907f6bc 188->195 193 7ff6b9071bb6-7ff6b9071bbe 189->193 193->182 194->189 200 7ff6b90719d7-7ff6b90719ec call 7ff6b9084154 195->200 201 7ff6b90719bf-7ff6b90719d2 call 7ff6b9072760 195->201 206 7ff6b9071a06-7ff6b9071a9f call 7ff6b9071bf0 * 2 call 7ff6b907f9f4 call 7ff6b9084170 200->206 207 7ff6b90719ee-7ff6b9071a01 call 7ff6b9072760 200->207 201->189 218 7ff6b9071ab9-7ff6b9071ad2 call 7ff6b907f6bc 206->218 219 7ff6b9071aa1-7ff6b9071ab4 call 7ff6b9072760 206->219 207->189 224 7ff6b9071aec-7ff6b9071b08 call 7ff6b907f430 218->224 225 7ff6b9071ad4-7ff6b9071ae7 call 7ff6b9072760 218->225 219->189 230 7ff6b9071b0a-7ff6b9071b16 call 7ff6b90725f0 224->230 231 7ff6b9071b1b-7ff6b9071b29 224->231 225->189 230->189 231->189 232 7ff6b9071b2f-7ff6b9071b3e 231->232 234 7ff6b9071b40-7ff6b9071b46 232->234 236 7ff6b9071b48-7ff6b9071b55 234->236 237 7ff6b9071b60-7ff6b9071b6f 234->237 238 7ff6b9071b71-7ff6b9071b7a 236->238 237->237 237->238 239 7ff6b9071b7c-7ff6b9071b7f 238->239 240 7ff6b9071b8f 238->240 239->240 241 7ff6b9071b81-7ff6b9071b84 239->241 242 7ff6b9071b91-7ff6b9071bac 240->242 241->240 243 7ff6b9071b86-7ff6b9071b89 241->243 242->189 242->234 243->240 244 7ff6b9071b8b-7ff6b9071b8d 243->244 244->242
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _fread_nolock$Message
            • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
            • API String ID: 677216364-3497178890
            • Opcode ID: 13a0f64d29e36a252706f5b53b21b28111f50ffc545313b1ad9e8f0af8fc9de4
            • Instruction ID: 42f6834947983353e92386b79311691b9deb8846b529beb1dda3c6854d3cf922
            • Opcode Fuzzy Hash: 13a0f64d29e36a252706f5b53b21b28111f50ffc545313b1ad9e8f0af8fc9de4
            • Instruction Fuzzy Hash: 58718371B1868699EB60DF2CE4502B92391FF487A4F548039DB8DC779AEE2CE545C740

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 308 7ff6b908ad6c-7ff6b908ad92 309 7ff6b908ad94-7ff6b908ada8 call 7ff6b90843d4 call 7ff6b90843f4 308->309 310 7ff6b908adad-7ff6b908adb1 308->310 327 7ff6b908b19e 309->327 312 7ff6b908b187-7ff6b908b193 call 7ff6b90843d4 call 7ff6b90843f4 310->312 313 7ff6b908adb7-7ff6b908adbe 310->313 330 7ff6b908b199 call 7ff6b9089bf0 312->330 313->312 315 7ff6b908adc4-7ff6b908adf2 313->315 315->312 318 7ff6b908adf8-7ff6b908adff 315->318 321 7ff6b908ae01-7ff6b908ae13 call 7ff6b90843d4 call 7ff6b90843f4 318->321 322 7ff6b908ae18-7ff6b908ae1b 318->322 321->330 325 7ff6b908ae21-7ff6b908ae27 322->325 326 7ff6b908b183-7ff6b908b185 322->326 325->326 332 7ff6b908ae2d-7ff6b908ae30 325->332 331 7ff6b908b1a1-7ff6b908b1b8 326->331 327->331 330->327 332->321 335 7ff6b908ae32-7ff6b908ae57 332->335 337 7ff6b908ae59-7ff6b908ae5b 335->337 338 7ff6b908ae8a-7ff6b908ae91 335->338 341 7ff6b908ae82-7ff6b908ae88 337->341 342 7ff6b908ae5d-7ff6b908ae64 337->342 339 7ff6b908ae93-7ff6b908ae9f call 7ff6b908c90c 338->339 340 7ff6b908ae66-7ff6b908ae7d call 7ff6b90843d4 call 7ff6b90843f4 call 7ff6b9089bf0 338->340 348 7ff6b908aea4-7ff6b908aebb call 7ff6b9089c58 * 2 339->348 369 7ff6b908b010 340->369 343 7ff6b908af08-7ff6b908af1f 341->343 342->340 342->341 346 7ff6b908af21-7ff6b908af29 343->346 347 7ff6b908af9a-7ff6b908afa4 call 7ff6b9092c2c 343->347 346->347 350 7ff6b908af2b-7ff6b908af2d 346->350 360 7ff6b908b02e 347->360 361 7ff6b908afaa-7ff6b908afbf 347->361 371 7ff6b908aed8-7ff6b908af03 call 7ff6b908b594 348->371 372 7ff6b908aebd-7ff6b908aed3 call 7ff6b90843f4 call 7ff6b90843d4 348->372 350->347 354 7ff6b908af2f-7ff6b908af45 350->354 354->347 358 7ff6b908af47-7ff6b908af53 354->358 358->347 363 7ff6b908af55-7ff6b908af57 358->363 365 7ff6b908b033-7ff6b908b053 ReadFile 360->365 361->360 366 7ff6b908afc1-7ff6b908afd3 GetConsoleMode 361->366 363->347 370 7ff6b908af59-7ff6b908af71 363->370 373 7ff6b908b059-7ff6b908b061 365->373 374 7ff6b908b14d-7ff6b908b156 GetLastError 365->374 366->360 368 7ff6b908afd5-7ff6b908afdd 366->368 368->365 375 7ff6b908afdf-7ff6b908b001 ReadConsoleW 368->375 378 7ff6b908b013-7ff6b908b01d call 7ff6b9089c58 369->378 370->347 379 7ff6b908af73-7ff6b908af7f 370->379 371->343 372->369 373->374 381 7ff6b908b067 373->381 376 7ff6b908b173-7ff6b908b176 374->376 377 7ff6b908b158-7ff6b908b16e call 7ff6b90843f4 call 7ff6b90843d4 374->377 384 7ff6b908b022-7ff6b908b02c 375->384 385 7ff6b908b003 GetLastError 375->385 389 7ff6b908b009-7ff6b908b00b call 7ff6b9084368 376->389 390 7ff6b908b17c-7ff6b908b17e 376->390 377->369 378->331 379->347 388 7ff6b908af81-7ff6b908af83 379->388 392 7ff6b908b06e-7ff6b908b083 381->392 384->392 385->389 388->347 396 7ff6b908af85-7ff6b908af95 388->396 389->369 390->378 392->378 398 7ff6b908b085-7ff6b908b090 392->398 396->347 399 7ff6b908b092-7ff6b908b0ab call 7ff6b908a984 398->399 400 7ff6b908b0b7-7ff6b908b0bf 398->400 408 7ff6b908b0b0-7ff6b908b0b2 399->408 404 7ff6b908b0c1-7ff6b908b0d3 400->404 405 7ff6b908b13b-7ff6b908b148 call 7ff6b908a7c4 400->405 409 7ff6b908b12e-7ff6b908b136 404->409 410 7ff6b908b0d5 404->410 405->408 408->378 409->378 412 7ff6b908b0da-7ff6b908b0e1 410->412 413 7ff6b908b0e3-7ff6b908b0e7 412->413 414 7ff6b908b11d-7ff6b908b128 412->414 415 7ff6b908b103 413->415 416 7ff6b908b0e9-7ff6b908b0f0 413->416 414->409 418 7ff6b908b109-7ff6b908b119 415->418 416->415 417 7ff6b908b0f2-7ff6b908b0f6 416->417 417->415 419 7ff6b908b0f8-7ff6b908b101 417->419 418->412 420 7ff6b908b11b 418->420 419->418 420->409
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: 68a47ba86f230bb5d63a3bd262fc543bc7d5861b4e9f61d57eff9af495398285
            • Instruction ID: a0336df4598d71e1c5fdf415765924a0028c95221b6e35fd5d63c4585f5c2e4c
            • Opcode Fuzzy Hash: 68a47ba86f230bb5d63a3bd262fc543bc7d5861b4e9f61d57eff9af495398285
            • Instruction Fuzzy Hash: 13C1F422B0C68791EB699F6D94803BE3B94FB90B80F550139DB5D87B92CE7CE855D700

            Control-flow Graph

            APIs
            • GetModuleFileNameW.KERNEL32(?,00007FF6B9073534), ref: 00007FF6B9073411
              • Part of subcall function 00007FF6B90729E0: GetLastError.KERNEL32(?,?,?,00007FF6B907342E,?,00007FF6B9073534), ref: 00007FF6B9072A14
              • Part of subcall function 00007FF6B90729E0: FormatMessageW.KERNEL32(?,?,?,00007FF6B907342E), ref: 00007FF6B9072A7D
              • Part of subcall function 00007FF6B90729E0: MessageBoxW.USER32 ref: 00007FF6B9072ACF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Message$ErrorFileFormatLastModuleName
            • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
            • API String ID: 517058245-2863816727
            • Opcode ID: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
            • Instruction ID: c9065bd7497164a44ed5b8b08ed7ef310d65d006c72d29e4c7430bd13a099dfe
            • Opcode Fuzzy Hash: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
            • Instruction Fuzzy Hash: BB216061F1C54392FE25AF2DE8513B96250BF487A4F80423AD75DC65E6EE2CE504C710

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Message$ByteCharMultiWide
            • String ID: Error$Error/warning (ANSI fallback)
            • API String ID: 1878133881-653037927
            • Opcode ID: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
            • Instruction ID: 9d44f25912e9b12e26f2196d137dc64ef786954429fc977ed7c8f95290c13f38
            • Opcode Fuzzy Hash: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
            • Instruction Fuzzy Hash: 5911BFB2628B8581FB208F18F461BA93364FB84B84F90513ADB9C97685CF3CD605C740

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
            • String ID:
            • API String ID: 3251591375-0
            • Opcode ID: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
            • Instruction ID: a8003789a3846950d6d25a2bca999c7ee39a437caeff97c0f425b601e55604f9
            • Opcode Fuzzy Hash: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
            • Instruction Fuzzy Hash: 71313921E0D66385FA68AF6C94523B92391AF417A4F44443CEB0ECB7D3DE2DF9458291

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Process$CurrentExitTerminate
            • String ID:
            • API String ID: 1703294689-0
            • Opcode ID: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
            • Instruction ID: 025da981a46ec56b6d139ba0bdd0bcab75799f19804e867d77f5e964d8422756
            • Opcode Fuzzy Hash: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
            • Instruction Fuzzy Hash: C9D06C10B2870A87EA686F78689917A13616FA8B11B50183CDA5A8A3A3DE2CE8094240

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 527 7ff6b907f45c-7ff6b907f489 528 7ff6b907f48b-7ff6b907f48e 527->528 529 7ff6b907f4a5 527->529 528->529 531 7ff6b907f490-7ff6b907f493 528->531 530 7ff6b907f4a7-7ff6b907f4bb 529->530 532 7ff6b907f4bc-7ff6b907f4bf 531->532 533 7ff6b907f495-7ff6b907f49a call 7ff6b90843f4 531->533 534 7ff6b907f4c1-7ff6b907f4cd 532->534 535 7ff6b907f4cf-7ff6b907f4d3 532->535 545 7ff6b907f4a0 call 7ff6b9089bf0 533->545 534->535 537 7ff6b907f4fa-7ff6b907f503 534->537 538 7ff6b907f4e7-7ff6b907f4ea 535->538 539 7ff6b907f4d5-7ff6b907f4df call 7ff6b90997e0 535->539 543 7ff6b907f50a 537->543 544 7ff6b907f505-7ff6b907f508 537->544 538->533 542 7ff6b907f4ec-7ff6b907f4f8 538->542 539->538 542->533 542->537 547 7ff6b907f50f-7ff6b907f52e 543->547 544->547 545->529 549 7ff6b907f675-7ff6b907f678 547->549 550 7ff6b907f534-7ff6b907f542 547->550 549->530 551 7ff6b907f5ba-7ff6b907f5bf 550->551 552 7ff6b907f544-7ff6b907f54b 550->552 553 7ff6b907f62c-7ff6b907f62f call 7ff6b908b1bc 551->553 554 7ff6b907f5c1-7ff6b907f5cd 551->554 552->551 555 7ff6b907f54d 552->555 565 7ff6b907f634-7ff6b907f637 553->565 558 7ff6b907f5d9-7ff6b907f5df 554->558 559 7ff6b907f5cf-7ff6b907f5d6 554->559 556 7ff6b907f553-7ff6b907f55d 555->556 557 7ff6b907f6a0 555->557 561 7ff6b907f67d-7ff6b907f681 556->561 562 7ff6b907f563-7ff6b907f569 556->562 564 7ff6b907f6a5-7ff6b907f6b0 557->564 558->561 563 7ff6b907f5e5-7ff6b907f602 call 7ff6b908978c call 7ff6b908ad6c 558->563 559->558 568 7ff6b907f683-7ff6b907f68b call 7ff6b90997e0 561->568 569 7ff6b907f690-7ff6b907f69b call 7ff6b90843f4 561->569 566 7ff6b907f56b-7ff6b907f56e 562->566 567 7ff6b907f5a1-7ff6b907f5b5 562->567 586 7ff6b907f607-7ff6b907f609 563->586 564->530 565->564 571 7ff6b907f639-7ff6b907f63c 565->571 572 7ff6b907f58c-7ff6b907f597 call 7ff6b90843f4 call 7ff6b9089bf0 566->572 573 7ff6b907f570-7ff6b907f576 566->573 578 7ff6b907f65c-7ff6b907f667 567->578 568->569 569->545 571->561 577 7ff6b907f63e-7ff6b907f655 571->577 593 7ff6b907f59c 572->593 580 7ff6b907f578-7ff6b907f580 call 7ff6b9099140 573->580 581 7ff6b907f582-7ff6b907f587 call 7ff6b90997e0 573->581 577->578 578->550 579 7ff6b907f66d 578->579 579->549 580->593 581->572 590 7ff6b907f6b5-7ff6b907f6ba 586->590 591 7ff6b907f60f 586->591 590->564 591->557 594 7ff6b907f615-7ff6b907f62a 591->594 593->567 594->578
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: 9ca15b9002a87b72fd1966d073ee072d8ab2af6885046d3198ed673a4b76404c
            • Instruction ID: af3804b7854f1b99896f053226ef5a1a2562063e12dc657f2ba86eff36301699
            • Opcode Fuzzy Hash: 9ca15b9002a87b72fd1966d073ee072d8ab2af6885046d3198ed673a4b76404c
            • Instruction Fuzzy Hash: 2A519561B0968246FA689E3E940067A6691BF44BB8F24873CDF7DC77DACE3CE4418610

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: ErrorFileLastPointer
            • String ID:
            • API String ID: 2976181284-0
            • Opcode ID: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
            • Instruction ID: 9164f6953b99addcacc667d88876d535aa993e6b467a594ae9d0ea3e76e660b0
            • Opcode Fuzzy Hash: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
            • Instruction Fuzzy Hash: 7B11C161B18A8181DA148F2DA8841697361AB84BF4F585339EF7D877EACF7CD0548700

            Control-flow Graph

            APIs
            • CloseHandle.KERNELBASE(?,?,?,00007FF6B9089CE5,?,?,00000000,00007FF6B9089D9A), ref: 00007FF6B9089ED6
            • GetLastError.KERNEL32(?,?,?,00007FF6B9089CE5,?,?,00000000,00007FF6B9089D9A), ref: 00007FF6B9089EE0
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: CloseErrorHandleLast
            • String ID:
            • API String ID: 918212764-0
            • Opcode ID: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
            • Instruction ID: c14b8cf252d70207ff94c7fbfd3f04324e4ac033df343d68db82b8e0554e9ef6
            • Opcode Fuzzy Hash: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
            • Instruction Fuzzy Hash: 83214F21B2864281EE98AF69A5D037D36919F84BA4F14423DDB7ED76D7DE6CE4418300

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
            • Instruction ID: e9746b4a08d6a7e8f4370220a8f08378e27fe948ac5fb929b8b8918243e950b0
            • Opcode Fuzzy Hash: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
            • Instruction Fuzzy Hash: 1241CF32A0860287EA28EF6DA98127D77A4EB56B80F140139DB9EC7691CF3CE542C751

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _fread_nolock
            • String ID:
            • API String ID: 840049012-0
            • Opcode ID: 3d01016cc9a5f4d9cb71fb7abf1551689f881e3384e479ff43f26caf71626a79
            • Instruction ID: cf45673204eedb2502e46ab071ab254d67c7ae174c025675b71606f4234bd58d
            • Opcode Fuzzy Hash: 3d01016cc9a5f4d9cb71fb7abf1551689f881e3384e479ff43f26caf71626a79
            • Instruction Fuzzy Hash: 0A21B221B0C65256FA149F1EA9057FAA681BF85BE4F9C4438EF0D8B796DE7DE081C700

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
            • Instruction ID: da712047489d7fc85a757c789e18669d097b1802f4271df9ee2b787835c12c5b
            • Opcode Fuzzy Hash: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
            • Instruction Fuzzy Hash: F2318F22F1864286F759AF1D98C137D3654AB50BA1F52023DDB2D937D2CFBCE442A720
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: HandleModule$AddressFreeLibraryProc
            • String ID:
            • API String ID: 3947729631-0
            • Opcode ID: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
            • Instruction ID: 958583e044ed0e899c7cd5d0d26baf566cb59d4cdc890129103584135006467f
            • Opcode Fuzzy Hash: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
            • Instruction Fuzzy Hash: 09218E32B297458AEB689F68C4842EC33A0FB44718F54463ADB2C86AD9EF38D544CB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
            • Instruction ID: 1cdb225546123e26c9e2086c566e9516e3746d773d627bda933dc83faf6fea4d
            • Opcode Fuzzy Hash: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
            • Instruction Fuzzy Hash: 2C11B421F1C68181EE68AF59948027EB3A4BF96B80F444079EF4CD7B96EF3CE4408740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
            • Instruction ID: 1d8ea8eddde0e97bfb397bbb5980daee6167ceb8f1bf815592a0f7a06374bdd6
            • Opcode Fuzzy Hash: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
            • Instruction Fuzzy Hash: F4219672A18A8287DB658F1DE48437976A0FB94B94F144238EB5DC76EADF3CD541CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
            • Instruction ID: c63b9192cc7443840d207c3baf7d76d1206a2d0a55bb7c7471b8f22030770ea8
            • Opcode Fuzzy Hash: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
            • Instruction Fuzzy Hash: A501C421B0878241EA04DF5A9900069B6A5BF95FF0F584639DF6C97BD6DE3CE4528300
            APIs
            • HeapAlloc.KERNEL32(?,?,?,00007FF6B907FFB0,?,?,?,00007FF6B908161A,?,?,?,?,?,00007FF6B9082E09), ref: 00007FF6B908C94A
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: AllocHeap
            • String ID:
            • API String ID: 4292702814-0
            • Opcode ID: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
            • Instruction ID: f4c5f278e540e79863d61cdde89c0405340ceb1f14f8464b3b6543a69f4af3b4
            • Opcode Fuzzy Hash: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
            • Instruction Fuzzy Hash: 82F08201F1925744FF5D6F7D589937911E05F55B60F084A78DFBEC52C2DE1CE4408110
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: AddressProc
            • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
            • API String ID: 190572456-3427451314
            • Opcode ID: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
            • Instruction ID: c4e981dcb9d9b5cfd27f92a5db32ea96956678ad07660bfd9d26138f774b6c50
            • Opcode Fuzzy Hash: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
            • Instruction Fuzzy Hash: 3FE1C364A4EB03E1FA59DF5DA8501B423B5AF947A4F94103EDB1E823A5EF3CF548C221
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
            • API String ID: 808467561-2761157908
            • Opcode ID: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
            • Instruction ID: e01dce10623fe9cd9c2928a826fa2352148275a3bb643f7ae92617a1b2662626
            • Opcode Fuzzy Hash: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
            • Instruction Fuzzy Hash: 9DB2B172A182928BE7658F6DD5407FD77A1FB94788F405139DB0E97A86DF38EA00CB40
            APIs
            • FindFirstFileW.KERNEL32(?,00007FF6B9077EF9,00007FF6B90739E6), ref: 00007FF6B9077A1B
            • RemoveDirectoryW.KERNEL32(?,00007FF6B9077EF9,00007FF6B90739E6), ref: 00007FF6B9077A9E
            • DeleteFileW.KERNEL32(?,00007FF6B9077EF9,00007FF6B90739E6), ref: 00007FF6B9077ABD
            • FindNextFileW.KERNEL32(?,00007FF6B9077EF9,00007FF6B90739E6), ref: 00007FF6B9077ACB
            • FindClose.KERNEL32(?,00007FF6B9077EF9,00007FF6B90739E6), ref: 00007FF6B9077ADC
            • RemoveDirectoryW.KERNEL32(?,00007FF6B9077EF9,00007FF6B90739E6), ref: 00007FF6B9077AE5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
            • String ID: %s\*
            • API String ID: 1057558799-766152087
            • Opcode ID: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
            • Instruction ID: 3398955f71d08e4c17737debba785e6fbbb0fe8bba6f9ed532e63effcc33b8db
            • Opcode Fuzzy Hash: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
            • Instruction Fuzzy Hash: DD415221A0C942A5FA209F2CE4585B96361FBD47B4F84063ADB9DC36E5DF3CE64AC740
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
            • API String ID: 0-2665694366
            • Opcode ID: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
            • Instruction ID: a1bc9d068b62d686f6875c5461a0f1d235a7ec01af1bbf5407169852913a00be
            • Opcode Fuzzy Hash: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
            • Instruction Fuzzy Hash: 9752B272A186A68BE7948F18C558B7E3BA9FB84350F52413DE74A87780DF3DD844DB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
            • String ID:
            • API String ID: 3140674995-0
            • Opcode ID: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
            • Instruction ID: 3475e4637dd384cdccf2c1a36c8c915ade73c2656d0bc75a11bb7385b3231e17
            • Opcode Fuzzy Hash: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
            • Instruction Fuzzy Hash: AD310A72609B8186EB649F68E8807EE73A4FB84754F44403ADB4E87B99DF3CD648C714
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Message$ErrorFormatLast
            • String ID: %ls%ls: %ls$<FormatMessageW failed.>$Error
            • API String ID: 3971115935-1149178304
            • Opcode ID: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
            • Instruction ID: 2ddd0b3955a3143de0b0d6b67db32a1ac41a9aa19e34f3e315a8065534646d5e
            • Opcode Fuzzy Hash: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
            • Instruction Fuzzy Hash: 01214172618B8582E7209F29F4506EA73A4FB88794F40013AEBCD93A99DF7CD546CB40
            APIs
            • _get_daylight.LIBCMT ref: 00007FF6B9094F55
              • Part of subcall function 00007FF6B90948A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B90948BC
              • Part of subcall function 00007FF6B9089C58: HeapFree.KERNEL32(?,?,?,00007FF6B9092032,?,?,?,00007FF6B909206F,?,?,00000000,00007FF6B9092535,?,?,?,00007FF6B9092467), ref: 00007FF6B9089C6E
              • Part of subcall function 00007FF6B9089C58: GetLastError.KERNEL32(?,?,?,00007FF6B9092032,?,?,?,00007FF6B909206F,?,?,00000000,00007FF6B9092535,?,?,?,00007FF6B9092467), ref: 00007FF6B9089C78
              • Part of subcall function 00007FF6B9089C10: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6B9089BEF,?,?,?,?,?,00007FF6B9089ADA), ref: 00007FF6B9089C19
              • Part of subcall function 00007FF6B9089C10: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6B9089BEF,?,?,?,?,?,00007FF6B9089ADA), ref: 00007FF6B9089C3E
            • _get_daylight.LIBCMT ref: 00007FF6B9094F44
              • Part of subcall function 00007FF6B9094908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B909491C
            • _get_daylight.LIBCMT ref: 00007FF6B90951BA
            • _get_daylight.LIBCMT ref: 00007FF6B90951CB
            • _get_daylight.LIBCMT ref: 00007FF6B90951DC
            • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6B909541C), ref: 00007FF6B9095203
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
            • String ID:
            • API String ID: 4070488512-0
            • Opcode ID: ec3da476d7abf2ffb0f6397319154e28f094a84f5b0708b50d9998a811af1003
            • Instruction ID: 870ef6feced2fee6b1a307e915cdab376d6c19a45580aecd886f71f4cc1f12ba
            • Opcode Fuzzy Hash: ec3da476d7abf2ffb0f6397319154e28f094a84f5b0708b50d9998a811af1003
            • Instruction Fuzzy Hash: 6FD1AD26A1825286E724AF2ED8941B977A1FF85B84F44813DEF1D87A97EF3CE441C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
            • String ID:
            • API String ID: 1239891234-0
            • Opcode ID: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
            • Instruction ID: d7e7a1b156011b2651dab22a8a415b45be3fa6cf6cb17403ad2a42dbb382a095
            • Opcode Fuzzy Hash: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
            • Instruction Fuzzy Hash: C7315236618B8185DB64DF6DE8802AE73A4FB88764F540139EB9D83B56DF3CD145CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: FileFindFirst_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2227656907-0
            • Opcode ID: 537ca4dcf685df196dbb745ebf7a8e3eb288cf6b089b90446fc853c3fde494ee
            • Instruction ID: 9f1946445f692b5282e862ee5302ebc684d394571547584d2e60f5559bb8b85b
            • Opcode Fuzzy Hash: 537ca4dcf685df196dbb745ebf7a8e3eb288cf6b089b90446fc853c3fde494ee
            • Instruction Fuzzy Hash: CEB1C262B1969281EA64DF2E98102B963A1EF46BE4F445139EF5E87BC6DF3CE441C300
            APIs
            • _get_daylight.LIBCMT ref: 00007FF6B90951BA
              • Part of subcall function 00007FF6B9094908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B909491C
            • _get_daylight.LIBCMT ref: 00007FF6B90951CB
              • Part of subcall function 00007FF6B90948A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B90948BC
            • _get_daylight.LIBCMT ref: 00007FF6B90951DC
              • Part of subcall function 00007FF6B90948D8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B90948EC
              • Part of subcall function 00007FF6B9089C58: HeapFree.KERNEL32(?,?,?,00007FF6B9092032,?,?,?,00007FF6B909206F,?,?,00000000,00007FF6B9092535,?,?,?,00007FF6B9092467), ref: 00007FF6B9089C6E
              • Part of subcall function 00007FF6B9089C58: GetLastError.KERNEL32(?,?,?,00007FF6B9092032,?,?,?,00007FF6B909206F,?,?,00000000,00007FF6B9092535,?,?,?,00007FF6B9092467), ref: 00007FF6B9089C78
            • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6B909541C), ref: 00007FF6B9095203
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
            • String ID:
            • API String ID: 3458911817-0
            • Opcode ID: 246ddfbbe37c4787f9720b27dc9f743496b3bb1ed6dcb5155dd6029a6c9a153e
            • Instruction ID: d9804ad026583a5496472b9e67a50bb4aa82e8383ba598179e4719e8c69d75f3
            • Opcode Fuzzy Hash: 246ddfbbe37c4787f9720b27dc9f743496b3bb1ed6dcb5155dd6029a6c9a153e
            • Instruction Fuzzy Hash: 9B517B32A1864286E760EF2EE8811A97760FB89784F44413EEB5DC7697DF3CE441C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
            • String ID:
            • API String ID: 2933794660-0
            • Opcode ID: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
            • Instruction ID: 6e6d91c5c14297f3e00c625ab4f38eda3ad689023f54593df103470e1b2d7f50
            • Opcode Fuzzy Hash: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
            • Instruction Fuzzy Hash: D5113022B14F058AEB00CF78E8552B933A4FB59768F441E35EB6D867A4DF7CD1948340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: memcpy_s
            • String ID:
            • API String ID: 1502251526-0
            • Opcode ID: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
            • Instruction ID: 40a1517500771881e4f3164b1afd9cbb4d2f14224492770585386b3061a40b88
            • Opcode Fuzzy Hash: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
            • Instruction Fuzzy Hash: B2C1C172B1868787EB248F5DA04866EB7A1F7D4B84F448139DB4A87785DF3DE841CB00
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID: $header crc mismatch$unknown header flags set
            • API String ID: 0-1127688429
            • Opcode ID: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
            • Instruction ID: 83af9b3443324226053316f734a8396b28b47d9c41235836f9bb9c5d67d261bb
            • Opcode Fuzzy Hash: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
            • Instruction Fuzzy Hash: 1EF15B72A182D58BEBA58F1DC088A3A7AA9EF44760F164538DB5987792CF3CE940C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: ExceptionRaise_clrfp
            • String ID:
            • API String ID: 15204871-0
            • Opcode ID: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
            • Instruction ID: 7b3efbc1d86b8b1adbc6594602b8771c6c9f1b0ea7d6320dfa3f8b5510ee9f7c
            • Opcode Fuzzy Hash: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
            • Instruction Fuzzy Hash: 29B11777609B898BEB19CF2DC8463683BA1F744B48F198929DB5E837A5CF39D851C700
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID: $
            • API String ID: 0-227171996
            • Opcode ID: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
            • Instruction ID: f624e1c988708a89e5fff2d32508e32d71ea768a0567d1bdfaeced7e24695ebd
            • Opcode Fuzzy Hash: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
            • Instruction Fuzzy Hash: 57E16A72B1864686EB6C8E2DC19013D37A0FF85B88F245239DB4E87795DF2AE852C744
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID: incorrect header check$invalid window size
            • API String ID: 0-900081337
            • Opcode ID: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
            • Instruction ID: e04f60680891c412139569d2b8b0bd9af3a9400ef8d1c591995bcc7e64558f71
            • Opcode Fuzzy Hash: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
            • Instruction Fuzzy Hash: 7B917372A182C697E7A58F18D498A3E3AADFB44764F16413DDB5A86781CF3CE540CB40
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID: e+000$gfff
            • API String ID: 0-3030954782
            • Opcode ID: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
            • Instruction ID: 90bdad54dd699f228b9e8828bb86d2a6b6a129046cf4e71e76db40ce934be096
            • Opcode Fuzzy Hash: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
            • Instruction Fuzzy Hash: 6A513722B186C546E728CE39988176D7B91F754B94F489339CBA8C7AD2CE3DD4448720
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: CurrentFeaturePresentProcessProcessor
            • String ID:
            • API String ID: 1010374628-0
            • Opcode ID: 5b606b63c70e86b5db4eecb07275e8e9c3e0e1f08e56a2b99ea5de7f73ebbe88
            • Instruction ID: a46594567c6de031be75f4d50ebf962baa38cc33eca8a7e08170a12a5c44f66b
            • Opcode Fuzzy Hash: 5b606b63c70e86b5db4eecb07275e8e9c3e0e1f08e56a2b99ea5de7f73ebbe88
            • Instruction Fuzzy Hash: 9802C021B1D68380FE59AF2EA88527926E4AF42BA0F55463DDF6DC67D3DE3DE4018340
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID: gfffffff
            • API String ID: 0-1523873471
            • Opcode ID: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
            • Instruction ID: e1162ccd039fa8e8fd0b4a358bde5e5b256c14f1e1a055508ac7ef980e81b11c
            • Opcode Fuzzy Hash: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
            • Instruction Fuzzy Hash: ECA13462B0879686EB29CF29A0807BE7BA1AB50B84F048136DB8D877C2DE3DD501C711
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: TMP
            • API String ID: 3215553584-3125297090
            • Opcode ID: fa9fc3ba0f2a0ca574b62e3049f007bc07c74431d5877200bfd71a39e50ac507
            • Instruction ID: 87d0764c8d1e3c139cc1551b7e0d5c712226e956938cefdac0cef30c9217607b
            • Opcode Fuzzy Hash: fa9fc3ba0f2a0ca574b62e3049f007bc07c74431d5877200bfd71a39e50ac507
            • Instruction Fuzzy Hash: 7D51A411F0964241FA6CAF2E59952BA6296AF91BC4F48443CDF1DC77EAEE3CF4418204
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: HeapProcess
            • String ID:
            • API String ID: 54951025-0
            • Opcode ID: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
            • Instruction ID: 63cbe0011ab77c92ad012a7a1eda5af2fb95ac2e2e3bbdf41a456d9345153ba9
            • Opcode Fuzzy Hash: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
            • Instruction Fuzzy Hash: 7CB09220E07A86C2EA482F296C8621822A87F98B10FA4807CC60C81330EE2C60A58700
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
            • Instruction ID: c3a94bfee4f4448bf51a42be08942f4bac505dab0f6439b806790e054fd9630a
            • Opcode Fuzzy Hash: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
            • Instruction Fuzzy Hash: 40D1AB22B08A4286EB7C8E2D859427E27A1EF45BC8F24523DCF4E87695DF39E845C740
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
            • Instruction ID: e697cdcec797e243d090355cf47612a50d4dfb254bc65bb0029aca437dcc53f5
            • Opcode Fuzzy Hash: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
            • Instruction Fuzzy Hash: 1CC1C1722142F14FD289EB29E4995BA73E1F798319BD4402AEF8787B85CA3CE414D790
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
            • Instruction ID: c974ca7554231a69b6abea171b6ad26a6bdefc52fdce3cc9495817ad46f18530
            • Opcode Fuzzy Hash: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
            • Instruction Fuzzy Hash: 72B15B72A18B9595EB698F3DC09423C3BA4FB59B88F284239CB4E87395CF39E451C710
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
            • Instruction ID: 76245c6652454129f25365e15dd09ee5064464adb2cdb7c1c824c8ac7eafc508
            • Opcode Fuzzy Hash: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
            • Instruction Fuzzy Hash: 4E81C172B1C78186EB78CF1D948036A7A91FB89794F144339DB8D87B89CE3DE5408B20
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: 7a9558e86fa8b462753dac68b64cf5067dc6b1cda5ab5f882eee36bb89ede29b
            • Instruction ID: e3efdf7ce3565dd0c9dfe77139ef62b025b91dbeaa29ff45dc2c36532dcb6fa3
            • Opcode Fuzzy Hash: 7a9558e86fa8b462753dac68b64cf5067dc6b1cda5ab5f882eee36bb89ede29b
            • Instruction Fuzzy Hash: 4561D422F1C29286FB688E2E945877D66C1AF44770F14423EDF6DC6AD6EE7DE8418700
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
            • Instruction ID: c046fabc22b27ad56ef0d66d426473fe6a2bf054451fcb855f213e290549c891
            • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
            • Instruction Fuzzy Hash: 8B516F76B18A5186E7288F2DC0842B937B1EB56B68F244139CF4D977A5CF3AE843C740
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
            • Instruction ID: 18e5d9547302bef2fa196154b73fc6117d65e70ff8b305043d2722f482fb7a50
            • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
            • Instruction Fuzzy Hash: 26516576B18651C6E7688F2DD08423833A1EF45F68F249139CB8D97794CF3AE852C740
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
            • Instruction ID: 3d632aa1d6385ca153f39d9473dd05f3e869bf045c7ba62f5f5f363396ed2bf4
            • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
            • Instruction Fuzzy Hash: E5516136B2865182EBA88F2DD48023833A5EF55B68F248139CB4D877D4CF7AE853C740
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
            • Instruction ID: d006333c050b974fff909b0dd015d75fa9bfef03ae8a0fcc390cc5c39a080215
            • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
            • Instruction Fuzzy Hash: 02517E36B18A5186E7688F2DC0842B937B5EB46B58F284139CF4D97795DF3AE843C740
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
            • Instruction ID: cd82e9dcbb4fdbd72ad49f4cbe036f4642dad7bbd0a4cd551ee5d0ae284d3aee
            • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
            • Instruction Fuzzy Hash: 6A517D76B1865186E7A98F2DC08063837A1EF45B58F249139CF4D977A9CF3AE853C740
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
            • Instruction ID: 58c4ce3dd8fb5a5d80ffa237edf81d40745bfa928de6c17b6b412d1d7f53d5ee
            • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
            • Instruction Fuzzy Hash: F5518236B18A5585E7688F2DC08027D37B1EB46B58F248139CF4D97B95CF3AE852CB40
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
            • Instruction ID: ec6f6eb1fbefa5aee00a133038aa5ac6548f139d0431940d76772ccdeb68da72
            • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
            • Instruction Fuzzy Hash: F041A452F5974A04ED5D8D1C05946B46AD4AF23BA0D6853FCDFA9D33C2ED0DED868240
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: ErrorFreeHeapLast
            • String ID:
            • API String ID: 485612231-0
            • Opcode ID: 4c2069438db7bd6821668209f3bed185f6ed925e7f6c63ba07488e81febeb59c
            • Instruction ID: 055dc0d6c7c5310d52f1ec0e58ce5876d25b00e061e1751a0a9e33bb46d680de
            • Opcode Fuzzy Hash: 4c2069438db7bd6821668209f3bed185f6ed925e7f6c63ba07488e81febeb59c
            • Instruction Fuzzy Hash: 6141E062714A5582EF08CF2ED9645A9B3A1BB58FD0B09903AEF1DD7B98DE3CD0428304
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6955196b928ea369f318f1367a91d651b99cb7ed2675060227c8542cf7a82c4a
            • Instruction ID: 4aa049443a61182d5d571d3d506ce93f5e72f2344b7e7a39dfdefd60870e9cec
            • Opcode Fuzzy Hash: 6955196b928ea369f318f1367a91d651b99cb7ed2675060227c8542cf7a82c4a
            • Instruction Fuzzy Hash: 38318432B19B8241E7289F2964C017E7AD5EF85BA0F14523CEB5D97BAADF3CD0124704
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
            • Instruction ID: 2a9e0b50080529e752d9bf8d15af980bc9d5557774e26b7b1b4201234333bddb
            • Opcode Fuzzy Hash: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
            • Instruction Fuzzy Hash: 5AF06272B182958EDBA48F2DA84262E77E0F708380F84807DE78DC3B14DA7CD0609F04
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
            • Instruction ID: 9a2d8c80f0b9d6f67a2e951fa37d7ea8d2153dda09befa1519cb5d323bf69e58
            • Opcode Fuzzy Hash: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
            • Instruction Fuzzy Hash: 21A0022191CC76D0E64C9F1CF8901393370FB60F20B401039D20DC11A19F3CE600C310
            APIs
            • GetProcAddress.KERNEL32(?,00007FF6B9075C57,?,00007FF6B907308E), ref: 00007FF6B90750C0
            • GetProcAddress.KERNEL32(?,00007FF6B9075C57,?,00007FF6B907308E), ref: 00007FF6B9075101
            • GetProcAddress.KERNEL32(?,00007FF6B9075C57,?,00007FF6B907308E), ref: 00007FF6B9075126
            • GetProcAddress.KERNEL32(?,00007FF6B9075C57,?,00007FF6B907308E), ref: 00007FF6B907514B
            • GetProcAddress.KERNEL32(?,00007FF6B9075C57,?,00007FF6B907308E), ref: 00007FF6B9075173
            • GetProcAddress.KERNEL32(?,00007FF6B9075C57,?,00007FF6B907308E), ref: 00007FF6B907519B
            • GetProcAddress.KERNEL32(?,00007FF6B9075C57,?,00007FF6B907308E), ref: 00007FF6B90751C3
            • GetProcAddress.KERNEL32(?,00007FF6B9075C57,?,00007FF6B907308E), ref: 00007FF6B90751EB
            • GetProcAddress.KERNEL32(?,00007FF6B9075C57,?,00007FF6B907308E), ref: 00007FF6B9075213
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: AddressProc
            • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
            • API String ID: 190572456-2007157414
            • Opcode ID: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
            • Instruction ID: 67707435c347dab98fc9c28fabab90e180fa932bba652c42fd96412b20bc2268
            • Opcode Fuzzy Hash: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
            • Instruction Fuzzy Hash: 42128C64E0EB5391FA55DF5DB8511B423B0AF59760BA4143ECA2ED23A1EF7CF588C280
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Message
            • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
            • API String ID: 2030045667-1550345328
            • Opcode ID: 63e7821261bdbcd545cb89ff9d6ef705dc686717b2c5037f278b81823427e60c
            • Instruction ID: c38b3aba885fd589cf7990298152e1d3b27ee06e7b75d1302704fc734288d558
            • Opcode Fuzzy Hash: 63e7821261bdbcd545cb89ff9d6ef705dc686717b2c5037f278b81823427e60c
            • Instruction Fuzzy Hash: 67518C61B08643A2EA109F2DA9401BA63A0FF44BA4F948139EF1CC76D6EF3CE595C700
            APIs
              • Part of subcall function 00007FF6B90786B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF6B9073FA4,00000000,00007FF6B9071925), ref: 00007FF6B90786E9
            • ExpandEnvironmentStringsW.KERNEL32(?,00007FF6B9077C97,?,?,FFFFFFFF,00007FF6B9073834), ref: 00007FF6B907782C
              • Part of subcall function 00007FF6B90726C0: MessageBoxW.USER32 ref: 00007FF6B9072736
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
            • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
            • API String ID: 1662231829-930877121
            • Opcode ID: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
            • Instruction ID: 7627a2887c29f075e6b29d7179534ceca8481f54d5078e0da5e8cee5544d92f0
            • Opcode Fuzzy Hash: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
            • Instruction Fuzzy Hash: 3441A311B2D64381FB50AF2DE8516BA63A1EF947E4F44443EEB4EC26A6FE2CE104C750
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: MoveWindow$ObjectSelect$DrawReleaseText
            • String ID: P%
            • API String ID: 2147705588-2959514604
            • Opcode ID: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
            • Instruction ID: 8862ca1c290a4c6f7fc42890a0fcc7703cd4862e413db109c231bbe23eca47b7
            • Opcode Fuzzy Hash: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
            • Instruction Fuzzy Hash: 9351DB266147A186D6349F3AE4181BAB7A1FB98B61F004135EFDE83795DF3CD085D710
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: -$:$f$p$p
            • API String ID: 3215553584-2013873522
            • Opcode ID: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
            • Instruction ID: 5401528a7cc885df54ea0510590eb6da273b215b0d429736cd3768b8a17f713a
            • Opcode Fuzzy Hash: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
            • Instruction Fuzzy Hash: 7612AF62F0C24386FB289E19E0D46B97696FB50750F94407AE7DA876C4FF3CE9948B04
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: f$f$p$p$f
            • API String ID: 3215553584-1325933183
            • Opcode ID: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
            • Instruction ID: 2a297813db4b38d67847cb0febd39fc81f5e9174791972e6d95f35f4702c8f39
            • Opcode Fuzzy Hash: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
            • Instruction Fuzzy Hash: 4B128272F0D14386FB289E18E0947FA76B1FB82B54F884439E799866C4DF7DE4809B50
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Message
            • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
            • API String ID: 2030045667-3659356012
            • Opcode ID: eb8929c7a717523ea7c5dbdd2b8df762904df810c2407b2455a08332a40905b2
            • Instruction ID: f23966efbfb8f8d55b550d75dfd8b7789c3ae77a8cae88f7e19c1088db9edd80
            • Opcode Fuzzy Hash: eb8929c7a717523ea7c5dbdd2b8df762904df810c2407b2455a08332a40905b2
            • Instruction Fuzzy Hash: 6C418121B0864252EA549F1EA9405BAA395FF44BE4F548039DF4DCB7D6EE3CE445C340
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Message
            • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
            • API String ID: 2030045667-3659356012
            • Opcode ID: ab735088dece392ba015fe9887ac25182eb0ff937d9945326d1deb4be678b5f1
            • Instruction ID: 62cf7e8745f5814126af0e7aa6091a612618b8d8284807dae38c3e4adbd7f98f
            • Opcode Fuzzy Hash: ab735088dece392ba015fe9887ac25182eb0ff937d9945326d1deb4be678b5f1
            • Instruction Fuzzy Hash: 51417322B0864381EA649F2DA9405BA63A1FF48BF4F548039DF4EC7AD6EE3CE545C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
            • String ID: CreateProcessW$Failed to create child process!
            • API String ID: 2895956056-699529898
            • Opcode ID: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
            • Instruction ID: ab4651c4876259af628d8ed2e4de0d7ab5fcd6e708a5b219608083146230a369
            • Opcode Fuzzy Hash: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
            • Instruction Fuzzy Hash: 52410231A18B8181DA209F68F4952AA7395FBC5374F500739E7AD877D6DF7CD1448B40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 849930591-393685449
            • Opcode ID: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
            • Instruction ID: 825ee304de480a9eb71588aed5a0a36dfd60d5dc75912498e88ba1f4e6c6de8a
            • Opcode Fuzzy Hash: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
            • Instruction Fuzzy Hash: 74D19E32A09B418AEB209F69D4413AD3BA4FB557A8F104139EF4D97BA6DF3CE490C741
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Message
            • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
            • API String ID: 2030045667-2813020118
            • Opcode ID: 5f86db0b88a8597635f99d5b4cac90fa4f731a3afe8888101c8cea5847f0d3ec
            • Instruction ID: 708a042ca0fb6c24e617e1bc6eed11f319742b3567759b51d45571ab226e89f1
            • Opcode Fuzzy Hash: 5f86db0b88a8597635f99d5b4cac90fa4f731a3afe8888101c8cea5847f0d3ec
            • Instruction Fuzzy Hash: 8F51B562A0C64241EAA09F1EA8503BA6291FF85BA4F54813DEF4DC7BD6EF3CE545C700
            APIs
            • FreeLibrary.KERNEL32(?,?,?,00007FF6B908E3BA,?,?,-00000018,00007FF6B908A063,?,?,?,00007FF6B9089F5A,?,?,?,00007FF6B908524E), ref: 00007FF6B908E19C
            • GetProcAddress.KERNEL32(?,?,?,00007FF6B908E3BA,?,?,-00000018,00007FF6B908A063,?,?,?,00007FF6B9089F5A,?,?,?,00007FF6B908524E), ref: 00007FF6B908E1A8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: AddressFreeLibraryProc
            • String ID: api-ms-$ext-ms-
            • API String ID: 3013587201-537541572
            • Opcode ID: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
            • Instruction ID: c6f6dea597a92945ab64e6a9a1bb67554ece2c620086ea056a7ce1ab7c33ca7c
            • Opcode Fuzzy Hash: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
            • Instruction Fuzzy Hash: 4A41CF31B19A1281FB1ADF2EA880675269ABF55BA0F48453DDF1DC7784EE3CE4458340
            APIs
            • GetTempPathW.KERNEL32(?,?,FFFFFFFF,00007FF6B9073834), ref: 00007FF6B9077CE4
            • CreateDirectoryW.KERNEL32(?,?,FFFFFFFF,00007FF6B9073834), ref: 00007FF6B9077D2C
              • Part of subcall function 00007FF6B9077E10: GetEnvironmentVariableW.KERNEL32(00007FF6B907365F), ref: 00007FF6B9077E47
              • Part of subcall function 00007FF6B9077E10: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF6B9077E69
              • Part of subcall function 00007FF6B9087548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B9087561
              • Part of subcall function 00007FF6B90726C0: MessageBoxW.USER32 ref: 00007FF6B9072736
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Environment$CreateDirectoryExpandMessagePathStringsTempVariable_invalid_parameter_noinfo
            • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
            • API String ID: 740614611-1339014028
            • Opcode ID: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
            • Instruction ID: d4357ffa65ef5231f702890967954cd1563d3507cef4b655f4075d9590c37d07
            • Opcode Fuzzy Hash: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
            • Instruction Fuzzy Hash: F5418011B0D64240FA25EF6DA9952F922A5AF89BE0F444039EF1DC77A7EE3CE9408340
            APIs
            • LoadLibraryExW.KERNEL32(?,?,?,00007FF6B907D29A,?,?,?,00007FF6B907CF8C,?,?,?,00007FF6B907CB89), ref: 00007FF6B907D06D
            • GetLastError.KERNEL32(?,?,?,00007FF6B907D29A,?,?,?,00007FF6B907CF8C,?,?,?,00007FF6B907CB89), ref: 00007FF6B907D07B
            • LoadLibraryExW.KERNEL32(?,?,?,00007FF6B907D29A,?,?,?,00007FF6B907CF8C,?,?,?,00007FF6B907CB89), ref: 00007FF6B907D0A5
            • FreeLibrary.KERNEL32(?,?,?,00007FF6B907D29A,?,?,?,00007FF6B907CF8C,?,?,?,00007FF6B907CB89), ref: 00007FF6B907D113
            • GetProcAddress.KERNEL32(?,?,?,00007FF6B907D29A,?,?,?,00007FF6B907CF8C,?,?,?,00007FF6B907CB89), ref: 00007FF6B907D11F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Library$Load$AddressErrorFreeLastProc
            • String ID: api-ms-
            • API String ID: 2559590344-2084034818
            • Opcode ID: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
            • Instruction ID: f624db00a801eb2548a677fe5b1f9c1e31931ee7fb227265055baa2b5f094c15
            • Opcode Fuzzy Hash: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
            • Instruction Fuzzy Hash: 9131C221B1BB4291EE119F5EA8006752394BF49BB4F591639DF1D87380EF3CE442C350
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
            • String ID:
            • API String ID: 995526605-0
            • Opcode ID: 8356e17e6427c03366acad688ef96df5430cd8c67dfe58d52091e88c81740b7d
            • Instruction ID: 14fc0ea0c7c03776f65a21d4831bb7e450644b8369015ad196bfecc461a04522
            • Opcode Fuzzy Hash: 8356e17e6427c03366acad688ef96df5430cd8c67dfe58d52091e88c81740b7d
            • Instruction Fuzzy Hash: E5212E21B0CA4642EB209F6DA48422AA3A5FFC57F4F50023DEB6D83AE5DF7CD4458700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Value$ErrorLast
            • String ID:
            • API String ID: 2506987500-0
            • Opcode ID: 4f1009f36f4b7e41e642a617816a0843c7a4fdcae41be86a1245b23186b7dd2e
            • Instruction ID: bcf3e30493ba16ebe9e58b71c1aaee558a0ff50b341874606ccf7c79de1b9046
            • Opcode Fuzzy Hash: 4f1009f36f4b7e41e642a617816a0843c7a4fdcae41be86a1245b23186b7dd2e
            • Instruction Fuzzy Hash: 08214920B0C65242FA6C6F2E5AC913965825F987B0F15573CEB3EC6ADADE2CF8416701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
            • String ID: CONOUT$
            • API String ID: 3230265001-3130406586
            • Opcode ID: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
            • Instruction ID: 96a5ffe56f42bde0a9add1244c51652ca4a690bdda0c431328c47728bc60e6f7
            • Opcode Fuzzy Hash: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
            • Instruction Fuzzy Hash: 1D118B22A18A4286E7508F5EE85432966A4FB98FE8F404238EB1DC77A5DF3CD804C780
            APIs
            • GetCurrentProcess.KERNEL32(?,00000000,?,00007FF6B90739F2), ref: 00007FF6B907821D
            • K32EnumProcessModules.KERNEL32(?,00000000,?,00007FF6B90739F2), ref: 00007FF6B907827A
              • Part of subcall function 00007FF6B90786B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF6B9073FA4,00000000,00007FF6B9071925), ref: 00007FF6B90786E9
            • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF6B90739F2), ref: 00007FF6B9078305
            • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF6B90739F2), ref: 00007FF6B9078364
            • FreeLibrary.KERNEL32(?,00000000,?,00007FF6B90739F2), ref: 00007FF6B9078375
            • FreeLibrary.KERNEL32(?,00000000,?,00007FF6B90739F2), ref: 00007FF6B907838A
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
            • String ID:
            • API String ID: 3462794448-0
            • Opcode ID: c116373e2a09e68fc95a37a35a910f387ed59b49a7d0ab4690c2b7d3ff367989
            • Instruction ID: f7cb0e1d95d29b4c8ce5f99d25e4dd5b89bd14d38881e6f9c0df2c959db719d1
            • Opcode Fuzzy Hash: c116373e2a09e68fc95a37a35a910f387ed59b49a7d0ab4690c2b7d3ff367989
            • Instruction Fuzzy Hash: 7041C162B1D68281EA319F2AA4802BA77A4FF84BE4F444139DF9D97789DF3CE401C710
            APIs
              • Part of subcall function 00007FF6B9077B50: GetCurrentProcess.KERNEL32 ref: 00007FF6B9077B70
              • Part of subcall function 00007FF6B9077B50: OpenProcessToken.ADVAPI32 ref: 00007FF6B9077B83
              • Part of subcall function 00007FF6B9077B50: GetTokenInformation.ADVAPI32 ref: 00007FF6B9077BA8
              • Part of subcall function 00007FF6B9077B50: GetLastError.KERNEL32 ref: 00007FF6B9077BB2
              • Part of subcall function 00007FF6B9077B50: GetTokenInformation.ADVAPI32 ref: 00007FF6B9077BF2
              • Part of subcall function 00007FF6B9077B50: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF6B9077C0E
              • Part of subcall function 00007FF6B9077B50: CloseHandle.KERNEL32 ref: 00007FF6B9077C26
            • LocalFree.KERNEL32(?,00007FF6B9073814), ref: 00007FF6B907848C
            • LocalFree.KERNEL32(?,00007FF6B9073814), ref: 00007FF6B9078495
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
            • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
            • API String ID: 6828938-1529539262
            • Opcode ID: 795f95526d0a951be163d7ee57e77295e71c5006ab84a191c0455a0dace466c7
            • Instruction ID: 826ba196b3c391c41210253f074b92fd1fee26b8550c26021a88d797e9a9292d
            • Opcode Fuzzy Hash: 795f95526d0a951be163d7ee57e77295e71c5006ab84a191c0455a0dace466c7
            • Instruction Fuzzy Hash: 76216032A0C64282F650AF28E9553EA63A5FF88790F84403AEB4DC3796DF3CE445C750
            APIs
            • GetLastError.KERNEL32(?,?,?,00007FF6B90843FD,?,?,?,?,00007FF6B908979A,?,?,?,?,00007FF6B908649F), ref: 00007FF6B908A5E7
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B90843FD,?,?,?,?,00007FF6B908979A,?,?,?,?,00007FF6B908649F), ref: 00007FF6B908A61D
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B90843FD,?,?,?,?,00007FF6B908979A,?,?,?,?,00007FF6B908649F), ref: 00007FF6B908A64A
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B90843FD,?,?,?,?,00007FF6B908979A,?,?,?,?,00007FF6B908649F), ref: 00007FF6B908A65B
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B90843FD,?,?,?,?,00007FF6B908979A,?,?,?,?,00007FF6B908649F), ref: 00007FF6B908A66C
            • SetLastError.KERNEL32(?,?,?,00007FF6B90843FD,?,?,?,?,00007FF6B908979A,?,?,?,?,00007FF6B908649F), ref: 00007FF6B908A687
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Value$ErrorLast
            • String ID:
            • API String ID: 2506987500-0
            • Opcode ID: 5dcac91248c0014d458aec840eea87d8b317a92cf5de5997ea3edf93bd94a031
            • Instruction ID: 93da5a115dd277f5e39ec6a56e6a780abe6649ec1e2b4176f103245120e5d5d5
            • Opcode Fuzzy Hash: 5dcac91248c0014d458aec840eea87d8b317a92cf5de5997ea3edf93bd94a031
            • Instruction Fuzzy Hash: 94115C60F0C65242FA5C6F3D5AC513926829F68BB0F05473CDB3E86ADADE2CF8116701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
            • String ID: Unhandled exception in script
            • API String ID: 3081866767-2699770090
            • Opcode ID: 43e0e9fc7257205e5ba4956726e7fb7afbd4954ec96d29d9005c09c1dc537ba6
            • Instruction ID: 606c8f6f38cdf302591baf798a83245d4f9a1e2f8a59aa9dedfb1f16243e0f23
            • Opcode Fuzzy Hash: 43e0e9fc7257205e5ba4956726e7fb7afbd4954ec96d29d9005c09c1dc537ba6
            • Instruction Fuzzy Hash: B5315032A09A8289EB24DF69E8952F97360FF89794F440139EB4D8BB5ADF3CD144C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Message$ByteCharMultiWide
            • String ID: %s%s: %s$Error$Error/warning (ANSI fallback)
            • API String ID: 1878133881-640379615
            • Opcode ID: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
            • Instruction ID: 9a707069d042c63bca6ab6072296127ef82c31fc83f10da9d2595067e736b02c
            • Opcode Fuzzy Hash: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
            • Instruction Fuzzy Hash: FC218372628AC691E620DF18F4517EA7364FF84B94F40413AEB8C93699DF7CD645C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: AddressFreeHandleLibraryModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 4061214504-1276376045
            • Opcode ID: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
            • Instruction ID: c9b94ce0ba56cacd043c6bd0a6f6fcdb137c0d84957729b1ca220947ec25aef9
            • Opcode Fuzzy Hash: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
            • Instruction Fuzzy Hash: A1F06221B19B0282EA148F2CE4843795360AF85B75F94063DCB7E865F4CF2CD449D300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _set_statfp
            • String ID:
            • API String ID: 1156100317-0
            • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
            • Instruction ID: ac8969f58b0ca72f7b8f8dd5cfba690e9802b066f1c972c5a4d553d97839eb0d
            • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
            • Instruction Fuzzy Hash: 3C11A032E5CA0341F6A85F2CE46637951406F59774F19063CEFAE8A7EBCE6CE8818210
            APIs
            • FlsGetValue.KERNEL32(?,?,?,00007FF6B90898B3,?,?,00000000,00007FF6B9089B4E,?,?,?,?,?,00007FF6B9089ADA), ref: 00007FF6B908A6BF
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B90898B3,?,?,00000000,00007FF6B9089B4E,?,?,?,?,?,00007FF6B9089ADA), ref: 00007FF6B908A6DE
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B90898B3,?,?,00000000,00007FF6B9089B4E,?,?,?,?,?,00007FF6B9089ADA), ref: 00007FF6B908A706
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B90898B3,?,?,00000000,00007FF6B9089B4E,?,?,?,?,?,00007FF6B9089ADA), ref: 00007FF6B908A717
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B90898B3,?,?,00000000,00007FF6B9089B4E,?,?,?,?,?,00007FF6B9089ADA), ref: 00007FF6B908A728
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Value
            • String ID:
            • API String ID: 3702945584-0
            • Opcode ID: 25d361a094b2c99e262beff41eaee06ac9464b6f74968b1c14d3cfe42ff85be4
            • Instruction ID: db7a6cb234e1531ae3fd9d974682529449902569a151a10d8b6da29372000059
            • Opcode Fuzzy Hash: 25d361a094b2c99e262beff41eaee06ac9464b6f74968b1c14d3cfe42ff85be4
            • Instruction Fuzzy Hash: 09114C60B0D64242FA5CAB2D5DC517925915FA87B0F05433CEB3E86AD6DE2CF841A701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Value
            • String ID:
            • API String ID: 3702945584-0
            • Opcode ID: a853173f6999e7d5ef833d9e4f06cbd56a904a1eb1d6261c936ae8f95b9bedb9
            • Instruction ID: 4835a6acb40467acd0603cb86a70105a3e170d346ea9729f470ce391a4198d57
            • Opcode Fuzzy Hash: a853173f6999e7d5ef833d9e4f06cbd56a904a1eb1d6261c936ae8f95b9bedb9
            • Instruction Fuzzy Hash: 2111E560F0860742FA6CBE2D58D517926824F69370F59473CDB3ECAAD2ED2CF881A251
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: verbose
            • API String ID: 3215553584-579935070
            • Opcode ID: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
            • Instruction ID: 95875deaae6f235529e10cd46e540f06a2c09d08fdf1d7d68c0c7435ab5e65be
            • Opcode Fuzzy Hash: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
            • Instruction Fuzzy Hash: C691AF32B0CA4681E7299E29D4903BD3791AF44B99F88417ADB5EC63D5FF3CE4458301
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: UTF-16LEUNICODE$UTF-8$ccs
            • API String ID: 3215553584-1196891531
            • Opcode ID: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
            • Instruction ID: 08ab2bac34062cbb0beb18a283ff60c56169ca59609c3fd15872136ab373c22c
            • Opcode Fuzzy Hash: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
            • Instruction Fuzzy Hash: 9F81A172F1825389FB6C5F3DC1902783AA1AB11B48F65803DDB09D72D6DF2DE9419B81
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
            • String ID: csm
            • API String ID: 2395640692-1018135373
            • Opcode ID: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
            • Instruction ID: c9bff5aedcec2610f06cbaac998d57ee1469a125d515e45b9fc1fad59ce18f81
            • Opcode Fuzzy Hash: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
            • Instruction Fuzzy Hash: 6F51B232B196629ADB14CF2DE444A797792FB44BA8F108139EB4D83788EF7DE841C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: CallEncodePointerTranslator
            • String ID: MOC$RCC
            • API String ID: 3544855599-2084237596
            • Opcode ID: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
            • Instruction ID: 380e7e85393959455665d61a712fee400751174243444b4277e4fcf52ae66290
            • Opcode Fuzzy Hash: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
            • Instruction Fuzzy Hash: B2619332909BC581D7219F19E4407AEBBA0FB957A4F044229EB9C43BA5DF7CE190CB01
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
            • String ID: csm$csm
            • API String ID: 3896166516-3733052814
            • Opcode ID: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
            • Instruction ID: c1bcd94370580c350aa456b7c4096596ff35e39e38ba4545694263f933a0ac78
            • Opcode Fuzzy Hash: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
            • Instruction Fuzzy Hash: 48519236A0934296EB748F2994483787B94FB64BA4F144139DB5D87BE5CF3CE490C702
            APIs
            • CreateDirectoryW.KERNEL32(00000000,?,00007FF6B907324C,?,?,00007FF6B9073964), ref: 00007FF6B9077642
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: CreateDirectory
            • String ID: %.*s$%s%c$\
            • API String ID: 4241100979-1685191245
            • Opcode ID: 1156698ca0d33aa8d2468b4f0fdefbfa17a3fd1640f2d1a941dba21d9585616c
            • Instruction ID: 80f07b45099d3c91f2c2292108c9a43efbbd37654dc99bf2de02c16f3818c7d0
            • Opcode Fuzzy Hash: 1156698ca0d33aa8d2468b4f0fdefbfa17a3fd1640f2d1a941dba21d9585616c
            • Instruction Fuzzy Hash: 1731C421B19AC595EA219F29E8107AA6355FB84BF0F444239EF6DC37D9EE2CD2458700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: Message$ByteCharMultiWide
            • String ID: Error/warning (ANSI fallback)$Warning
            • API String ID: 1878133881-2698358428
            • Opcode ID: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
            • Instruction ID: b282b15bac1b5fae7933953c7393ec8b88a44a3430e49961e0d3ddd643d56e0b
            • Opcode Fuzzy Hash: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
            • Instruction Fuzzy Hash: 0A11BF72628B8591FB208F18F451BA933A4FF84B84F90513ADB9C87685CF3CD604C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: FileWrite$ConsoleErrorLastOutput
            • String ID:
            • API String ID: 2718003287-0
            • Opcode ID: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
            • Instruction ID: 87143afbe1efd4ca773eec998f2d7051a53cee44c3d7d9c75a0eab1c7a82e27d
            • Opcode Fuzzy Hash: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
            • Instruction Fuzzy Hash: 80D1E172B18A818AE715CF79D4842BC3BB6FB44798B14423ACF5E97B99DE38D416C340
            APIs
            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6B908C25B), ref: 00007FF6B908C38C
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6B908C25B), ref: 00007FF6B908C417
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: ConsoleErrorLastMode
            • String ID:
            • API String ID: 953036326-0
            • Opcode ID: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
            • Instruction ID: 861d58fd62227fdaf381de944b21b1e065cf18d0783c8e120870ac151e15b0a9
            • Opcode Fuzzy Hash: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
            • Instruction Fuzzy Hash: E8918F62F0866285FB689F6D94C02BD2BB0BF54B98F54513DDF0EA6AD5DE38D482C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _get_daylight$_isindst
            • String ID:
            • API String ID: 4170891091-0
            • Opcode ID: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
            • Instruction ID: 4bdef2fe55239f9407a16c270b75e9f5f91cd4c2d391c05f4665cd635f0a3124
            • Opcode Fuzzy Hash: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
            • Instruction Fuzzy Hash: 1E51D972F042218AFB18EF6C99956BC3BA5AB60359F50013DDF1D96AE5DF38E442C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
            • String ID:
            • API String ID: 2780335769-0
            • Opcode ID: 1ec8bf387a2241cb1ee0019bb6bb5a321e30a3d38cbcbe421edb0c1d83f6d5d9
            • Instruction ID: 90ab951794114ec68b375f6dadd4f377f1bf0619017e77997333f8fe1213a4e0
            • Opcode Fuzzy Hash: 1ec8bf387a2241cb1ee0019bb6bb5a321e30a3d38cbcbe421edb0c1d83f6d5d9
            • Instruction Fuzzy Hash: FC515822F086518AFB58CFB9D4943BD37AAEB48B98F108539DF0997689DF3CD4818740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
            • String ID:
            • API String ID: 1279662727-0
            • Opcode ID: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
            • Instruction ID: bf06ebaec9d9b745cde1b2c818a6e0c2d7a834526ad5cefca3c507823c378c01
            • Opcode Fuzzy Hash: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
            • Instruction Fuzzy Hash: 61418322E1878283E7589F6995903797260FBA4764F109339E79C87AD6EF7CE5E08700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: LongWindow$DialogInvalidateRect
            • String ID:
            • API String ID: 1956198572-0
            • Opcode ID: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
            • Instruction ID: 549654dc95d13b2bed8e8a5215da8550f564a41b1fd16c74d3f869c59fa06b21
            • Opcode Fuzzy Hash: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
            • Instruction Fuzzy Hash: 8E11C821F0814242FA549F6EF5443B91292EF88BA0F84C039DF4987B9FCD3CD4D19650
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: _get_daylight$_invalid_parameter_noinfo
            • String ID: ?
            • API String ID: 1286766494-1684325040
            • Opcode ID: 03a08327e3a10131aa5bb8fa3ef37a2eed6d70488736d84a243644e572cc7fb3
            • Instruction ID: b346b41b07edd7034e529c69dfc17dd63d71464df5bcfd04a93b03c886267d54
            • Opcode Fuzzy Hash: 03a08327e3a10131aa5bb8fa3ef37a2eed6d70488736d84a243644e572cc7fb3
            • Instruction Fuzzy Hash: 77411612B0869286FB249F2DD45537A77A0EF81BA4F10423DEF9C86AD6DF3CD4418700
            APIs
            • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B908835E
              • Part of subcall function 00007FF6B9089C58: HeapFree.KERNEL32(?,?,?,00007FF6B9092032,?,?,?,00007FF6B909206F,?,?,00000000,00007FF6B9092535,?,?,?,00007FF6B9092467), ref: 00007FF6B9089C6E
              • Part of subcall function 00007FF6B9089C58: GetLastError.KERNEL32(?,?,?,00007FF6B9092032,?,?,?,00007FF6B909206F,?,?,00000000,00007FF6B9092535,?,?,?,00007FF6B9092467), ref: 00007FF6B9089C78
            • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF6B907BEC5), ref: 00007FF6B908837C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
            • String ID: C:\Users\user\Desktop\PyIsvSahWy.exe
            • API String ID: 3580290477-1588841854
            • Opcode ID: 53ad205ea1c6cb2f7bb7661613e3da0ecc1c0905bf47b453e04b3a6da8a19941
            • Instruction ID: 0c39f050dc5399c80bc37488540e27749db160f52a688fe2d60b2a689b5d7188
            • Opcode Fuzzy Hash: 53ad205ea1c6cb2f7bb7661613e3da0ecc1c0905bf47b453e04b3a6da8a19941
            • Instruction Fuzzy Hash: A4417C32B1CB5286EB18DF29A8800BD37A5EF45790B555039EF6E83B96DE3DE4858300
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: CurrentDirectory_invalid_parameter_noinfo
            • String ID: .$:
            • API String ID: 2020911589-4202072812
            • Opcode ID: 02917ae70002487e25aaa57807b70e18839398bc457e7bd9011200fb9d4eab61
            • Instruction ID: a101b0ca0a4672c3072aa2bd694594285a700955ea5ae87820124f6f0eaa409b
            • Opcode Fuzzy Hash: 02917ae70002487e25aaa57807b70e18839398bc457e7bd9011200fb9d4eab61
            • Instruction Fuzzy Hash: 11417C22F08B5298FB159FB998902FC3AB4AF14758F64043DDF4DA7A89EF38D4468350
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: ErrorFileLastWrite
            • String ID: U
            • API String ID: 442123175-4171548499
            • Opcode ID: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
            • Instruction ID: db4ac3cfc1544538e21460ea2022e4a8eec093df0d119f81931ffdc106197b26
            • Opcode Fuzzy Hash: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
            • Instruction Fuzzy Hash: 71419122B28A9581DB208F29E8847B97761FB98794F944139EF4DC7798DF7CD441CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: CurrentDirectory
            • String ID: :
            • API String ID: 1611563598-336475711
            • Opcode ID: e37c33f8f2befd5fbd3c49cdc0b6d52123385b6fd944ea7372e41dd3f6ca63dc
            • Instruction ID: dd238d2b9054a8a70d51537668f4ef5bb26e90f8b96c8f4145d29f3213c8be69
            • Opcode Fuzzy Hash: e37c33f8f2befd5fbd3c49cdc0b6d52123385b6fd944ea7372e41dd3f6ca63dc
            • Instruction Fuzzy Hash: B021E122B0868182EB68AF19D48427E77E1FB94B44F45443DDB8C83685DFBCE945C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: ExceptionFileHeaderRaise
            • String ID: csm
            • API String ID: 2573137834-1018135373
            • Opcode ID: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
            • Instruction ID: d259b894affb706b9c901e291070fbb79128917d51f7ae48c453b795ca7d1d63
            • Opcode Fuzzy Hash: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
            • Instruction Fuzzy Hash: 79112B36618B8582EB218F29F440269B7E4FB88B94F688235DB8D47769DF3CD551CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2228493500.00007FF6B9071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B9070000, based on PE: true
            • Associated: 00000000.00000002.2226448428.00007FF6B9070000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228604279.00007FF6B909B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90AE000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228665028.00007FF6B90B4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2228763061.00007FF6B90B6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b9070000_PyIsvSahWy.jbxd
            Similarity
            • API ID: DriveType_invalid_parameter_noinfo
            • String ID: :
            • API String ID: 2595371189-336475711
            • Opcode ID: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
            • Instruction ID: 22acd7dc8645ef190fc7beeb5162422e206a7ca83ab745b2b56bf57668395ff9
            • Opcode Fuzzy Hash: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
            • Instruction Fuzzy Hash: 0C018F62B1C24286FB68AF7894A127E27A0EF58758F90003DD75DC2691DE7CE504CA14