Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vRWw6y4Pj2.exe

Overview

General Information

Sample name:vRWw6y4Pj2.exe
renamed because original name is a hash value
Original sample name:ef9b7b7b887de914fbff13cd604c7535.exe
Analysis ID:1579722
MD5:ef9b7b7b887de914fbff13cd604c7535
SHA1:6803d33d4f9a0732d7c5e8d09f25e79b05519fd8
SHA256:9443eac4c1234c3d968480a3ab01eb48107e85ff4f797d25f2ec918447e7904f
Tags:exeuser-abuse_ch
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)

Classification

  • System is w10x64
  • vRWw6y4Pj2.exe (PID: 6536 cmdline: "C:\Users\user\Desktop\vRWw6y4Pj2.exe" MD5: EF9B7B7B887DE914FBFF13CD604C7535)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: vRWw6y4Pj2.exeReversingLabs: Detection: 52%
Source: vRWw6y4Pj2.exeVirustotal: Detection: 45%Perma Link
Source: vRWw6y4Pj2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079F85A0 FindFirstFileExW,FindClose,1_2_00007FF7079F85A0
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A10B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF707A10B84
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079F79B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF7079F79B0
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079F10001_2_00007FF7079F1000
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A15C741_2_00007FF707A15C74
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A028C01_2_00007FF707A028C0
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A050401_2_00007FF707A05040
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A0D8801_2_00007FF707A0D880
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A010741_2_00007FF707A01074
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079F9FCD1_2_00007FF7079F9FCD
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079F979B1_2_00007FF7079F979B
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A157281_2_00007FF707A15728
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A0FBD81_2_00007FF707A0FBD8
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A01F301_2_00007FF707A01F30
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A12F201_2_00007FF707A12F20
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A14F101_2_00007FF707A14F10
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A00E701_2_00007FF707A00E70
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079F95FB1_2_00007FF7079F95FB
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A0CD6C1_2_00007FF707A0CD6C
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A02CC41_2_00007FF707A02CC4
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A014841_2_00007FF707A01484
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A00C641_2_00007FF707A00C64
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A133BC1_2_00007FF707A133BC
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A0FBD81_2_00007FF707A0FBD8
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A073F41_2_00007FF707A073F4
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079F8B201_2_00007FF7079F8B20
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A10B841_2_00007FF707A10B84
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A07AAC1_2_00007FF707A07AAC
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A18A381_2_00007FF707A18A38
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A012801_2_00007FF707A01280
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A00A601_2_00007FF707A00A60
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A091B01_2_00007FF707A091B0
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A0D2001_2_00007FF707A0D200
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A1518C1_2_00007FF707A1518C
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: String function: 00007FF7079F25F0 appears 50 times
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079F29E0 GetLastError,FormatMessageW,MessageBoxW,1_2_00007FF7079F29E0
Source: vRWw6y4Pj2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: vRWw6y4Pj2.exeReversingLabs: Detection: 52%
Source: vRWw6y4Pj2.exeVirustotal: Detection: 45%
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeFile read: C:\Users\user\Desktop\vRWw6y4Pj2.exeJump to behavior
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeSection loaded: wintypes.dllJump to behavior
Source: vRWw6y4Pj2.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: vRWw6y4Pj2.exeStatic file information: File size 12644226 > 1048576
Source: vRWw6y4Pj2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: vRWw6y4Pj2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: vRWw6y4Pj2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: vRWw6y4Pj2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: vRWw6y4Pj2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: vRWw6y4Pj2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: vRWw6y4Pj2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: vRWw6y4Pj2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: vRWw6y4Pj2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: vRWw6y4Pj2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: vRWw6y4Pj2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: vRWw6y4Pj2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: vRWw6y4Pj2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079F50B0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00007FF7079F50B0
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-17446
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeAPI coverage: 6.4 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079F85A0 FindFirstFileExW,FindClose,1_2_00007FF7079F85A0
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A10B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF707A10B84
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079F79B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF7079F79B0
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079FC44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF7079FC44C
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A12790 GetProcessHeap,1_2_00007FF707A12790
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079FC62C SetUnhandledExceptionFilter,1_2_00007FF7079FC62C
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079FC44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF7079FC44C
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079FBBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF7079FBBC0
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A09924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF707A09924
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A18880 cpuid 1_2_00007FF707A18880
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF7079FC330 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00007FF7079FC330
Source: C:\Users\user\Desktop\vRWw6y4Pj2.exeCode function: 1_2_00007FF707A14F10 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,1_2_00007FF707A14F10
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS13
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
vRWw6y4Pj2.exe53%ReversingLabsWin64.Trojan.Generic
vRWw6y4Pj2.exe46%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
ax-0001.ax-msedge.net
150.171.27.10
truefalse
    high
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1579722
    Start date and time:2024-12-23 08:05:26 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 12s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:19
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:vRWw6y4Pj2.exe
    renamed because original name is a hash value
    Original Sample Name:ef9b7b7b887de914fbff13cd604c7535.exe
    Detection:MAL
    Classification:mal48.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 98%
    • Number of executed functions: 20
    • Number of non-executed functions: 83
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.3.187.198, 23.218.208.109, 20.190.177.85, 20.223.35.26, 2.16.158.58, 13.107.246.63, 20.109.210.53, 150.171.27.10, 2.16.158.56, 20.103.156.88
    • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, tse1.mm.bing.net, g.bing.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, glb.cws.prod.dcat.dsp.trafficmanager.net, prod.fs.microsoft.com.akadns.net
    • Report size getting too big, too many NtSetInformationFile calls found.
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    ax-0001.ax-msedge.net2E814B7D-3F0B-4AF7-8C7C-C8AE7CD57525_12172024125634383.dllGet hashmaliciousUnknownBrowse
    • 150.171.28.10
    fKdiT1D1dk.exeGet hashmaliciousRHADAMANTHYSBrowse
    • 150.171.27.10
    file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
    • 150.171.28.10
    uDTW3VjJJT.exeGet hashmaliciousLummaC, StealcBrowse
    • 150.171.27.10
    BB4S2ErvqK.exeGet hashmaliciousLummaCBrowse
    • 150.171.28.10
    hvm4oOzDaX.exeGet hashmaliciousUnknownBrowse
    • 150.171.27.10
    SWIFT.xlsGet hashmaliciousUnknownBrowse
    • 150.171.27.10
    https://click.pstmrk.it/3s/veed.io%2Fshare-video-link%3Ftoken%3DeyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJleHAiOjE3MzQ2MzE2NDgsImlhdCI6MTczNDYzMDc0OCwic3ViIjoiZmY0NTdiM2MtYjI3MC00YzA0LWEwOTEtYjY3ZDJkOGQ3ZTU1Iiwicm9sZXMiOltdLCJraWQiOiJwcm9qZWN0cy92ZWVkLXByb2Qtc2VydmVyL2xvY2F0aW9ucy9ldXJvcGUtd2VzdDEva2V5UmluZ3MvdmVlZC1wcm9kLWtleXJpbmcvY3J5cHRvS2V5cy92ZWVkLXByb2QtandrLWtleS9jcnlwdG9LZXlWZXJzaW9ucy8xIiwiZmVhdHVyZXMiOnt9LCJzY29wZXMiOltdfQ.f-EtSCYYeQiR4cEb8w5ABF3koXpbxl8QeFIarADkLP6q32DzsnFZl76Y98Uad7M8RBPPuOQOV9SUbCY1hRa4IbqV9_4cTm0v7DuBTCKOZbHN1NiATZOGw2BzdEMqIEfnNo5A_H2_DLVQZLtd6sZzcRoNBzbmcq2_xlzWgmqIErGV0VYXIb-Vac1b-3wmAgIyE-VS7Cd5aHYtVyiV9T5HfrpjPl7-M6dLIaQqm6103z7gO_qoKow1qbFmNgGaUsQED1CHbqo-hCgXzib7NToyu0Qq4kSl-2NEzgLMKy1zFR2J0E0vr9FHirjR9fmmDF2nk76Ht8L2WbV-dRyXZBZaUikfojo56vYWI9cfSQrG_awuFNR0M1s6dpPwumDM8sXlMZYt4u5WZaNcRZynPHXeqNZcdwKhlZrFN0U3B3U7B69avz_FlMxw6Or_0aeJkUP5YZP3wH-IIbwwa6es37u8G7gWYINEfp-pJlKV7klV1CcskLf_53iNx7MtxgvAXLMNZJ2tnuxY8W6w_E-pchjpNP2I5NV2Ui2_bNSgl3kBuX3oWsX0m_wL3MZ39pE3paPp2FAIgQPpZ5a0BhmPYsMk2IPPel2dll8j1IYBwHsZ5a1IHsHA6gTMWkJl-uhAjN4mnXo7Om0NWRZvfFvatgA4YCoTXdntM31GIZxAyWF9a14%26postLoginUrl%3D%252Fview%252F3ab9b7be-178c-4289-b29e-75921856f7f5%252F/oMlP/0SC6AQ/AQ/15f5e010-d260-490a-9e5d-79f5643b5481/1/HSOO9aL291Get hashmaliciousUnknownBrowse
    • 150.171.27.10
    https://p.placed.com/api/v2/sync/impression?partner=barkley&plaid=0063o000014sWgoAAE&version=1.0&payload_campaign_identifier=71700000100870630&payload_timestamp=5943094174221506287&payload_type=impression&redirect=http%3A%2F%2Fgoogle.com%2Famp%2Fs%2Fgoal.com.co%2Fwp%2FpaymentGet hashmaliciousHTMLPhisherBrowse
    • 150.171.27.10
    ktyihkdfesf.exeGet hashmaliciousVidarBrowse
    • 150.171.27.10
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):7.98760059638872
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:vRWw6y4Pj2.exe
    File size:12'644'226 bytes
    MD5:ef9b7b7b887de914fbff13cd604c7535
    SHA1:6803d33d4f9a0732d7c5e8d09f25e79b05519fd8
    SHA256:9443eac4c1234c3d968480a3ab01eb48107e85ff4f797d25f2ec918447e7904f
    SHA512:c3c15e5a373882ee0110b1f19080720b0ff693159dc40be9cf66a5a67f7804c7e49953e0d0895d144c3d959c83e05d37f7990d32e5a9d37d8e4253e807709dfd
    SSDEEP:393216:kzuRUAwf7vLF4NkW+eGQR6n/ikWMWfogBx:kzuRIx1W+e5R4qPDXj
    TLSH:33D63386D3F48DF1FCBA523C45854119E6B1742403F4C98FABAE81A61F533E19E3EA91
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Xhc.Xhc.Xhc...`._hc...f..hc...g.Rhc.....[hc...`.Qhc...g.Ihc...f.phc...b.Shc.Xhb..hc.K.g.Ahc.K.a.Yhc.RichXhc.........PE..d..
    Icon Hash:0e9313214080a157
    Entrypoint:0x14000c0d0
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
    Time Stamp:0x66A26A8B [Thu Jul 25 15:08:59 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:456e8615ad4320c9f54e50319a19df9c
    Instruction
    dec eax
    sub esp, 28h
    call 00007F0978B26E7Ch
    dec eax
    add esp, 28h
    jmp 00007F0978B26A9Fh
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    dec eax
    sub esp, 28h
    call 00007F0978B27248h
    test eax, eax
    je 00007F0978B26C43h
    dec eax
    mov eax, dword ptr [00000030h]
    dec eax
    mov ecx, dword ptr [eax+08h]
    jmp 00007F0978B26C27h
    dec eax
    cmp ecx, eax
    je 00007F0978B26C36h
    xor eax, eax
    dec eax
    cmpxchg dword ptr [0003843Ch], ecx
    jne 00007F0978B26C10h
    xor al, al
    dec eax
    add esp, 28h
    ret
    mov al, 01h
    jmp 00007F0978B26C19h
    int3
    int3
    int3
    dec eax
    sub esp, 28h
    test ecx, ecx
    jne 00007F0978B26C29h
    mov byte ptr [00038425h], 00000001h
    call 00007F0978B26375h
    call 00007F0978B27660h
    test al, al
    jne 00007F0978B26C26h
    xor al, al
    jmp 00007F0978B26C36h
    call 00007F0978B3416Fh
    test al, al
    jne 00007F0978B26C2Bh
    xor ecx, ecx
    call 00007F0978B27670h
    jmp 00007F0978B26C0Ch
    mov al, 01h
    dec eax
    add esp, 28h
    ret
    int3
    int3
    inc eax
    push ebx
    dec eax
    sub esp, 20h
    cmp byte ptr [000383ECh], 00000000h
    mov ebx, ecx
    jne 00007F0978B26C89h
    cmp ecx, 01h
    jnbe 00007F0978B26C8Ch
    call 00007F0978B271BEh
    test eax, eax
    je 00007F0978B26C4Ah
    test ebx, ebx
    jne 00007F0978B26C46h
    dec eax
    lea ecx, dword ptr [000383D6h]
    call 00007F0978B33F62h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x3c76c0x78.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x490000x2bb4.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x460000x2208.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x4c0000x768.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x39dc00x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x39c800x140.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x450.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x292100x29400aca64598002ecff9eefbc96554edf015False0.5511067708333334data6.4784482217419175IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x2b0000x126420x1280008d780ef12591c348fa0fa0c8d771aa9False0.5245592271959459data5.750866127143705IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x3e0000x73d80xe00d0a288978c66419b180b35f625b6dce7False0.13532366071428573data1.8378139998458343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x460000x22080x240074cf3ea22e0a1756984435d6f80f7da5False0.4671223958333333data5.259201915045256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x490000x2bb40x2c00e29fd86a5b73bf6fb312f4fd0e85b0b6False0.13893821022727273data2.837433433937152IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x4c0000x7680x80071de9271648326ec88350e903470cf3eFalse0.5576171875data5.283119454571673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x490e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.08143153526970955
    RT_GROUP_ICON0x4b6900x14data1.15
    RT_MANIFEST0x4b6a40x50dXML 1.0 document, ASCII text0.4694508894044857
    DLLImport
    USER32.dllCreateWindowExW, PostMessageW, GetMessageW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
    COMCTL32.dll
    KERNEL32.dllGetACP, IsValidCodePage, GetStringTypeW, GetFileAttributesExW, SetEnvironmentVariableW, FlushFileBuffers, GetCurrentDirectoryW, GetOEMCP, GetCPInfo, GetModuleHandleW, MulDiv, GetLastError, FormatMessageW, GetModuleFileNameW, SetDllDirectoryW, CreateSymbolicLinkW, GetProcAddress, CreateDirectoryW, GetCommandLineW, GetEnvironmentVariableW, ExpandEnvironmentStringsW, GetEnvironmentStringsW, FindClose, FindFirstFileW, FindNextFileW, GetDriveTypeW, RemoveDirectoryW, GetTempPathW, CloseHandle, WaitForSingleObject, Sleep, GetCurrentProcess, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LoadLibraryExW, LocalFree, SetConsoleCtrlHandler, K32EnumProcessModules, K32GetModuleFileNameExW, CreateFileW, FindFirstFileExW, GetFinalPathNameByHandleW, MultiByteToWideChar, WideCharToMultiByte, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, IsProcessorFeaturePresent, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, ReadFile, GetFullPathNameW, SetStdHandle, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW
    ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
    GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Dec 23, 2024 08:06:39.799082041 CET1.1.1.1192.168.2.60x1487No error (0)g-bing-com.ax-0001.ax-msedge.netax-0001.ax-msedge.netCNAME (Canonical name)IN (0x0001)false
    Dec 23, 2024 08:06:39.799082041 CET1.1.1.1192.168.2.60x1487No error (0)ax-0001.ax-msedge.net150.171.27.10A (IP address)IN (0x0001)false
    Dec 23, 2024 08:06:39.799082041 CET1.1.1.1192.168.2.60x1487No error (0)ax-0001.ax-msedge.net150.171.28.10A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Target ID:1
    Start time:02:06:17
    Start date:23/12/2024
    Path:C:\Users\user\Desktop\vRWw6y4Pj2.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\vRWw6y4Pj2.exe"
    Imagebase:0x7ff7079f0000
    File size:12'644'226 bytes
    MD5 hash:EF9B7B7B887DE914FBFF13CD604C7535
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:5.2%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:19.4%
      Total number of Nodes:2000
      Total number of Limit Nodes:26
      execution_graph 18428 7ff707a109c0 18439 7ff707a166f4 18428->18439 18440 7ff707a16701 18439->18440 18441 7ff707a09c58 __free_lconv_num 11 API calls 18440->18441 18442 7ff707a1671d 18440->18442 18441->18440 18443 7ff707a09c58 __free_lconv_num 11 API calls 18442->18443 18444 7ff707a109c9 18442->18444 18443->18442 18445 7ff707a0f5e8 EnterCriticalSection 18444->18445 19814 7ff707a04720 19815 7ff707a0472b 19814->19815 19823 7ff707a0e5b4 19815->19823 19836 7ff707a0f5e8 EnterCriticalSection 19823->19836 19841 7ff707a0b830 19852 7ff707a0f5e8 EnterCriticalSection 19841->19852 18453 7ff707a0ec9c 18454 7ff707a0ee8e 18453->18454 18456 7ff707a0ecde _isindst 18453->18456 18455 7ff707a043f4 _get_daylight 11 API calls 18454->18455 18473 7ff707a0ee7e 18455->18473 18456->18454 18459 7ff707a0ed5e _isindst 18456->18459 18457 7ff7079fb870 _log10_special 8 API calls 18458 7ff707a0eea9 18457->18458 18474 7ff707a154a4 18459->18474 18464 7ff707a0eeba 18466 7ff707a09c10 _isindst 17 API calls 18464->18466 18468 7ff707a0eece 18466->18468 18471 7ff707a0edbb 18471->18473 18498 7ff707a154e8 18471->18498 18473->18457 18475 7ff707a0ed7c 18474->18475 18476 7ff707a154b3 18474->18476 18480 7ff707a148a8 18475->18480 18505 7ff707a0f5e8 EnterCriticalSection 18476->18505 18481 7ff707a0ed91 18480->18481 18482 7ff707a148b1 18480->18482 18481->18464 18486 7ff707a148d8 18481->18486 18483 7ff707a043f4 _get_daylight 11 API calls 18482->18483 18484 7ff707a148b6 18483->18484 18485 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 18484->18485 18485->18481 18487 7ff707a0eda2 18486->18487 18488 7ff707a148e1 18486->18488 18487->18464 18492 7ff707a14908 18487->18492 18489 7ff707a043f4 _get_daylight 11 API calls 18488->18489 18490 7ff707a148e6 18489->18490 18491 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 18490->18491 18491->18487 18493 7ff707a0edb3 18492->18493 18494 7ff707a14911 18492->18494 18493->18464 18493->18471 18495 7ff707a043f4 _get_daylight 11 API calls 18494->18495 18496 7ff707a14916 18495->18496 18497 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 18496->18497 18497->18493 18506 7ff707a0f5e8 EnterCriticalSection 18498->18506 18795 7ff707a1a10e 18796 7ff707a1a11d 18795->18796 18798 7ff707a1a127 18795->18798 18799 7ff707a0f648 LeaveCriticalSection 18796->18799 15841 7ff7079ffdfc 15842 7ff7079ffe2c 15841->15842 15845 7ff7079ffb4c 15842->15845 15844 7ff7079ffe4a 15846 7ff7079ffb6c 15845->15846 15847 7ff7079ffb99 15845->15847 15846->15847 15848 7ff7079ffb76 15846->15848 15849 7ff7079ffba1 15846->15849 15847->15844 15851 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 15848->15851 15852 7ff7079ffa8c 15849->15852 15851->15847 15859 7ff707a0477c EnterCriticalSection 15852->15859 15628 7ff707a08c79 15640 7ff707a096e8 15628->15640 15645 7ff707a0a460 GetLastError 15640->15645 15646 7ff707a0a4a1 FlsSetValue 15645->15646 15647 7ff707a0a484 FlsGetValue 15645->15647 15649 7ff707a0a4b3 15646->15649 15664 7ff707a0a491 SetLastError 15646->15664 15648 7ff707a0a49b 15647->15648 15647->15664 15648->15646 15676 7ff707a0dea8 15649->15676 15652 7ff707a096f1 15667 7ff707a09814 15652->15667 15653 7ff707a0a52d 15655 7ff707a09814 __FrameHandler3::FrameUnwindToEmptyState 38 API calls 15653->15655 15654 7ff707a0a4c2 15656 7ff707a0a4e0 FlsSetValue 15654->15656 15657 7ff707a0a4d0 FlsSetValue 15654->15657 15660 7ff707a0a532 15655->15660 15658 7ff707a0a4ec FlsSetValue 15656->15658 15659 7ff707a0a4fe 15656->15659 15661 7ff707a0a4d9 15657->15661 15658->15661 15689 7ff707a0a204 15659->15689 15683 7ff707a09c58 15661->15683 15664->15652 15664->15653 15737 7ff707a12960 15667->15737 15682 7ff707a0deb9 _get_daylight 15676->15682 15677 7ff707a0df0a 15697 7ff707a043f4 15677->15697 15678 7ff707a0deee HeapAlloc 15680 7ff707a0df08 15678->15680 15678->15682 15680->15654 15682->15677 15682->15678 15694 7ff707a128a0 15682->15694 15684 7ff707a09c5d HeapFree 15683->15684 15685 7ff707a09c8c 15683->15685 15684->15685 15686 7ff707a09c78 GetLastError 15684->15686 15685->15664 15687 7ff707a09c85 __free_lconv_num 15686->15687 15688 7ff707a043f4 _get_daylight 9 API calls 15687->15688 15688->15685 15723 7ff707a0a0dc 15689->15723 15700 7ff707a128e0 15694->15700 15706 7ff707a0a5d8 GetLastError 15697->15706 15699 7ff707a043fd 15699->15680 15705 7ff707a0f5e8 EnterCriticalSection 15700->15705 15707 7ff707a0a619 FlsSetValue 15706->15707 15712 7ff707a0a5fc 15706->15712 15708 7ff707a0a62b 15707->15708 15711 7ff707a0a609 15707->15711 15710 7ff707a0dea8 _get_daylight 5 API calls 15708->15710 15709 7ff707a0a685 SetLastError 15709->15699 15713 7ff707a0a63a 15710->15713 15711->15709 15712->15707 15712->15711 15714 7ff707a0a658 FlsSetValue 15713->15714 15715 7ff707a0a648 FlsSetValue 15713->15715 15717 7ff707a0a664 FlsSetValue 15714->15717 15718 7ff707a0a676 15714->15718 15716 7ff707a0a651 15715->15716 15720 7ff707a09c58 __free_lconv_num 5 API calls 15716->15720 15717->15716 15719 7ff707a0a204 _get_daylight 5 API calls 15718->15719 15721 7ff707a0a67e 15719->15721 15720->15711 15722 7ff707a09c58 __free_lconv_num 5 API calls 15721->15722 15722->15709 15735 7ff707a0f5e8 EnterCriticalSection 15723->15735 15771 7ff707a12918 15737->15771 15776 7ff707a0f5e8 EnterCriticalSection 15771->15776 15860 7ff7079fbf5c 15881 7ff7079fc12c 15860->15881 15863 7ff7079fc0a8 16008 7ff7079fc44c IsProcessorFeaturePresent 15863->16008 15864 7ff7079fbf78 __scrt_acquire_startup_lock 15866 7ff7079fc0b2 15864->15866 15872 7ff7079fbf96 __scrt_release_startup_lock 15864->15872 15867 7ff7079fc44c 7 API calls 15866->15867 15869 7ff7079fc0bd __FrameHandler3::FrameUnwindToEmptyState 15867->15869 15868 7ff7079fbfbb 15870 7ff7079fc041 15887 7ff7079fc594 15870->15887 15872->15868 15872->15870 15997 7ff707a08e44 15872->15997 15873 7ff7079fc046 15890 7ff7079f1000 15873->15890 15878 7ff7079fc069 15878->15869 16004 7ff7079fc2b0 15878->16004 15882 7ff7079fc134 15881->15882 15883 7ff7079fc140 __scrt_dllmain_crt_thread_attach 15882->15883 15884 7ff7079fc14d 15883->15884 15886 7ff7079fbf70 15883->15886 15884->15886 16015 7ff7079fcba8 15884->16015 15886->15863 15886->15864 16042 7ff707a197e0 15887->16042 15889 7ff7079fc5ab GetStartupInfoW 15889->15873 15891 7ff7079f1009 15890->15891 16044 7ff707a04794 15891->16044 15893 7ff7079f352b 16051 7ff7079f33e0 15893->16051 15897 7ff7079fb870 _log10_special 8 API calls 15899 7ff7079f372a 15897->15899 16002 7ff7079fc5d8 GetModuleHandleW 15899->16002 15900 7ff7079f3736 16113 7ff7079f3f70 15900->16113 15901 7ff7079f356c 16147 7ff7079f1bf0 15901->16147 15905 7ff7079f3785 16136 7ff7079f25f0 15905->16136 15909 7ff7079f365f __std_exception_copy 15915 7ff7079f3844 15909->15915 15919 7ff7079f7e10 14 API calls 15909->15919 15910 7ff7079f3538 15910->15897 15911 7ff7079f3778 15912 7ff7079f379f 15911->15912 15913 7ff7079f377d 15911->15913 15914 7ff7079f1bf0 49 API calls 15912->15914 16132 7ff7079ff36c 15913->16132 15917 7ff7079f37be 15914->15917 16218 7ff7079f3e90 15915->16218 15927 7ff7079f18f0 115 API calls 15917->15927 15918 7ff7079f3588 16151 7ff7079f7e10 15918->16151 15921 7ff7079f36ae 15919->15921 16164 7ff7079f7f80 15921->16164 15922 7ff7079f3852 15924 7ff7079f3865 15922->15924 15925 7ff7079f3871 15922->15925 16221 7ff7079f3fe0 15924->16221 15926 7ff7079f1bf0 49 API calls 15925->15926 15943 7ff7079f3805 __std_exception_copy 15926->15943 15930 7ff7079f37df 15927->15930 15928 7ff7079f36bd 15931 7ff7079f380f 15928->15931 15935 7ff7079f36cf 15928->15935 15930->15918 15934 7ff7079f37ef 15930->15934 16169 7ff7079f8400 15931->16169 15938 7ff7079f25f0 53 API calls 15934->15938 15939 7ff7079f1bf0 49 API calls 15935->15939 15937 7ff7079f389e SetDllDirectoryW 15946 7ff7079f38c3 15937->15946 15938->15910 15940 7ff7079f36f1 15939->15940 15940->15943 15944 7ff7079f36fc 15940->15944 16224 7ff7079f86b0 15943->16224 15947 7ff7079f25f0 53 API calls 15944->15947 15949 7ff7079f3a50 15946->15949 16229 7ff7079f6560 15946->16229 15947->15910 15951 7ff7079f3a7d 15949->15951 15952 7ff7079f3a5a PostMessageW GetMessageW 15949->15952 16324 7ff7079f3080 15951->16324 15952->15951 15955 7ff7079f38ea 15957 7ff7079f3947 15955->15957 15959 7ff7079f3901 15955->15959 16249 7ff7079f65a0 15955->16249 15957->15949 15963 7ff7079f395c 15957->15963 15972 7ff7079f3905 15959->15972 16270 7ff7079f6970 15959->16270 16304 7ff7079f30e0 15963->16304 15967 7ff7079f6780 FreeLibrary 15970 7ff7079f3aa3 15967->15970 15971 7ff7079f396c 16323 7ff7079f83e0 LocalFree 15971->16323 15972->15957 16286 7ff7079f2870 15972->16286 15998 7ff707a08e5b 15997->15998 15999 7ff707a08e7c 15997->15999 15998->15870 16000 7ff707a096e8 45 API calls 15999->16000 16001 7ff707a08e81 16000->16001 16003 7ff7079fc5e9 16002->16003 16003->15878 16006 7ff7079fc2c1 16004->16006 16005 7ff7079fc080 16005->15868 16006->16005 16007 7ff7079fcba8 7 API calls 16006->16007 16007->16005 16009 7ff7079fc472 memcpy_s __FrameHandler3::FrameUnwindToEmptyState 16008->16009 16010 7ff7079fc491 RtlCaptureContext RtlLookupFunctionEntry 16009->16010 16011 7ff7079fc4f6 memcpy_s 16010->16011 16012 7ff7079fc4ba RtlVirtualUnwind 16010->16012 16013 7ff7079fc528 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16011->16013 16012->16011 16014 7ff7079fc576 __FrameHandler3::FrameUnwindToEmptyState 16013->16014 16014->15866 16016 7ff7079fcbb0 16015->16016 16017 7ff7079fcbba 16015->16017 16021 7ff7079fcf44 16016->16021 16017->15886 16022 7ff7079fcf53 16021->16022 16023 7ff7079fcbb5 16021->16023 16029 7ff7079fd180 16022->16029 16025 7ff7079fcfb0 16023->16025 16026 7ff7079fcfdb 16025->16026 16027 7ff7079fcfdf 16026->16027 16028 7ff7079fcfbe DeleteCriticalSection 16026->16028 16027->16017 16028->16026 16033 7ff7079fcfe8 16029->16033 16034 7ff7079fd0d2 TlsFree 16033->16034 16040 7ff7079fd02c __vcrt_FlsAlloc 16033->16040 16035 7ff7079fd05a LoadLibraryExW 16037 7ff7079fd07b GetLastError 16035->16037 16038 7ff7079fd0f9 16035->16038 16036 7ff7079fd119 GetProcAddress 16036->16034 16037->16040 16038->16036 16039 7ff7079fd110 FreeLibrary 16038->16039 16039->16036 16040->16034 16040->16035 16040->16036 16041 7ff7079fd09d LoadLibraryExW 16040->16041 16041->16038 16041->16040 16043 7ff707a197d0 16042->16043 16043->15889 16043->16043 16047 7ff707a0e790 16044->16047 16045 7ff707a0e7e3 16046 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16045->16046 16048 7ff707a0e80c 16046->16048 16047->16045 16049 7ff707a0e836 16047->16049 16048->15893 16337 7ff707a0e668 16049->16337 16345 7ff7079fbb70 16051->16345 16054 7ff7079f341b 16352 7ff7079f29e0 16054->16352 16055 7ff7079f3438 16347 7ff7079f85a0 FindFirstFileExW 16055->16347 16059 7ff7079f342e 16063 7ff7079fb870 _log10_special 8 API calls 16059->16063 16060 7ff7079f34a5 16371 7ff7079f8760 16060->16371 16061 7ff7079f344b 16362 7ff7079f8620 CreateFileW 16061->16362 16066 7ff7079f34dd 16063->16066 16066->15910 16073 7ff7079f18f0 16066->16073 16067 7ff7079f34b3 16067->16059 16071 7ff7079f26c0 49 API calls 16067->16071 16068 7ff7079f3474 __vcrt_FlsAlloc 16068->16060 16069 7ff7079f345c 16365 7ff7079f26c0 16069->16365 16071->16059 16074 7ff7079f3f70 108 API calls 16073->16074 16075 7ff7079f1925 16074->16075 16076 7ff7079f1bb6 16075->16076 16078 7ff7079f76a0 83 API calls 16075->16078 16077 7ff7079fb870 _log10_special 8 API calls 16076->16077 16079 7ff7079f1bd1 16077->16079 16080 7ff7079f196b 16078->16080 16079->15900 16079->15901 16112 7ff7079f199c 16080->16112 16751 7ff7079ff9f4 16080->16751 16082 7ff7079ff36c 74 API calls 16082->16076 16083 7ff7079f1985 16084 7ff7079f19a1 16083->16084 16085 7ff7079f1989 16083->16085 16772 7ff7079ff6bc 16084->16772 16755 7ff7079f2760 16085->16755 16089 7ff7079f19bf 16091 7ff7079f2760 53 API calls 16089->16091 16090 7ff7079f19d7 16092 7ff7079f1a06 16090->16092 16093 7ff7079f19ee 16090->16093 16091->16112 16094 7ff7079f1bf0 49 API calls 16092->16094 16095 7ff7079f2760 53 API calls 16093->16095 16096 7ff7079f1a1d 16094->16096 16095->16112 16097 7ff7079f1bf0 49 API calls 16096->16097 16098 7ff7079f1a68 16097->16098 16099 7ff7079ff9f4 73 API calls 16098->16099 16100 7ff7079f1a8c 16099->16100 16101 7ff7079f1aa1 16100->16101 16102 7ff7079f1ab9 16100->16102 16103 7ff7079f2760 53 API calls 16101->16103 16104 7ff7079ff6bc _fread_nolock 53 API calls 16102->16104 16103->16112 16105 7ff7079f1ace 16104->16105 16106 7ff7079f1ad4 16105->16106 16107 7ff7079f1aec 16105->16107 16108 7ff7079f2760 53 API calls 16106->16108 16775 7ff7079ff430 16107->16775 16108->16112 16111 7ff7079f25f0 53 API calls 16111->16112 16112->16082 16114 7ff7079f3f7c 16113->16114 16115 7ff7079f86b0 2 API calls 16114->16115 16116 7ff7079f3fa4 16115->16116 16117 7ff7079f86b0 2 API calls 16116->16117 16118 7ff7079f3fb7 16117->16118 16984 7ff707a052a4 16118->16984 16121 7ff7079fb870 _log10_special 8 API calls 16122 7ff7079f3746 16121->16122 16122->15905 16123 7ff7079f76a0 16122->16123 16124 7ff7079f76c4 16123->16124 16125 7ff7079ff9f4 73 API calls 16124->16125 16126 7ff7079f779b __std_exception_copy 16124->16126 16127 7ff7079f76e0 16125->16127 16126->15911 16127->16126 17400 7ff707a06bd8 16127->17400 16129 7ff7079ff9f4 73 API calls 16131 7ff7079f76f5 16129->16131 16130 7ff7079ff6bc _fread_nolock 53 API calls 16130->16131 16131->16126 16131->16129 16131->16130 16133 7ff7079ff39c 16132->16133 17415 7ff7079ff148 16133->17415 16135 7ff7079ff3b5 16135->15905 16137 7ff7079f262a 16136->16137 16138 7ff707a03ca4 49 API calls 16137->16138 16139 7ff7079f2652 16138->16139 16140 7ff7079f86b0 2 API calls 16139->16140 16141 7ff7079f266a 16140->16141 16142 7ff7079f268e MessageBoxA 16141->16142 16143 7ff7079f2677 MessageBoxW 16141->16143 16144 7ff7079f26a0 16142->16144 16143->16144 16145 7ff7079fb870 _log10_special 8 API calls 16144->16145 16146 7ff7079f26b0 16145->16146 16146->15910 16148 7ff7079f1c15 16147->16148 16149 7ff707a03ca4 49 API calls 16148->16149 16150 7ff7079f1c38 16149->16150 16150->15918 16152 7ff7079f7e1a 16151->16152 16153 7ff7079f86b0 2 API calls 16152->16153 16154 7ff7079f7e39 GetEnvironmentVariableW 16153->16154 16155 7ff7079f7e56 ExpandEnvironmentStringsW 16154->16155 16156 7ff7079f7ea2 16154->16156 16155->16156 16158 7ff7079f7e78 16155->16158 16157 7ff7079fb870 _log10_special 8 API calls 16156->16157 16159 7ff7079f7eb4 16157->16159 16160 7ff7079f8760 2 API calls 16158->16160 16159->15909 16161 7ff7079f7e8a 16160->16161 16162 7ff7079fb870 _log10_special 8 API calls 16161->16162 16163 7ff7079f7e9a 16162->16163 16163->15909 16165 7ff7079f86b0 2 API calls 16164->16165 16166 7ff7079f7f94 16165->16166 17426 7ff707a07548 16166->17426 16168 7ff7079f7fa6 __std_exception_copy 16168->15928 16170 7ff7079f8415 16169->16170 17444 7ff7079f7b50 GetCurrentProcess OpenProcessToken 16170->17444 16173 7ff7079f7b50 7 API calls 16174 7ff7079f8441 16173->16174 16175 7ff7079f8474 16174->16175 16176 7ff7079f845a 16174->16176 16178 7ff7079f2590 48 API calls 16175->16178 16177 7ff7079f2590 48 API calls 16176->16177 16179 7ff7079f8472 16177->16179 16180 7ff7079f8487 LocalFree LocalFree 16178->16180 16179->16180 16181 7ff7079f84a3 16180->16181 16183 7ff7079f84af 16180->16183 17454 7ff7079f2940 16181->17454 16184 7ff7079fb870 _log10_special 8 API calls 16183->16184 16185 7ff7079f3814 16184->16185 16186 7ff7079f7c40 16185->16186 16187 7ff7079f7c58 16186->16187 16188 7ff7079f7cda GetTempPathW 16187->16188 16190 7ff7079f7e10 14 API calls 16187->16190 16189 7ff7079f7cef 16188->16189 17492 7ff7079f2530 16189->17492 16191 7ff7079f7c88 16190->16191 17460 7ff7079f77d0 16191->17460 16199 7ff7079f7d08 __std_exception_copy 16207 7ff7079f7d45 __std_exception_copy 16199->16207 17496 7ff707a07e80 16199->17496 16209 7ff7079f86b0 2 API calls 16207->16209 16217 7ff7079f7cc8 __std_exception_copy 16207->16217 16219 7ff7079f1bf0 49 API calls 16218->16219 16220 7ff7079f3ead 16219->16220 16220->15922 16222 7ff7079f1bf0 49 API calls 16221->16222 16223 7ff7079f4010 16222->16223 16223->15943 16225 7ff7079f86d2 MultiByteToWideChar 16224->16225 16226 7ff7079f86f6 16224->16226 16225->16226 16228 7ff7079f870c __std_exception_copy 16225->16228 16227 7ff7079f8713 MultiByteToWideChar 16226->16227 16226->16228 16227->16228 16228->15937 16230 7ff7079f6575 16229->16230 16231 7ff7079f38d5 16230->16231 16232 7ff7079f2760 53 API calls 16230->16232 16233 7ff7079f6b00 16231->16233 16232->16231 16234 7ff7079f6b30 16233->16234 16237 7ff7079f6b4a __std_exception_copy 16233->16237 16234->16237 17730 7ff7079f1440 16234->17730 16236 7ff7079f6b54 16236->16237 16238 7ff7079f3fe0 49 API calls 16236->16238 16237->15955 16239 7ff7079f6b76 16238->16239 16240 7ff7079f3fe0 49 API calls 16239->16240 16243 7ff7079f6b7b 16239->16243 16242 7ff7079f6b9a 16240->16242 16241 7ff7079f2870 53 API calls 16241->16237 16242->16243 16244 7ff7079f3fe0 49 API calls 16242->16244 16243->16241 16245 7ff7079f6bb6 16244->16245 16245->16243 16246 7ff7079f6bbf 16245->16246 16247 7ff7079f25f0 53 API calls 16246->16247 16248 7ff7079f6c2f __std_exception_copy memcpy_s 16246->16248 16247->16237 16248->15955 16266 7ff7079f65bc 16249->16266 16250 7ff7079fb870 _log10_special 8 API calls 16251 7ff7079f66f1 16250->16251 16251->15959 16253 7ff7079f675d 16255 7ff7079f25f0 53 API calls 16253->16255 16254 7ff7079f1bf0 49 API calls 16254->16266 16269 7ff7079f66df 16255->16269 16256 7ff7079f674a 16257 7ff7079f25f0 53 API calls 16256->16257 16257->16269 16259 7ff7079f670d 16261 7ff7079f25f0 53 API calls 16259->16261 16261->16269 16262 7ff7079f2870 53 API calls 16262->16266 16263 7ff7079f6737 16265 7ff7079f25f0 53 API calls 16263->16265 16265->16269 16266->16253 16266->16254 16266->16256 16266->16259 16266->16262 16266->16263 16267 7ff7079f6720 16266->16267 16266->16269 17776 7ff7079f17e0 16266->17776 17780 7ff7079f3f10 16266->17780 17786 7ff7079f7530 16266->17786 17797 7ff7079f15c0 16266->17797 16268 7ff7079f25f0 53 API calls 16267->16268 16268->16269 16269->16250 17889 7ff7079f81a0 16270->17889 16272 7ff7079f6989 16273 7ff7079f81a0 3 API calls 16272->16273 16274 7ff7079f699c 16273->16274 16275 7ff7079f69cf 16274->16275 16276 7ff7079f69b4 16274->16276 16277 7ff7079f25f0 53 API calls 16275->16277 17893 7ff7079f6ea0 GetProcAddress 16276->17893 16279 7ff7079f3916 16277->16279 16279->15972 16280 7ff7079f6cd0 16279->16280 16281 7ff7079f6ced 16280->16281 16282 7ff7079f25f0 53 API calls 16281->16282 16285 7ff7079f6d58 16281->16285 16283 7ff7079f6d40 16282->16283 16284 7ff7079f6780 FreeLibrary 16283->16284 16284->16285 16285->15972 16287 7ff7079f28aa 16286->16287 16288 7ff707a03ca4 49 API calls 16287->16288 16289 7ff7079f28d2 16288->16289 16290 7ff7079f86b0 2 API calls 16289->16290 16291 7ff7079f28ea 16290->16291 16292 7ff7079f290e MessageBoxA 16291->16292 16293 7ff7079f28f7 MessageBoxW 16291->16293 16294 7ff7079f2920 16292->16294 16293->16294 16295 7ff7079fb870 _log10_special 8 API calls 16294->16295 16296 7ff7079f2930 16295->16296 16297 7ff7079f6780 16296->16297 16298 7ff7079f68d6 16297->16298 16299 7ff7079f6792 16297->16299 16298->15957 16300 7ff7079f68aa 16299->16300 17956 7ff7079f8180 FreeLibrary 16299->17956 16303 7ff7079f68c2 16300->16303 17957 7ff7079f8180 FreeLibrary 16300->17957 16303->15957 16316 7ff7079f30ee memcpy_s 16304->16316 16305 7ff7079fb870 _log10_special 8 API calls 16307 7ff7079f338e 16305->16307 16306 7ff7079f32e7 16306->16305 16307->15910 16307->15971 16309 7ff7079f1bf0 49 API calls 16309->16316 16310 7ff7079f3309 16312 7ff7079f25f0 53 API calls 16310->16312 16311 7ff7079f3f10 10 API calls 16311->16316 16312->16306 16313 7ff7079f7530 52 API calls 16313->16316 16315 7ff7079f32e9 16318 7ff7079f25f0 53 API calls 16315->16318 16316->16306 16316->16309 16316->16310 16316->16311 16316->16313 16316->16315 16317 7ff7079f2870 53 API calls 16316->16317 16319 7ff7079f15c0 118 API calls 16316->16319 16321 7ff7079f32f7 16316->16321 17958 7ff7079f68e0 16316->17958 17962 7ff7079f3b40 16316->17962 18006 7ff7079f3e00 16316->18006 16317->16316 16318->16306 16319->16316 16322 7ff7079f25f0 53 API calls 16321->16322 16322->16306 18068 7ff7079f5af0 16324->18068 16328 7ff7079f30a1 16332 7ff7079f30b9 16328->16332 18138 7ff7079f5800 16328->18138 16333 7ff7079f33a0 16332->16333 16334 7ff7079f33ae 16333->16334 16335 7ff7079f33bf 16334->16335 18356 7ff7079f8180 FreeLibrary 16334->18356 16335->15967 16344 7ff707a0477c EnterCriticalSection 16337->16344 16346 7ff7079f33ec GetModuleFileNameW 16345->16346 16346->16054 16346->16055 16348 7ff7079f85f2 16347->16348 16349 7ff7079f85df FindClose 16347->16349 16350 7ff7079fb870 _log10_special 8 API calls 16348->16350 16349->16348 16351 7ff7079f3442 16350->16351 16351->16060 16351->16061 16353 7ff7079fbb70 16352->16353 16354 7ff7079f29fc GetLastError 16353->16354 16355 7ff7079f2a29 16354->16355 16376 7ff707a03ef8 16355->16376 16360 7ff7079fb870 _log10_special 8 API calls 16361 7ff7079f2ae5 16360->16361 16361->16059 16363 7ff7079f8660 GetFinalPathNameByHandleW CloseHandle 16362->16363 16364 7ff7079f3458 16362->16364 16363->16364 16364->16068 16364->16069 16366 7ff7079f26fa 16365->16366 16367 7ff707a03ef8 48 API calls 16366->16367 16368 7ff7079f2722 MessageBoxW 16367->16368 16369 7ff7079fb870 _log10_special 8 API calls 16368->16369 16370 7ff7079f274c 16369->16370 16370->16059 16372 7ff7079f878a WideCharToMultiByte 16371->16372 16374 7ff7079f87b5 16371->16374 16372->16374 16375 7ff7079f87cb __std_exception_copy 16372->16375 16373 7ff7079f87d2 WideCharToMultiByte 16373->16375 16374->16373 16374->16375 16375->16067 16377 7ff707a03f52 16376->16377 16378 7ff707a03f77 16377->16378 16379 7ff707a03fb3 16377->16379 16380 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16378->16380 16398 7ff707a022b0 16379->16398 16382 7ff707a03fa1 16380->16382 16384 7ff7079fb870 _log10_special 8 API calls 16382->16384 16383 7ff707a04094 16385 7ff707a09c58 __free_lconv_num 11 API calls 16383->16385 16387 7ff7079f2a54 FormatMessageW 16384->16387 16385->16382 16394 7ff7079f2590 16387->16394 16388 7ff707a040ba 16388->16383 16391 7ff707a040c4 16388->16391 16389 7ff707a04069 16392 7ff707a09c58 __free_lconv_num 11 API calls 16389->16392 16390 7ff707a04060 16390->16383 16390->16389 16393 7ff707a09c58 __free_lconv_num 11 API calls 16391->16393 16392->16382 16393->16382 16395 7ff7079f25b5 16394->16395 16396 7ff707a03ef8 48 API calls 16395->16396 16397 7ff7079f25d8 MessageBoxW 16396->16397 16397->16360 16399 7ff707a022ee 16398->16399 16400 7ff707a022de 16398->16400 16401 7ff707a022f7 16399->16401 16406 7ff707a02325 16399->16406 16402 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16400->16402 16403 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16401->16403 16404 7ff707a0231d 16402->16404 16403->16404 16404->16383 16404->16388 16404->16389 16404->16390 16406->16400 16406->16404 16409 7ff707a02cc4 16406->16409 16442 7ff707a02710 16406->16442 16479 7ff707a01ea0 16406->16479 16410 7ff707a02d06 16409->16410 16411 7ff707a02d77 16409->16411 16412 7ff707a02da1 16410->16412 16413 7ff707a02d0c 16410->16413 16414 7ff707a02dd0 16411->16414 16415 7ff707a02d7c 16411->16415 16502 7ff707a01074 16412->16502 16416 7ff707a02d11 16413->16416 16417 7ff707a02d40 16413->16417 16421 7ff707a02de7 16414->16421 16424 7ff707a02dda 16414->16424 16425 7ff707a02ddf 16414->16425 16418 7ff707a02db1 16415->16418 16419 7ff707a02d7e 16415->16419 16416->16421 16422 7ff707a02d17 16416->16422 16417->16422 16417->16425 16509 7ff707a00c64 16418->16509 16423 7ff707a02d20 16419->16423 16431 7ff707a02d8d 16419->16431 16516 7ff707a039cc 16421->16516 16422->16423 16429 7ff707a02d52 16422->16429 16437 7ff707a02d3b 16422->16437 16440 7ff707a02e10 16423->16440 16482 7ff707a03478 16423->16482 16424->16412 16424->16425 16425->16440 16520 7ff707a01484 16425->16520 16429->16440 16492 7ff707a037b4 16429->16492 16431->16412 16432 7ff707a02d92 16431->16432 16432->16440 16498 7ff707a03878 16432->16498 16434 7ff7079fb870 _log10_special 8 API calls 16436 7ff707a0310a 16434->16436 16436->16406 16437->16440 16441 7ff707a02ffc 16437->16441 16527 7ff707a03ae0 16437->16527 16440->16434 16441->16440 16533 7ff707a0dd18 16441->16533 16443 7ff707a02734 16442->16443 16444 7ff707a0271e 16442->16444 16447 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16443->16447 16468 7ff707a02774 16443->16468 16445 7ff707a02d06 16444->16445 16446 7ff707a02d77 16444->16446 16444->16468 16448 7ff707a02d0c 16445->16448 16450 7ff707a02da1 16445->16450 16449 7ff707a02d7c 16446->16449 16455 7ff707a02dd0 16446->16455 16447->16468 16451 7ff707a02d11 16448->16451 16452 7ff707a02d40 16448->16452 16453 7ff707a02db1 16449->16453 16454 7ff707a02d7e 16449->16454 16456 7ff707a01074 38 API calls 16450->16456 16457 7ff707a02de7 16451->16457 16458 7ff707a02d17 16451->16458 16452->16458 16461 7ff707a02ddf 16452->16461 16463 7ff707a00c64 38 API calls 16453->16463 16459 7ff707a02d20 16454->16459 16467 7ff707a02d8d 16454->16467 16455->16457 16460 7ff707a02dda 16455->16460 16455->16461 16474 7ff707a02d3b 16456->16474 16462 7ff707a039cc 45 API calls 16457->16462 16458->16459 16465 7ff707a02d52 16458->16465 16458->16474 16464 7ff707a03478 47 API calls 16459->16464 16477 7ff707a02e10 16459->16477 16460->16450 16460->16461 16466 7ff707a01484 38 API calls 16461->16466 16461->16477 16462->16474 16463->16474 16464->16474 16469 7ff707a037b4 46 API calls 16465->16469 16465->16477 16466->16474 16467->16450 16470 7ff707a02d92 16467->16470 16468->16406 16469->16474 16472 7ff707a03878 37 API calls 16470->16472 16470->16477 16471 7ff7079fb870 _log10_special 8 API calls 16473 7ff707a0310a 16471->16473 16472->16474 16473->16406 16475 7ff707a03ae0 45 API calls 16474->16475 16474->16477 16478 7ff707a02ffc 16474->16478 16475->16478 16476 7ff707a0dd18 46 API calls 16476->16478 16477->16471 16478->16476 16478->16477 16734 7ff707a002e8 16479->16734 16483 7ff707a0349e 16482->16483 16545 7ff7079ffea0 16483->16545 16488 7ff707a035e3 16490 7ff707a03ae0 45 API calls 16488->16490 16491 7ff707a03671 16488->16491 16489 7ff707a03ae0 45 API calls 16489->16488 16490->16491 16491->16437 16493 7ff707a037e9 16492->16493 16494 7ff707a03807 16493->16494 16495 7ff707a03ae0 45 API calls 16493->16495 16497 7ff707a0382e 16493->16497 16496 7ff707a0dd18 46 API calls 16494->16496 16495->16494 16496->16497 16497->16437 16499 7ff707a03899 16498->16499 16500 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16499->16500 16501 7ff707a038ca 16499->16501 16500->16501 16501->16437 16503 7ff707a010a7 16502->16503 16504 7ff707a010d6 16503->16504 16506 7ff707a01193 16503->16506 16508 7ff707a01113 16504->16508 16688 7ff7079fff48 16504->16688 16507 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16506->16507 16507->16508 16508->16437 16510 7ff707a00c97 16509->16510 16511 7ff707a00cc6 16510->16511 16513 7ff707a00d83 16510->16513 16512 7ff7079fff48 12 API calls 16511->16512 16515 7ff707a00d03 16511->16515 16512->16515 16514 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16513->16514 16514->16515 16515->16437 16517 7ff707a03a0f 16516->16517 16519 7ff707a03a13 __crtLCMapStringW 16517->16519 16696 7ff707a03a68 16517->16696 16519->16437 16521 7ff707a014b7 16520->16521 16522 7ff707a014e6 16521->16522 16524 7ff707a015a3 16521->16524 16523 7ff7079fff48 12 API calls 16522->16523 16526 7ff707a01523 16522->16526 16523->16526 16525 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16524->16525 16525->16526 16526->16437 16528 7ff707a03af7 16527->16528 16700 7ff707a0ccc8 16528->16700 16535 7ff707a0dd49 16533->16535 16540 7ff707a0dd57 16533->16540 16534 7ff707a0dd77 16537 7ff707a0dd88 16534->16537 16538 7ff707a0ddaf 16534->16538 16535->16534 16536 7ff707a03ae0 45 API calls 16535->16536 16535->16540 16536->16534 16724 7ff707a0f3b0 16537->16724 16538->16540 16541 7ff707a0ddd9 16538->16541 16542 7ff707a0de3a 16538->16542 16540->16441 16541->16540 16727 7ff707a0ebb0 16541->16727 16543 7ff707a0ebb0 _fread_nolock MultiByteToWideChar 16542->16543 16543->16540 16546 7ff7079ffec6 16545->16546 16547 7ff7079ffed7 16545->16547 16553 7ff707a0d880 16546->16553 16547->16546 16575 7ff707a0c90c 16547->16575 16550 7ff7079fff18 16552 7ff707a09c58 __free_lconv_num 11 API calls 16550->16552 16551 7ff707a09c58 __free_lconv_num 11 API calls 16551->16550 16552->16546 16554 7ff707a0d89d 16553->16554 16555 7ff707a0d8d0 16553->16555 16556 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16554->16556 16555->16554 16557 7ff707a0d902 16555->16557 16566 7ff707a035c1 16556->16566 16561 7ff707a0da15 16557->16561 16570 7ff707a0d94a 16557->16570 16558 7ff707a0db07 16615 7ff707a0cd6c 16558->16615 16560 7ff707a0dacd 16608 7ff707a0d104 16560->16608 16561->16558 16561->16560 16562 7ff707a0da9c 16561->16562 16564 7ff707a0da5f 16561->16564 16567 7ff707a0da55 16561->16567 16601 7ff707a0d3e4 16562->16601 16591 7ff707a0d614 16564->16591 16566->16488 16566->16489 16567->16560 16569 7ff707a0da5a 16567->16569 16569->16562 16569->16564 16570->16566 16582 7ff707a097b4 16570->16582 16573 7ff707a09c10 _isindst 17 API calls 16574 7ff707a0db64 16573->16574 16576 7ff707a0c957 16575->16576 16580 7ff707a0c91b _get_daylight 16575->16580 16577 7ff707a043f4 _get_daylight 11 API calls 16576->16577 16579 7ff7079fff04 16577->16579 16578 7ff707a0c93e HeapAlloc 16578->16579 16578->16580 16579->16550 16579->16551 16580->16576 16580->16578 16581 7ff707a128a0 _get_daylight 2 API calls 16580->16581 16581->16580 16583 7ff707a097cb 16582->16583 16584 7ff707a097c1 16582->16584 16585 7ff707a043f4 _get_daylight 11 API calls 16583->16585 16584->16583 16589 7ff707a097e6 16584->16589 16586 7ff707a097d2 16585->16586 16587 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16586->16587 16588 7ff707a097de 16587->16588 16588->16566 16588->16573 16589->16588 16590 7ff707a043f4 _get_daylight 11 API calls 16589->16590 16590->16586 16624 7ff707a133bc 16591->16624 16595 7ff707a0d6bc 16596 7ff707a0d6c0 16595->16596 16597 7ff707a0d711 16595->16597 16598 7ff707a0d6dc 16595->16598 16596->16566 16677 7ff707a0d200 16597->16677 16673 7ff707a0d4bc 16598->16673 16602 7ff707a133bc 38 API calls 16601->16602 16603 7ff707a0d42e 16602->16603 16604 7ff707a12e04 37 API calls 16603->16604 16605 7ff707a0d47e 16604->16605 16606 7ff707a0d482 16605->16606 16607 7ff707a0d4bc 45 API calls 16605->16607 16606->16566 16607->16606 16609 7ff707a133bc 38 API calls 16608->16609 16610 7ff707a0d14f 16609->16610 16611 7ff707a12e04 37 API calls 16610->16611 16612 7ff707a0d1a7 16611->16612 16613 7ff707a0d1ab 16612->16613 16614 7ff707a0d200 45 API calls 16612->16614 16613->16566 16614->16613 16616 7ff707a0cdb1 16615->16616 16617 7ff707a0cde4 16615->16617 16618 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16616->16618 16619 7ff707a0cdfc 16617->16619 16621 7ff707a0ce7d 16617->16621 16623 7ff707a0cddd memcpy_s 16618->16623 16620 7ff707a0d104 46 API calls 16619->16620 16620->16623 16622 7ff707a03ae0 45 API calls 16621->16622 16621->16623 16622->16623 16623->16566 16625 7ff707a1340f fegetenv 16624->16625 16626 7ff707a1713c 37 API calls 16625->16626 16630 7ff707a13462 16626->16630 16627 7ff707a1348f 16632 7ff707a097b4 __std_exception_copy 37 API calls 16627->16632 16628 7ff707a13552 16629 7ff707a1713c 37 API calls 16628->16629 16631 7ff707a1357c 16629->16631 16630->16628 16634 7ff707a1347d 16630->16634 16635 7ff707a1352c 16630->16635 16636 7ff707a1713c 37 API calls 16631->16636 16633 7ff707a1350d 16632->16633 16637 7ff707a14634 16633->16637 16643 7ff707a13515 16633->16643 16634->16627 16634->16628 16638 7ff707a097b4 __std_exception_copy 37 API calls 16635->16638 16639 7ff707a1358d 16636->16639 16640 7ff707a09c10 _isindst 17 API calls 16637->16640 16638->16633 16641 7ff707a17330 20 API calls 16639->16641 16642 7ff707a14649 16640->16642 16651 7ff707a135f6 memcpy_s 16641->16651 16644 7ff7079fb870 _log10_special 8 API calls 16643->16644 16645 7ff707a0d661 16644->16645 16669 7ff707a12e04 16645->16669 16646 7ff707a1399f memcpy_s 16647 7ff707a13637 memcpy_s 16662 7ff707a13f7b memcpy_s 16647->16662 16668 7ff707a13a93 memcpy_s 16647->16668 16648 7ff707a13cdf 16649 7ff707a12f20 37 API calls 16648->16649 16655 7ff707a143f7 16649->16655 16650 7ff707a13c8b 16650->16648 16652 7ff707a1464c memcpy_s 37 API calls 16650->16652 16651->16646 16651->16647 16653 7ff707a043f4 _get_daylight 11 API calls 16651->16653 16652->16648 16654 7ff707a13a70 16653->16654 16656 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16654->16656 16658 7ff707a1464c memcpy_s 37 API calls 16655->16658 16666 7ff707a14452 16655->16666 16656->16647 16657 7ff707a145d8 16661 7ff707a1713c 37 API calls 16657->16661 16658->16666 16659 7ff707a043f4 11 API calls _get_daylight 16659->16662 16660 7ff707a043f4 11 API calls _get_daylight 16660->16668 16661->16643 16662->16648 16662->16650 16662->16659 16667 7ff707a09bf0 37 API calls _invalid_parameter_noinfo 16662->16667 16663 7ff707a12f20 37 API calls 16663->16666 16664 7ff707a09bf0 37 API calls _invalid_parameter_noinfo 16664->16668 16665 7ff707a1464c memcpy_s 37 API calls 16665->16666 16666->16657 16666->16663 16666->16665 16667->16662 16668->16650 16668->16660 16668->16664 16670 7ff707a12e23 16669->16670 16671 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16670->16671 16672 7ff707a12e4e memcpy_s 16670->16672 16671->16672 16672->16595 16674 7ff707a0d4e8 memcpy_s 16673->16674 16675 7ff707a03ae0 45 API calls 16674->16675 16676 7ff707a0d5a2 memcpy_s 16674->16676 16675->16676 16676->16596 16678 7ff707a0d23b 16677->16678 16681 7ff707a0d288 memcpy_s 16677->16681 16679 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16678->16679 16680 7ff707a0d267 16679->16680 16680->16596 16682 7ff707a0d2f3 16681->16682 16684 7ff707a03ae0 45 API calls 16681->16684 16683 7ff707a097b4 __std_exception_copy 37 API calls 16682->16683 16687 7ff707a0d335 memcpy_s 16683->16687 16684->16682 16685 7ff707a09c10 _isindst 17 API calls 16686 7ff707a0d3e0 16685->16686 16687->16685 16689 7ff7079fff7f 16688->16689 16695 7ff7079fff6e 16688->16695 16690 7ff707a0c90c _fread_nolock 12 API calls 16689->16690 16689->16695 16691 7ff7079fffb0 16690->16691 16692 7ff707a09c58 __free_lconv_num 11 API calls 16691->16692 16694 7ff7079fffc4 16691->16694 16692->16694 16693 7ff707a09c58 __free_lconv_num 11 API calls 16693->16695 16694->16693 16695->16508 16697 7ff707a03a86 16696->16697 16698 7ff707a03a8e 16696->16698 16699 7ff707a03ae0 45 API calls 16697->16699 16698->16519 16699->16698 16701 7ff707a03b1f 16700->16701 16702 7ff707a0cce1 16700->16702 16704 7ff707a0cd34 16701->16704 16702->16701 16708 7ff707a12614 16702->16708 16705 7ff707a0cd4d 16704->16705 16706 7ff707a03b2f 16704->16706 16705->16706 16721 7ff707a11960 16705->16721 16706->16441 16709 7ff707a0a460 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 16708->16709 16710 7ff707a12623 16709->16710 16711 7ff707a1266e 16710->16711 16720 7ff707a0f5e8 EnterCriticalSection 16710->16720 16711->16701 16722 7ff707a0a460 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 16721->16722 16723 7ff707a11969 16722->16723 16730 7ff707a16098 16724->16730 16729 7ff707a0ebb9 MultiByteToWideChar 16727->16729 16733 7ff707a160fc 16730->16733 16731 7ff7079fb870 _log10_special 8 API calls 16732 7ff707a0f3cd 16731->16732 16732->16540 16733->16731 16735 7ff707a0032f 16734->16735 16736 7ff707a0031d 16734->16736 16738 7ff707a0033d 16735->16738 16743 7ff707a00379 16735->16743 16737 7ff707a043f4 _get_daylight 11 API calls 16736->16737 16739 7ff707a00322 16737->16739 16740 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16738->16740 16741 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16739->16741 16748 7ff707a0032d 16740->16748 16741->16748 16742 7ff707a006f5 16744 7ff707a043f4 _get_daylight 11 API calls 16742->16744 16742->16748 16743->16742 16745 7ff707a043f4 _get_daylight 11 API calls 16743->16745 16746 7ff707a00989 16744->16746 16747 7ff707a006ea 16745->16747 16749 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16746->16749 16750 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16747->16750 16748->16406 16749->16748 16750->16742 16752 7ff7079ffa24 16751->16752 16781 7ff7079ff784 16752->16781 16754 7ff7079ffa3d 16754->16083 16756 7ff7079f277c 16755->16756 16757 7ff707a043f4 _get_daylight 11 API calls 16756->16757 16758 7ff7079f2799 16757->16758 16793 7ff707a03ca4 16758->16793 16763 7ff7079f1bf0 49 API calls 16764 7ff7079f2807 16763->16764 16765 7ff7079f86b0 2 API calls 16764->16765 16766 7ff7079f281f 16765->16766 16767 7ff7079f2843 MessageBoxA 16766->16767 16768 7ff7079f282c MessageBoxW 16766->16768 16769 7ff7079f2855 16767->16769 16768->16769 16770 7ff7079fb870 _log10_special 8 API calls 16769->16770 16771 7ff7079f2865 16770->16771 16771->16112 16970 7ff7079ff6dc 16772->16970 16776 7ff7079f1b06 16775->16776 16777 7ff7079ff439 16775->16777 16776->16111 16776->16112 16778 7ff707a043f4 _get_daylight 11 API calls 16777->16778 16779 7ff7079ff43e 16778->16779 16780 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16779->16780 16780->16776 16782 7ff7079ff7ee 16781->16782 16783 7ff7079ff7ae 16781->16783 16782->16783 16785 7ff7079ff7fa 16782->16785 16784 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16783->16784 16787 7ff7079ff7d5 16784->16787 16792 7ff707a0477c EnterCriticalSection 16785->16792 16787->16754 16796 7ff707a03cfe 16793->16796 16794 7ff707a03d23 16795 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16794->16795 16799 7ff707a03d4d 16795->16799 16796->16794 16797 7ff707a03d5f 16796->16797 16823 7ff707a01f30 16797->16823 16801 7ff7079fb870 _log10_special 8 API calls 16799->16801 16800 7ff707a03e3c 16802 7ff707a09c58 __free_lconv_num 11 API calls 16800->16802 16803 7ff7079f27d8 16801->16803 16802->16799 16811 7ff707a04480 16803->16811 16805 7ff707a03e11 16808 7ff707a09c58 __free_lconv_num 11 API calls 16805->16808 16806 7ff707a03e60 16806->16800 16807 7ff707a03e6a 16806->16807 16810 7ff707a09c58 __free_lconv_num 11 API calls 16807->16810 16808->16799 16809 7ff707a03e08 16809->16800 16809->16805 16810->16799 16812 7ff707a0a5d8 _get_daylight 11 API calls 16811->16812 16813 7ff707a04497 16812->16813 16814 7ff707a0dea8 _get_daylight 11 API calls 16813->16814 16817 7ff707a044d7 16813->16817 16820 7ff7079f27df 16813->16820 16815 7ff707a044cc 16814->16815 16816 7ff707a09c58 __free_lconv_num 11 API calls 16815->16816 16816->16817 16817->16820 16961 7ff707a0df30 16817->16961 16820->16763 16821 7ff707a09c10 _isindst 17 API calls 16822 7ff707a0451c 16821->16822 16824 7ff707a01f6e 16823->16824 16825 7ff707a01f5e 16823->16825 16826 7ff707a01fa5 16824->16826 16827 7ff707a01f77 16824->16827 16828 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16825->16828 16826->16825 16830 7ff707a01f9d 16826->16830 16831 7ff707a03ae0 45 API calls 16826->16831 16833 7ff707a02254 16826->16833 16837 7ff707a028c0 16826->16837 16863 7ff707a02588 16826->16863 16893 7ff707a01e10 16826->16893 16829 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16827->16829 16828->16830 16829->16830 16830->16800 16830->16805 16830->16806 16830->16809 16831->16826 16835 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16833->16835 16835->16825 16838 7ff707a02975 16837->16838 16839 7ff707a02902 16837->16839 16842 7ff707a029cf 16838->16842 16843 7ff707a0297a 16838->16843 16840 7ff707a0299f 16839->16840 16841 7ff707a02908 16839->16841 16910 7ff707a00e70 16840->16910 16850 7ff707a0290d 16841->16850 16854 7ff707a029de 16841->16854 16842->16840 16842->16854 16861 7ff707a02938 16842->16861 16844 7ff707a029af 16843->16844 16845 7ff707a0297c 16843->16845 16917 7ff707a00a60 16844->16917 16847 7ff707a0291d 16845->16847 16853 7ff707a0298b 16845->16853 16862 7ff707a02a0d 16847->16862 16896 7ff707a03224 16847->16896 16850->16847 16852 7ff707a02950 16850->16852 16850->16861 16852->16862 16906 7ff707a036e0 16852->16906 16853->16840 16855 7ff707a02990 16853->16855 16854->16862 16924 7ff707a01280 16854->16924 16858 7ff707a03878 37 API calls 16855->16858 16855->16862 16857 7ff7079fb870 _log10_special 8 API calls 16859 7ff707a02ca3 16857->16859 16858->16861 16859->16826 16861->16862 16931 7ff707a0db68 16861->16931 16862->16857 16864 7ff707a02593 16863->16864 16865 7ff707a025a9 16863->16865 16867 7ff707a025e7 16864->16867 16868 7ff707a02975 16864->16868 16869 7ff707a02902 16864->16869 16866 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16865->16866 16865->16867 16866->16867 16867->16826 16872 7ff707a029cf 16868->16872 16873 7ff707a0297a 16868->16873 16870 7ff707a0299f 16869->16870 16871 7ff707a02908 16869->16871 16876 7ff707a00e70 38 API calls 16870->16876 16880 7ff707a0290d 16871->16880 16882 7ff707a029de 16871->16882 16872->16870 16872->16882 16883 7ff707a02938 16872->16883 16874 7ff707a029af 16873->16874 16875 7ff707a0297c 16873->16875 16878 7ff707a00a60 38 API calls 16874->16878 16877 7ff707a0291d 16875->16877 16885 7ff707a0298b 16875->16885 16876->16883 16879 7ff707a03224 47 API calls 16877->16879 16892 7ff707a02a0d 16877->16892 16878->16883 16879->16883 16880->16877 16881 7ff707a02950 16880->16881 16880->16883 16886 7ff707a036e0 47 API calls 16881->16886 16881->16892 16884 7ff707a01280 38 API calls 16882->16884 16882->16892 16891 7ff707a0db68 47 API calls 16883->16891 16883->16892 16884->16883 16885->16870 16887 7ff707a02990 16885->16887 16886->16883 16889 7ff707a03878 37 API calls 16887->16889 16887->16892 16888 7ff7079fb870 _log10_special 8 API calls 16890 7ff707a02ca3 16888->16890 16889->16883 16890->16826 16891->16883 16892->16888 16944 7ff707a00034 16893->16944 16897 7ff707a03246 16896->16897 16898 7ff7079ffea0 12 API calls 16897->16898 16899 7ff707a0328e 16898->16899 16900 7ff707a0d880 46 API calls 16899->16900 16901 7ff707a03361 16900->16901 16902 7ff707a03ae0 45 API calls 16901->16902 16905 7ff707a03383 16901->16905 16902->16905 16903 7ff707a03ae0 45 API calls 16904 7ff707a0340c 16903->16904 16904->16861 16905->16903 16905->16904 16905->16905 16907 7ff707a036f8 16906->16907 16909 7ff707a03760 16906->16909 16908 7ff707a0db68 47 API calls 16907->16908 16907->16909 16908->16909 16909->16861 16911 7ff707a00ea3 16910->16911 16912 7ff707a00ed2 16911->16912 16914 7ff707a00f8f 16911->16914 16913 7ff7079ffea0 12 API calls 16912->16913 16916 7ff707a00f0f 16912->16916 16913->16916 16915 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16914->16915 16915->16916 16916->16861 16918 7ff707a00a93 16917->16918 16919 7ff707a00ac2 16918->16919 16922 7ff707a00b7f 16918->16922 16920 7ff707a00aff 16919->16920 16921 7ff7079ffea0 12 API calls 16919->16921 16920->16861 16921->16920 16923 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16922->16923 16923->16920 16926 7ff707a012b3 16924->16926 16925 7ff707a012e2 16927 7ff7079ffea0 12 API calls 16925->16927 16930 7ff707a0131f 16925->16930 16926->16925 16928 7ff707a0139f 16926->16928 16927->16930 16929 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16928->16929 16929->16930 16930->16861 16932 7ff707a0db90 16931->16932 16933 7ff707a0dbd5 16932->16933 16935 7ff707a03ae0 45 API calls 16932->16935 16936 7ff707a0db95 memcpy_s 16932->16936 16940 7ff707a0dbbe memcpy_s 16932->16940 16933->16936 16933->16940 16941 7ff707a0faf8 16933->16941 16934 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16934->16936 16935->16933 16936->16861 16940->16934 16940->16936 16943 7ff707a0fb1c WideCharToMultiByte 16941->16943 16945 7ff707a00073 16944->16945 16946 7ff707a00061 16944->16946 16949 7ff707a00080 16945->16949 16952 7ff707a000bd 16945->16952 16947 7ff707a043f4 _get_daylight 11 API calls 16946->16947 16948 7ff707a00066 16947->16948 16950 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16948->16950 16951 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 16949->16951 16956 7ff707a00071 16950->16956 16951->16956 16953 7ff707a00166 16952->16953 16954 7ff707a043f4 _get_daylight 11 API calls 16952->16954 16955 7ff707a043f4 _get_daylight 11 API calls 16953->16955 16953->16956 16957 7ff707a0015b 16954->16957 16958 7ff707a00210 16955->16958 16956->16826 16959 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16957->16959 16960 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16958->16960 16959->16953 16960->16956 16962 7ff707a0df4d 16961->16962 16964 7ff707a044fd 16962->16964 16966 7ff707a0df52 16962->16966 16968 7ff707a0df9c 16962->16968 16963 7ff707a043f4 _get_daylight 11 API calls 16965 7ff707a0df5c 16963->16965 16964->16820 16964->16821 16967 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16965->16967 16966->16963 16966->16964 16967->16964 16968->16964 16969 7ff707a043f4 _get_daylight 11 API calls 16968->16969 16969->16965 16971 7ff7079ff706 16970->16971 16982 7ff7079f19b9 16970->16982 16972 7ff7079ff715 memcpy_s 16971->16972 16973 7ff7079ff752 16971->16973 16971->16982 16975 7ff707a043f4 _get_daylight 11 API calls 16972->16975 16983 7ff707a0477c EnterCriticalSection 16973->16983 16977 7ff7079ff72a 16975->16977 16979 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16977->16979 16979->16982 16982->16089 16982->16090 16985 7ff707a051d8 16984->16985 16986 7ff707a051fe 16985->16986 16989 7ff707a05231 16985->16989 16987 7ff707a043f4 _get_daylight 11 API calls 16986->16987 16988 7ff707a05203 16987->16988 16992 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 16988->16992 16990 7ff707a05244 16989->16990 16991 7ff707a05237 16989->16991 17003 7ff707a09f38 16990->17003 16993 7ff707a043f4 _get_daylight 11 API calls 16991->16993 16995 7ff7079f3fc6 16992->16995 16993->16995 16995->16121 17016 7ff707a0f5e8 EnterCriticalSection 17003->17016 17401 7ff707a06c08 17400->17401 17404 7ff707a066e4 17401->17404 17403 7ff707a06c21 17403->16131 17405 7ff707a066ff 17404->17405 17406 7ff707a0672e 17404->17406 17407 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 17405->17407 17414 7ff707a0477c EnterCriticalSection 17406->17414 17409 7ff707a0671f 17407->17409 17409->17403 17416 7ff7079ff163 17415->17416 17417 7ff7079ff191 17415->17417 17418 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 17416->17418 17420 7ff7079ff183 17417->17420 17425 7ff707a0477c EnterCriticalSection 17417->17425 17418->17420 17420->16135 17427 7ff707a07555 17426->17427 17428 7ff707a07568 17426->17428 17429 7ff707a043f4 _get_daylight 11 API calls 17427->17429 17436 7ff707a071cc 17428->17436 17431 7ff707a0755a 17429->17431 17432 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 17431->17432 17434 7ff707a07566 17432->17434 17434->16168 17443 7ff707a0f5e8 EnterCriticalSection 17436->17443 17445 7ff7079f7c13 __std_exception_copy 17444->17445 17446 7ff7079f7b91 GetTokenInformation 17444->17446 17449 7ff7079f7c26 CloseHandle 17445->17449 17450 7ff7079f7c2c 17445->17450 17447 7ff7079f7bb2 GetLastError 17446->17447 17448 7ff7079f7bbd 17446->17448 17447->17445 17447->17448 17448->17445 17451 7ff7079f7bd9 GetTokenInformation 17448->17451 17449->17450 17450->16173 17451->17445 17453 7ff7079f7bfc 17451->17453 17452 7ff7079f7c06 ConvertSidToStringSidW 17452->17445 17453->17445 17453->17452 17455 7ff7079f297a 17454->17455 17456 7ff707a03ef8 48 API calls 17455->17456 17457 7ff7079f29a2 MessageBoxW 17456->17457 17458 7ff7079fb870 _log10_special 8 API calls 17457->17458 17459 7ff7079f29cc 17458->17459 17459->16183 17461 7ff7079f77dc 17460->17461 17462 7ff7079f86b0 2 API calls 17461->17462 17463 7ff7079f77fb 17462->17463 17464 7ff7079f7816 ExpandEnvironmentStringsW 17463->17464 17465 7ff7079f7803 17463->17465 17467 7ff7079f783c __std_exception_copy 17464->17467 17466 7ff7079f26c0 49 API calls 17465->17466 17493 7ff7079f2555 17492->17493 17494 7ff707a03ef8 48 API calls 17493->17494 17495 7ff7079f2574 17494->17495 17495->16199 17607 7ff707a07aac 17496->17607 17731 7ff7079f3f70 108 API calls 17730->17731 17732 7ff7079f1463 17731->17732 17733 7ff7079f146b 17732->17733 17734 7ff7079f148c 17732->17734 17736 7ff7079f25f0 53 API calls 17733->17736 17735 7ff7079ff9f4 73 API calls 17734->17735 17737 7ff7079f14a1 17735->17737 17738 7ff7079f147b 17736->17738 17739 7ff7079f14a5 17737->17739 17740 7ff7079f14c1 17737->17740 17738->16236 17741 7ff7079f2760 53 API calls 17739->17741 17742 7ff7079f14f1 17740->17742 17743 7ff7079f14d1 17740->17743 17749 7ff7079f14bc __std_exception_copy 17741->17749 17746 7ff7079f14f7 17742->17746 17751 7ff7079f150a 17742->17751 17744 7ff7079f2760 53 API calls 17743->17744 17744->17749 17745 7ff7079ff36c 74 API calls 17747 7ff7079f1584 17745->17747 17754 7ff7079f11f0 17746->17754 17747->16236 17749->17745 17750 7ff7079ff6bc _fread_nolock 53 API calls 17750->17751 17751->17749 17751->17750 17752 7ff7079f1596 17751->17752 17753 7ff7079f2760 53 API calls 17752->17753 17753->17749 17755 7ff7079f1248 17754->17755 17756 7ff7079f124f 17755->17756 17757 7ff7079f1277 17755->17757 17758 7ff7079f25f0 53 API calls 17756->17758 17760 7ff7079f1291 17757->17760 17761 7ff7079f12ad 17757->17761 17759 7ff7079f1262 17758->17759 17759->17749 17762 7ff7079f2760 53 API calls 17760->17762 17763 7ff7079f12bf 17761->17763 17770 7ff7079f12db memcpy_s 17761->17770 17766 7ff7079f12a8 __std_exception_copy 17762->17766 17764 7ff7079f2760 53 API calls 17763->17764 17764->17766 17765 7ff7079ff6bc _fread_nolock 53 API calls 17765->17770 17766->17749 17767 7ff7079f139f 17768 7ff7079f25f0 53 API calls 17767->17768 17768->17766 17770->17765 17770->17766 17770->17767 17771 7ff7079ff430 37 API calls 17770->17771 17772 7ff7079ffdfc 17770->17772 17771->17770 17773 7ff7079ffe2c 17772->17773 17774 7ff7079ffb4c 76 API calls 17773->17774 17775 7ff7079ffe4a 17774->17775 17775->17770 17778 7ff7079f1875 17776->17778 17779 7ff7079f1805 17776->17779 17778->16266 17779->17778 17835 7ff707a04250 17779->17835 17781 7ff7079f3f1a 17780->17781 17782 7ff7079f86b0 2 API calls 17781->17782 17783 7ff7079f3f3f 17782->17783 17784 7ff7079fb870 _log10_special 8 API calls 17783->17784 17785 7ff7079f3f67 17784->17785 17785->16266 17787 7ff7079f753e 17786->17787 17788 7ff7079f7662 17787->17788 17789 7ff7079f1bf0 49 API calls 17787->17789 17790 7ff7079fb870 _log10_special 8 API calls 17788->17790 17794 7ff7079f75c5 17789->17794 17791 7ff7079f7693 17790->17791 17791->16266 17792 7ff7079f1bf0 49 API calls 17792->17794 17793 7ff7079f3f10 10 API calls 17793->17794 17794->17788 17794->17792 17794->17793 17795 7ff7079f86b0 2 API calls 17794->17795 17796 7ff7079f7633 CreateDirectoryW 17795->17796 17796->17788 17796->17794 17798 7ff7079f15d3 17797->17798 17799 7ff7079f15f7 17797->17799 17850 7ff7079f1050 17798->17850 17801 7ff7079f3f70 108 API calls 17799->17801 17802 7ff7079f160b 17801->17802 17804 7ff7079f1613 17802->17804 17805 7ff7079f163b 17802->17805 17803 7ff7079f15d8 17806 7ff7079f15ee 17803->17806 17809 7ff7079f25f0 53 API calls 17803->17809 17807 7ff7079f2760 53 API calls 17804->17807 17808 7ff7079f3f70 108 API calls 17805->17808 17806->16266 17810 7ff7079f162a 17807->17810 17811 7ff7079f164f 17808->17811 17809->17806 17810->16266 17812 7ff7079f1671 17811->17812 17813 7ff7079f1657 17811->17813 17815 7ff7079ff9f4 73 API calls 17812->17815 17814 7ff7079f25f0 53 API calls 17813->17814 17816 7ff7079f1667 17814->17816 17817 7ff7079f1686 17815->17817 17820 7ff7079ff36c 74 API calls 17816->17820 17818 7ff7079f16ab 17817->17818 17819 7ff7079f168a 17817->17819 17821 7ff7079f16b1 17818->17821 17822 7ff7079f16c9 17818->17822 17823 7ff7079f2760 53 API calls 17819->17823 17824 7ff7079f17cd 17820->17824 17825 7ff7079f11f0 92 API calls 17821->17825 17826 7ff7079f16eb 17822->17826 17833 7ff7079f170c 17822->17833 17829 7ff7079f16a1 __std_exception_copy 17823->17829 17824->16266 17825->17829 17828 7ff7079f2760 53 API calls 17826->17828 17827 7ff7079ff36c 74 API calls 17827->17816 17828->17829 17829->17827 17830 7ff7079ff6bc _fread_nolock 53 API calls 17830->17833 17831 7ff7079f1775 17834 7ff7079f2760 53 API calls 17831->17834 17832 7ff7079ffdfc 76 API calls 17832->17833 17833->17829 17833->17830 17833->17831 17833->17832 17834->17829 17836 7ff707a0425d 17835->17836 17837 7ff707a0428a 17835->17837 17838 7ff707a043f4 _get_daylight 11 API calls 17836->17838 17847 7ff707a04214 17836->17847 17839 7ff707a042ad 17837->17839 17840 7ff707a042c9 17837->17840 17841 7ff707a04267 17838->17841 17842 7ff707a043f4 _get_daylight 11 API calls 17839->17842 17843 7ff707a04178 45 API calls 17840->17843 17844 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 17841->17844 17845 7ff707a042b2 17842->17845 17849 7ff707a042bd 17843->17849 17846 7ff707a04272 17844->17846 17848 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 17845->17848 17846->17779 17847->17779 17848->17849 17849->17779 17851 7ff7079f3f70 108 API calls 17850->17851 17852 7ff7079f108b 17851->17852 17853 7ff7079f1093 17852->17853 17854 7ff7079f10a8 17852->17854 17856 7ff7079f25f0 53 API calls 17853->17856 17855 7ff7079ff9f4 73 API calls 17854->17855 17857 7ff7079f10bd 17855->17857 17861 7ff7079f10a3 __std_exception_copy 17856->17861 17858 7ff7079f10c1 17857->17858 17859 7ff7079f10dd 17857->17859 17860 7ff7079f2760 53 API calls 17858->17860 17862 7ff7079f110d 17859->17862 17863 7ff7079f10ed 17859->17863 17869 7ff7079f10d8 __std_exception_copy 17860->17869 17861->17803 17866 7ff7079f1113 17862->17866 17872 7ff7079f1126 17862->17872 17864 7ff7079f2760 53 API calls 17863->17864 17864->17869 17865 7ff7079ff36c 74 API calls 17867 7ff7079f1194 17865->17867 17868 7ff7079f11f0 92 API calls 17866->17868 17867->17861 17875 7ff7079f40a0 17867->17875 17868->17869 17869->17865 17871 7ff7079ff6bc _fread_nolock 53 API calls 17871->17872 17872->17869 17872->17871 17873 7ff7079f11cc 17872->17873 17874 7ff7079f2760 53 API calls 17873->17874 17874->17869 17876 7ff7079f40b0 17875->17876 17877 7ff7079f86b0 2 API calls 17876->17877 17878 7ff7079f40db 17877->17878 17890 7ff7079f86b0 2 API calls 17889->17890 17891 7ff7079f81b4 LoadLibraryExW 17890->17891 17892 7ff7079f81d3 __std_exception_copy 17891->17892 17892->16272 17894 7ff7079f6ef3 GetProcAddress 17893->17894 17895 7ff7079f6ec9 17893->17895 17894->17895 17896 7ff7079f6f18 GetProcAddress 17894->17896 17897 7ff7079f29e0 51 API calls 17895->17897 17896->17895 17898 7ff7079f6f3d GetProcAddress 17896->17898 17899 7ff7079f6ee3 17897->17899 17898->17895 17900 7ff7079f6f65 GetProcAddress 17898->17900 17899->16279 17900->17895 17901 7ff7079f6f8d GetProcAddress 17900->17901 17901->17895 17902 7ff7079f6fb5 GetProcAddress 17901->17902 17903 7ff7079f6fd1 17902->17903 17904 7ff7079f6fdd GetProcAddress 17902->17904 17903->17904 17956->16300 17957->16303 17959 7ff7079f694b 17958->17959 17961 7ff7079f6904 17958->17961 17959->16316 17960 7ff707a04250 45 API calls 17960->17961 17961->17959 17961->17960 17963 7ff7079f3b51 17962->17963 17964 7ff7079f3e90 49 API calls 17963->17964 17965 7ff7079f3b8b 17964->17965 17966 7ff7079f3e90 49 API calls 17965->17966 17967 7ff7079f3b9b 17966->17967 17968 7ff7079f3bbd 17967->17968 17969 7ff7079f3bec 17967->17969 18009 7ff7079f3ac0 17968->18009 17971 7ff7079f3ac0 51 API calls 17969->17971 17972 7ff7079f3bea 17971->17972 17973 7ff7079f3c4c 17972->17973 17974 7ff7079f3c17 17972->17974 17975 7ff7079f3ac0 51 API calls 17973->17975 18016 7ff7079f7400 17974->18016 17977 7ff7079f3c70 17975->17977 17979 7ff7079f3ac0 51 API calls 17977->17979 17988 7ff7079f3cc2 17977->17988 17982 7ff7079f3c99 17979->17982 17980 7ff7079f3d43 17982->17988 17988->17980 17992 7ff7079f3d3c 17988->17992 17994 7ff7079f3cc7 17988->17994 17996 7ff7079f3d2b 17988->17996 17990 7ff7079f3d55 17992->17990 17992->17994 17999 7ff7079f25f0 53 API calls 17994->17999 17998 7ff7079f25f0 53 API calls 17996->17998 17998->17994 18007 7ff7079f1bf0 49 API calls 18006->18007 18008 7ff7079f3e24 18007->18008 18008->16316 18010 7ff7079f3ae6 18009->18010 18011 7ff707a03ca4 49 API calls 18010->18011 18012 7ff7079f3b0c 18011->18012 18013 7ff7079f3b1d 18012->18013 18014 7ff7079f3f10 10 API calls 18012->18014 18013->17972 18015 7ff7079f3b2f 18014->18015 18015->17972 18017 7ff7079f7415 18016->18017 18018 7ff7079f3f70 108 API calls 18017->18018 18019 7ff7079f743b 18018->18019 18020 7ff7079f3f70 108 API calls 18019->18020 18021 7ff7079f7462 18019->18021 18069 7ff7079f5b05 18068->18069 18070 7ff7079f1bf0 49 API calls 18069->18070 18071 7ff7079f5b41 18070->18071 18072 7ff7079f5b6d 18071->18072 18073 7ff7079f5b4a 18071->18073 18074 7ff7079f3fe0 49 API calls 18072->18074 18075 7ff7079f25f0 53 API calls 18073->18075 18076 7ff7079f5b85 18074->18076 18092 7ff7079f5b63 18075->18092 18077 7ff7079f5ba3 18076->18077 18078 7ff7079f25f0 53 API calls 18076->18078 18079 7ff7079f3f10 10 API calls 18077->18079 18078->18077 18081 7ff7079f5bad 18079->18081 18080 7ff7079fb870 _log10_special 8 API calls 18082 7ff7079f308e 18080->18082 18083 7ff7079f5bbb 18081->18083 18084 7ff7079f81a0 3 API calls 18081->18084 18082->16332 18099 7ff7079f5c80 18082->18099 18085 7ff7079f3fe0 49 API calls 18083->18085 18084->18083 18086 7ff7079f5bd4 18085->18086 18087 7ff7079f5bf9 18086->18087 18088 7ff7079f5bd9 18086->18088 18089 7ff7079f81a0 3 API calls 18087->18089 18090 7ff7079f25f0 53 API calls 18088->18090 18091 7ff7079f5c06 18089->18091 18090->18092 18093 7ff7079f5c12 18091->18093 18094 7ff7079f5c49 18091->18094 18092->18080 18095 7ff7079f86b0 2 API calls 18093->18095 18153 7ff7079f50b0 GetProcAddress 18094->18153 18097 7ff7079f5c2a 18095->18097 18098 7ff7079f29e0 51 API calls 18097->18098 18098->18092 18238 7ff7079f4c80 18099->18238 18101 7ff7079f5cba 18102 7ff7079f5cd3 18101->18102 18103 7ff7079f5cc2 18101->18103 18245 7ff7079f4450 18102->18245 18104 7ff7079f25f0 53 API calls 18103->18104 18110 7ff7079f5cce 18104->18110 18107 7ff7079f5cdf 18109 7ff7079f25f0 53 API calls 18107->18109 18108 7ff7079f5cf0 18111 7ff7079f5cff 18108->18111 18112 7ff7079f5d10 18108->18112 18109->18110 18110->16328 18249 7ff7079f4700 18112->18249 18139 7ff7079f5820 18138->18139 18139->18139 18140 7ff7079f5849 18139->18140 18145 7ff7079f5860 __std_exception_copy 18139->18145 18141 7ff7079f25f0 53 API calls 18140->18141 18143 7ff7079f596b 18144 7ff7079f1440 116 API calls 18144->18145 18145->18143 18145->18144 18146 7ff7079f25f0 53 API calls 18145->18146 18146->18145 18154 7ff7079f50f7 GetProcAddress 18153->18154 18158 7ff7079f50d2 18153->18158 18155 7ff7079f511c GetProcAddress 18154->18155 18154->18158 18157 7ff7079f5141 GetProcAddress 18155->18157 18155->18158 18156 7ff7079f29e0 51 API calls 18159 7ff7079f50ec 18156->18159 18157->18158 18160 7ff7079f5169 GetProcAddress 18157->18160 18158->18156 18159->18092 18160->18158 18240 7ff7079f4cac 18238->18240 18239 7ff7079f4cb4 18239->18101 18240->18239 18243 7ff7079f4e54 18240->18243 18276 7ff707a05db4 18240->18276 18241 7ff7079f5017 __std_exception_copy 18241->18101 18242 7ff7079f4180 47 API calls 18242->18243 18243->18241 18243->18242 18246 7ff7079f4480 18245->18246 18247 7ff7079fb870 _log10_special 8 API calls 18246->18247 18248 7ff7079f44ea 18247->18248 18248->18107 18248->18108 18277 7ff707a05de4 18276->18277 18280 7ff707a052b0 18277->18280 18279 7ff707a05e14 18279->18240 18281 7ff707a052f3 18280->18281 18282 7ff707a052e1 18280->18282 18284 7ff707a0533d 18281->18284 18286 7ff707a05300 18281->18286 18283 7ff707a043f4 _get_daylight 11 API calls 18282->18283 18285 7ff707a052e6 18283->18285 18287 7ff707a03ae0 45 API calls 18284->18287 18291 7ff707a05358 18284->18291 18289 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 18285->18289 18290 7ff707a09b24 _invalid_parameter_noinfo 37 API calls 18286->18290 18287->18291 18296 7ff707a052f1 18289->18296 18290->18296 18292 7ff707a0537a 18291->18292 18301 7ff707a05d3c 18291->18301 18293 7ff707a0541b 18292->18293 18294 7ff707a043f4 _get_daylight 11 API calls 18292->18294 18295 7ff707a043f4 _get_daylight 11 API calls 18293->18295 18293->18296 18297 7ff707a05410 18294->18297 18296->18279 18302 7ff707a05d76 18301->18302 18303 7ff707a05d5f 18301->18303 18305 7ff707a05d64 18302->18305 18312 7ff707a0f2a8 18302->18312 18307 7ff707a0f278 18303->18307 18305->18291 18308 7ff707a0a460 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 18307->18308 18313 7ff707a04178 45 API calls 18312->18313 18356->16335 18956 7ff707a0fbd8 18957 7ff707a0fbfc 18956->18957 18960 7ff707a0fc0c 18956->18960 18958 7ff707a043f4 _get_daylight 11 API calls 18957->18958 18978 7ff707a0fc01 18958->18978 18959 7ff707a0feec 18962 7ff707a043f4 _get_daylight 11 API calls 18959->18962 18960->18959 18961 7ff707a0fc2e 18960->18961 18963 7ff707a0fc4f 18961->18963 19087 7ff707a10294 18961->19087 18964 7ff707a0fef1 18962->18964 18967 7ff707a0fcc1 18963->18967 18969 7ff707a0fc75 18963->18969 18974 7ff707a0fcb5 18963->18974 18966 7ff707a09c58 __free_lconv_num 11 API calls 18964->18966 18966->18978 18971 7ff707a0dea8 _get_daylight 11 API calls 18967->18971 18985 7ff707a0fc84 18967->18985 18968 7ff707a0fd6e 18977 7ff707a0fd8b 18968->18977 18986 7ff707a0fddd 18968->18986 19102 7ff707a089d8 18969->19102 18975 7ff707a0fcd7 18971->18975 18973 7ff707a09c58 __free_lconv_num 11 API calls 18973->18978 18974->18968 18974->18985 19108 7ff707a1643c 18974->19108 18979 7ff707a09c58 __free_lconv_num 11 API calls 18975->18979 18983 7ff707a09c58 __free_lconv_num 11 API calls 18977->18983 18984 7ff707a0fce5 18979->18984 18980 7ff707a0fc9d 18980->18974 18988 7ff707a10294 45 API calls 18980->18988 18981 7ff707a0fc7f 18982 7ff707a043f4 _get_daylight 11 API calls 18981->18982 18982->18985 18987 7ff707a0fd94 18983->18987 18984->18974 18984->18985 18990 7ff707a0dea8 _get_daylight 11 API calls 18984->18990 18985->18973 18986->18985 18989 7ff707a126ec 40 API calls 18986->18989 18997 7ff707a0fd99 18987->18997 19144 7ff707a126ec 18987->19144 18988->18974 18991 7ff707a0fe1a 18989->18991 18992 7ff707a0fd07 18990->18992 18993 7ff707a09c58 __free_lconv_num 11 API calls 18991->18993 18995 7ff707a09c58 __free_lconv_num 11 API calls 18992->18995 18996 7ff707a0fe24 18993->18996 18995->18974 18996->18985 18996->18997 18998 7ff707a0fee0 18997->18998 19002 7ff707a0dea8 _get_daylight 11 API calls 18997->19002 19000 7ff707a09c58 __free_lconv_num 11 API calls 18998->19000 18999 7ff707a0fdc5 19001 7ff707a09c58 __free_lconv_num 11 API calls 18999->19001 19000->18978 19001->18997 19003 7ff707a0fe68 19002->19003 19004 7ff707a0fe79 19003->19004 19005 7ff707a0fe70 19003->19005 19007 7ff707a097b4 __std_exception_copy 37 API calls 19004->19007 19006 7ff707a09c58 __free_lconv_num 11 API calls 19005->19006 19008 7ff707a0fe77 19006->19008 19009 7ff707a0fe88 19007->19009 19012 7ff707a09c58 __free_lconv_num 11 API calls 19008->19012 19010 7ff707a0ff1b 19009->19010 19011 7ff707a0fe90 19009->19011 19014 7ff707a09c10 _isindst 17 API calls 19010->19014 19153 7ff707a16554 19011->19153 19012->18978 19016 7ff707a0ff2f 19014->19016 19017 7ff707a0ff58 19016->19017 19025 7ff707a0ff68 19016->19025 19020 7ff707a043f4 _get_daylight 11 API calls 19017->19020 19018 7ff707a0feb7 19022 7ff707a043f4 _get_daylight 11 API calls 19018->19022 19019 7ff707a0fed8 19021 7ff707a09c58 __free_lconv_num 11 API calls 19019->19021 19049 7ff707a0ff5d 19020->19049 19021->18998 19023 7ff707a0febc 19022->19023 19026 7ff707a09c58 __free_lconv_num 11 API calls 19023->19026 19024 7ff707a1024b 19028 7ff707a043f4 _get_daylight 11 API calls 19024->19028 19025->19024 19027 7ff707a0ff8a 19025->19027 19026->19008 19029 7ff707a0ffa7 19027->19029 19172 7ff707a1037c 19027->19172 19030 7ff707a10250 19028->19030 19033 7ff707a1001b 19029->19033 19035 7ff707a0ffcf 19029->19035 19042 7ff707a1000f 19029->19042 19032 7ff707a09c58 __free_lconv_num 11 API calls 19030->19032 19032->19049 19037 7ff707a10043 19033->19037 19043 7ff707a0dea8 _get_daylight 11 API calls 19033->19043 19054 7ff707a0ffde 19033->19054 19034 7ff707a100ce 19047 7ff707a100eb 19034->19047 19055 7ff707a1013e 19034->19055 19187 7ff707a08a14 19035->19187 19040 7ff707a0dea8 _get_daylight 11 API calls 19037->19040 19037->19042 19037->19054 19048 7ff707a10065 19040->19048 19041 7ff707a09c58 __free_lconv_num 11 API calls 19041->19049 19042->19034 19042->19054 19193 7ff707a162fc 19042->19193 19044 7ff707a10035 19043->19044 19050 7ff707a09c58 __free_lconv_num 11 API calls 19044->19050 19045 7ff707a0fff7 19045->19042 19057 7ff707a1037c 45 API calls 19045->19057 19046 7ff707a0ffd9 19051 7ff707a043f4 _get_daylight 11 API calls 19046->19051 19052 7ff707a09c58 __free_lconv_num 11 API calls 19047->19052 19053 7ff707a09c58 __free_lconv_num 11 API calls 19048->19053 19050->19037 19051->19054 19056 7ff707a100f4 19052->19056 19053->19042 19054->19041 19055->19054 19058 7ff707a126ec 40 API calls 19055->19058 19061 7ff707a126ec 40 API calls 19056->19061 19063 7ff707a100fa 19056->19063 19057->19042 19059 7ff707a1017c 19058->19059 19060 7ff707a09c58 __free_lconv_num 11 API calls 19059->19060 19062 7ff707a10186 19060->19062 19065 7ff707a10126 19061->19065 19062->19054 19062->19063 19064 7ff707a1023f 19063->19064 19068 7ff707a0dea8 _get_daylight 11 API calls 19063->19068 19066 7ff707a09c58 __free_lconv_num 11 API calls 19064->19066 19067 7ff707a09c58 __free_lconv_num 11 API calls 19065->19067 19066->19049 19067->19063 19069 7ff707a101cb 19068->19069 19070 7ff707a101dc 19069->19070 19071 7ff707a101d3 19069->19071 19073 7ff707a0f784 37 API calls 19070->19073 19072 7ff707a09c58 __free_lconv_num 11 API calls 19071->19072 19074 7ff707a101da 19072->19074 19075 7ff707a101ea 19073->19075 19078 7ff707a09c58 __free_lconv_num 11 API calls 19074->19078 19076 7ff707a1027f 19075->19076 19077 7ff707a101f2 SetEnvironmentVariableW 19075->19077 19081 7ff707a09c10 _isindst 17 API calls 19076->19081 19079 7ff707a10237 19077->19079 19080 7ff707a10216 19077->19080 19078->19049 19082 7ff707a09c58 __free_lconv_num 11 API calls 19079->19082 19083 7ff707a043f4 _get_daylight 11 API calls 19080->19083 19084 7ff707a10293 19081->19084 19082->19064 19085 7ff707a1021b 19083->19085 19086 7ff707a09c58 __free_lconv_num 11 API calls 19085->19086 19086->19074 19088 7ff707a102c9 19087->19088 19089 7ff707a102b1 19087->19089 19090 7ff707a0dea8 _get_daylight 11 API calls 19088->19090 19089->18963 19096 7ff707a102ed 19090->19096 19091 7ff707a1034e 19093 7ff707a09c58 __free_lconv_num 11 API calls 19091->19093 19092 7ff707a09814 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19094 7ff707a10378 19092->19094 19093->19089 19095 7ff707a0dea8 _get_daylight 11 API calls 19095->19096 19096->19091 19096->19095 19097 7ff707a09c58 __free_lconv_num 11 API calls 19096->19097 19098 7ff707a097b4 __std_exception_copy 37 API calls 19096->19098 19099 7ff707a1035d 19096->19099 19101 7ff707a10372 19096->19101 19097->19096 19098->19096 19100 7ff707a09c10 _isindst 17 API calls 19099->19100 19100->19101 19101->19092 19103 7ff707a089e8 19102->19103 19104 7ff707a089f1 19102->19104 19103->19104 19217 7ff707a084b0 19103->19217 19104->18980 19104->18981 19109 7ff707a16449 19108->19109 19110 7ff707a15564 19108->19110 19112 7ff707a04178 45 API calls 19109->19112 19111 7ff707a15571 19110->19111 19118 7ff707a155a7 19110->19118 19114 7ff707a043f4 _get_daylight 11 API calls 19111->19114 19132 7ff707a15518 19111->19132 19113 7ff707a1647d 19112->19113 19119 7ff707a16493 19113->19119 19122 7ff707a164aa 19113->19122 19126 7ff707a16482 19113->19126 19116 7ff707a1557b 19114->19116 19115 7ff707a155d1 19117 7ff707a043f4 _get_daylight 11 API calls 19115->19117 19120 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 19116->19120 19121 7ff707a155d6 19117->19121 19118->19115 19127 7ff707a155f6 19118->19127 19123 7ff707a043f4 _get_daylight 11 API calls 19119->19123 19124 7ff707a15586 19120->19124 19125 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 19121->19125 19129 7ff707a164b4 19122->19129 19130 7ff707a164c6 19122->19130 19128 7ff707a16498 19123->19128 19124->18974 19137 7ff707a155e1 19125->19137 19126->18974 19131 7ff707a04178 45 API calls 19127->19131 19127->19137 19135 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 19128->19135 19136 7ff707a043f4 _get_daylight 11 API calls 19129->19136 19133 7ff707a164d7 19130->19133 19134 7ff707a164ee 19130->19134 19131->19137 19132->18974 19434 7ff707a155b4 19133->19434 19443 7ff707a1825c 19134->19443 19135->19126 19140 7ff707a164b9 19136->19140 19137->18974 19142 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 19140->19142 19142->19126 19143 7ff707a043f4 _get_daylight 11 API calls 19143->19126 19145 7ff707a1272b 19144->19145 19146 7ff707a1270e 19144->19146 19148 7ff707a12735 19145->19148 19483 7ff707a16f48 19145->19483 19146->19145 19147 7ff707a1271c 19146->19147 19149 7ff707a043f4 _get_daylight 11 API calls 19147->19149 19490 7ff707a16f84 19148->19490 19152 7ff707a12721 memcpy_s 19149->19152 19152->18999 19154 7ff707a04178 45 API calls 19153->19154 19155 7ff707a165ba 19154->19155 19156 7ff707a165c8 19155->19156 19502 7ff707a0e234 19155->19502 19505 7ff707a047bc 19156->19505 19160 7ff707a166b4 19162 7ff707a166c5 19160->19162 19164 7ff707a09c58 __free_lconv_num 11 API calls 19160->19164 19161 7ff707a04178 45 API calls 19163 7ff707a16637 19161->19163 19165 7ff707a0feb3 19162->19165 19167 7ff707a09c58 __free_lconv_num 11 API calls 19162->19167 19166 7ff707a0e234 5 API calls 19163->19166 19168 7ff707a16640 19163->19168 19164->19162 19165->19018 19165->19019 19166->19168 19167->19165 19169 7ff707a047bc 14 API calls 19168->19169 19170 7ff707a1669b 19169->19170 19170->19160 19171 7ff707a166a3 SetEnvironmentVariableW 19170->19171 19171->19160 19173 7ff707a103bc 19172->19173 19174 7ff707a1039f 19172->19174 19175 7ff707a0dea8 _get_daylight 11 API calls 19173->19175 19174->19029 19182 7ff707a103e0 19175->19182 19176 7ff707a10464 19178 7ff707a09814 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19176->19178 19177 7ff707a10441 19179 7ff707a09c58 __free_lconv_num 11 API calls 19177->19179 19180 7ff707a1046a 19178->19180 19179->19174 19181 7ff707a0dea8 _get_daylight 11 API calls 19181->19182 19182->19176 19182->19177 19182->19181 19183 7ff707a09c58 __free_lconv_num 11 API calls 19182->19183 19184 7ff707a0f784 37 API calls 19182->19184 19185 7ff707a10450 19182->19185 19183->19182 19184->19182 19186 7ff707a09c10 _isindst 17 API calls 19185->19186 19186->19176 19188 7ff707a08a24 19187->19188 19191 7ff707a08a2d 19187->19191 19188->19191 19527 7ff707a08524 19188->19527 19191->19045 19191->19046 19194 7ff707a16309 19193->19194 19195 7ff707a16336 19193->19195 19194->19195 19196 7ff707a1630e 19194->19196 19199 7ff707a1637a 19195->19199 19202 7ff707a16399 19195->19202 19215 7ff707a1636e __crtLCMapStringW 19195->19215 19197 7ff707a043f4 _get_daylight 11 API calls 19196->19197 19198 7ff707a16313 19197->19198 19201 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 19198->19201 19200 7ff707a043f4 _get_daylight 11 API calls 19199->19200 19203 7ff707a1637f 19200->19203 19204 7ff707a1631e 19201->19204 19205 7ff707a163a3 19202->19205 19206 7ff707a163b5 19202->19206 19207 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 19203->19207 19204->19042 19208 7ff707a043f4 _get_daylight 11 API calls 19205->19208 19209 7ff707a04178 45 API calls 19206->19209 19207->19215 19210 7ff707a163a8 19208->19210 19211 7ff707a163c2 19209->19211 19212 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 19210->19212 19211->19215 19574 7ff707a17e18 19211->19574 19212->19215 19215->19042 19216 7ff707a043f4 _get_daylight 11 API calls 19216->19215 19218 7ff707a084c9 19217->19218 19219 7ff707a084c5 19217->19219 19240 7ff707a11900 19218->19240 19219->19104 19232 7ff707a08804 19219->19232 19224 7ff707a084e7 19266 7ff707a08594 19224->19266 19225 7ff707a084db 19226 7ff707a09c58 __free_lconv_num 11 API calls 19225->19226 19226->19219 19229 7ff707a09c58 __free_lconv_num 11 API calls 19230 7ff707a0850e 19229->19230 19231 7ff707a09c58 __free_lconv_num 11 API calls 19230->19231 19231->19219 19233 7ff707a0882d 19232->19233 19238 7ff707a08846 19232->19238 19233->19104 19234 7ff707a0dea8 _get_daylight 11 API calls 19234->19238 19235 7ff707a088d6 19237 7ff707a09c58 __free_lconv_num 11 API calls 19235->19237 19236 7ff707a0faf8 WideCharToMultiByte 19236->19238 19237->19233 19238->19233 19238->19234 19238->19235 19238->19236 19239 7ff707a09c58 __free_lconv_num 11 API calls 19238->19239 19239->19238 19241 7ff707a1190d 19240->19241 19245 7ff707a084ce 19240->19245 19285 7ff707a0a534 19241->19285 19246 7ff707a11c3c GetEnvironmentStringsW 19245->19246 19247 7ff707a11c6c 19246->19247 19248 7ff707a084d3 19246->19248 19249 7ff707a0faf8 WideCharToMultiByte 19247->19249 19248->19224 19248->19225 19250 7ff707a11cbd 19249->19250 19251 7ff707a11cc4 FreeEnvironmentStringsW 19250->19251 19252 7ff707a0c90c _fread_nolock 12 API calls 19250->19252 19251->19248 19253 7ff707a11cd7 19252->19253 19254 7ff707a11ce8 19253->19254 19255 7ff707a11cdf 19253->19255 19256 7ff707a0faf8 WideCharToMultiByte 19254->19256 19257 7ff707a09c58 __free_lconv_num 11 API calls 19255->19257 19258 7ff707a11d0b 19256->19258 19259 7ff707a11ce6 19257->19259 19260 7ff707a11d19 19258->19260 19261 7ff707a11d0f 19258->19261 19259->19251 19263 7ff707a09c58 __free_lconv_num 11 API calls 19260->19263 19262 7ff707a09c58 __free_lconv_num 11 API calls 19261->19262 19264 7ff707a11d17 FreeEnvironmentStringsW 19262->19264 19263->19264 19264->19248 19268 7ff707a085b9 19266->19268 19267 7ff707a0dea8 _get_daylight 11 API calls 19280 7ff707a085ef 19267->19280 19268->19267 19269 7ff707a085f7 19270 7ff707a09c58 __free_lconv_num 11 API calls 19269->19270 19272 7ff707a084ef 19270->19272 19271 7ff707a0866a 19273 7ff707a09c58 __free_lconv_num 11 API calls 19271->19273 19272->19229 19273->19272 19274 7ff707a0dea8 _get_daylight 11 API calls 19274->19280 19275 7ff707a08659 19277 7ff707a087c0 11 API calls 19275->19277 19276 7ff707a097b4 __std_exception_copy 37 API calls 19276->19280 19278 7ff707a08661 19277->19278 19279 7ff707a09c58 __free_lconv_num 11 API calls 19278->19279 19279->19269 19280->19269 19280->19271 19280->19274 19280->19275 19280->19276 19281 7ff707a0868f 19280->19281 19283 7ff707a09c58 __free_lconv_num 11 API calls 19280->19283 19282 7ff707a09c10 _isindst 17 API calls 19281->19282 19284 7ff707a086a2 19282->19284 19283->19280 19286 7ff707a0a560 FlsSetValue 19285->19286 19287 7ff707a0a545 FlsGetValue 19285->19287 19289 7ff707a0a552 19286->19289 19290 7ff707a0a56d 19286->19290 19288 7ff707a0a55a 19287->19288 19287->19289 19288->19286 19291 7ff707a0a558 19289->19291 19292 7ff707a09814 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19289->19292 19293 7ff707a0dea8 _get_daylight 11 API calls 19290->19293 19305 7ff707a115d4 19291->19305 19294 7ff707a0a5d5 19292->19294 19295 7ff707a0a57c 19293->19295 19296 7ff707a0a59a FlsSetValue 19295->19296 19297 7ff707a0a58a FlsSetValue 19295->19297 19299 7ff707a0a5b8 19296->19299 19300 7ff707a0a5a6 FlsSetValue 19296->19300 19298 7ff707a0a593 19297->19298 19301 7ff707a09c58 __free_lconv_num 11 API calls 19298->19301 19302 7ff707a0a204 _get_daylight 11 API calls 19299->19302 19300->19298 19301->19289 19303 7ff707a0a5c0 19302->19303 19304 7ff707a09c58 __free_lconv_num 11 API calls 19303->19304 19304->19291 19328 7ff707a11844 19305->19328 19307 7ff707a11609 19343 7ff707a112d4 19307->19343 19310 7ff707a0c90c _fread_nolock 12 API calls 19311 7ff707a11637 19310->19311 19312 7ff707a1163f 19311->19312 19315 7ff707a1164e 19311->19315 19313 7ff707a09c58 __free_lconv_num 11 API calls 19312->19313 19314 7ff707a11626 19313->19314 19314->19245 19350 7ff707a1197c 19315->19350 19318 7ff707a1174a 19319 7ff707a043f4 _get_daylight 11 API calls 19318->19319 19320 7ff707a1174f 19319->19320 19323 7ff707a09c58 __free_lconv_num 11 API calls 19320->19323 19321 7ff707a117a5 19322 7ff707a1180c 19321->19322 19361 7ff707a11104 19321->19361 19327 7ff707a09c58 __free_lconv_num 11 API calls 19322->19327 19323->19314 19324 7ff707a11764 19324->19321 19325 7ff707a09c58 __free_lconv_num 11 API calls 19324->19325 19325->19321 19327->19314 19329 7ff707a11867 19328->19329 19332 7ff707a11871 19329->19332 19376 7ff707a0f5e8 EnterCriticalSection 19329->19376 19331 7ff707a118e3 19331->19307 19332->19331 19336 7ff707a09814 __FrameHandler3::FrameUnwindToEmptyState 45 API calls 19332->19336 19337 7ff707a118fb 19336->19337 19339 7ff707a11952 19337->19339 19340 7ff707a0a534 50 API calls 19337->19340 19339->19307 19341 7ff707a1193c 19340->19341 19342 7ff707a115d4 65 API calls 19341->19342 19342->19339 19344 7ff707a04178 45 API calls 19343->19344 19345 7ff707a112e8 19344->19345 19346 7ff707a112f4 GetOEMCP 19345->19346 19347 7ff707a11306 19345->19347 19349 7ff707a1131b 19346->19349 19348 7ff707a1130b GetACP 19347->19348 19347->19349 19348->19349 19349->19310 19349->19314 19351 7ff707a112d4 47 API calls 19350->19351 19352 7ff707a119a9 19351->19352 19354 7ff707a119e6 IsValidCodePage 19352->19354 19359 7ff707a11aff 19352->19359 19360 7ff707a11a00 memcpy_s 19352->19360 19353 7ff7079fb870 _log10_special 8 API calls 19356 7ff707a11741 19353->19356 19355 7ff707a119f7 19354->19355 19354->19359 19357 7ff707a11a26 GetCPInfo 19355->19357 19355->19360 19356->19318 19356->19324 19357->19359 19357->19360 19359->19353 19377 7ff707a113ec 19360->19377 19433 7ff707a0f5e8 EnterCriticalSection 19361->19433 19378 7ff707a11429 GetCPInfo 19377->19378 19379 7ff707a1151f 19377->19379 19378->19379 19383 7ff707a1143c 19378->19383 19380 7ff7079fb870 _log10_special 8 API calls 19379->19380 19382 7ff707a115be 19380->19382 19381 7ff707a12150 48 API calls 19384 7ff707a114b3 19381->19384 19382->19359 19383->19381 19388 7ff707a16e94 19384->19388 19387 7ff707a16e94 54 API calls 19387->19379 19389 7ff707a04178 45 API calls 19388->19389 19390 7ff707a16eb9 19389->19390 19393 7ff707a16b60 19390->19393 19394 7ff707a16ba1 19393->19394 19395 7ff707a0ebb0 _fread_nolock MultiByteToWideChar 19394->19395 19398 7ff707a16beb 19395->19398 19396 7ff707a16e69 19397 7ff7079fb870 _log10_special 8 API calls 19396->19397 19399 7ff707a114e6 19397->19399 19398->19396 19400 7ff707a0c90c _fread_nolock 12 API calls 19398->19400 19402 7ff707a16c23 19398->19402 19412 7ff707a16d21 19398->19412 19399->19387 19400->19402 19401 7ff707a09c58 __free_lconv_num 11 API calls 19401->19396 19403 7ff707a0ebb0 _fread_nolock MultiByteToWideChar 19402->19403 19402->19412 19404 7ff707a16c96 19403->19404 19404->19412 19424 7ff707a0e3f4 19404->19424 19407 7ff707a16ce1 19409 7ff707a0e3f4 __crtLCMapStringW 6 API calls 19407->19409 19407->19412 19408 7ff707a16d32 19410 7ff707a0c90c _fread_nolock 12 API calls 19408->19410 19411 7ff707a16e04 19408->19411 19414 7ff707a16d50 19408->19414 19409->19412 19410->19414 19411->19412 19413 7ff707a09c58 __free_lconv_num 11 API calls 19411->19413 19412->19396 19412->19401 19413->19412 19414->19412 19415 7ff707a0e3f4 __crtLCMapStringW 6 API calls 19414->19415 19416 7ff707a16dd0 19415->19416 19416->19411 19417 7ff707a16df0 19416->19417 19418 7ff707a16e06 19416->19418 19419 7ff707a0faf8 WideCharToMultiByte 19417->19419 19420 7ff707a0faf8 WideCharToMultiByte 19418->19420 19421 7ff707a16dfe 19419->19421 19420->19421 19421->19411 19422 7ff707a16e1e 19421->19422 19422->19412 19423 7ff707a09c58 __free_lconv_num 11 API calls 19422->19423 19423->19412 19425 7ff707a0e020 __crtLCMapStringW 5 API calls 19424->19425 19426 7ff707a0e432 19425->19426 19429 7ff707a0e43a 19426->19429 19430 7ff707a0e4e0 19426->19430 19428 7ff707a0e4a3 LCMapStringW 19428->19429 19429->19407 19429->19408 19429->19412 19431 7ff707a0e020 __crtLCMapStringW 5 API calls 19430->19431 19432 7ff707a0e50e __crtLCMapStringW 19431->19432 19432->19428 19435 7ff707a155d1 19434->19435 19437 7ff707a155e8 19434->19437 19436 7ff707a043f4 _get_daylight 11 API calls 19435->19436 19438 7ff707a155d6 19436->19438 19437->19435 19439 7ff707a155f6 19437->19439 19440 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 19438->19440 19441 7ff707a04178 45 API calls 19439->19441 19442 7ff707a155e1 19439->19442 19440->19442 19441->19442 19442->19126 19444 7ff707a04178 45 API calls 19443->19444 19445 7ff707a18281 19444->19445 19448 7ff707a17ed8 19445->19448 19452 7ff707a17f26 19448->19452 19449 7ff7079fb870 _log10_special 8 API calls 19450 7ff707a16515 19449->19450 19450->19126 19450->19143 19451 7ff707a17fad 19453 7ff707a0ebb0 _fread_nolock MultiByteToWideChar 19451->19453 19457 7ff707a17fb1 19451->19457 19452->19451 19454 7ff707a17f98 GetCPInfo 19452->19454 19452->19457 19455 7ff707a18045 19453->19455 19454->19451 19454->19457 19456 7ff707a0c90c _fread_nolock 12 API calls 19455->19456 19455->19457 19458 7ff707a1807c 19455->19458 19456->19458 19457->19449 19458->19457 19459 7ff707a0ebb0 _fread_nolock MultiByteToWideChar 19458->19459 19460 7ff707a180ea 19459->19460 19461 7ff707a181cc 19460->19461 19462 7ff707a0ebb0 _fread_nolock MultiByteToWideChar 19460->19462 19461->19457 19463 7ff707a09c58 __free_lconv_num 11 API calls 19461->19463 19464 7ff707a18110 19462->19464 19463->19457 19464->19461 19465 7ff707a0c90c _fread_nolock 12 API calls 19464->19465 19466 7ff707a1813d 19464->19466 19465->19466 19466->19461 19467 7ff707a0ebb0 _fread_nolock MultiByteToWideChar 19466->19467 19468 7ff707a181b4 19467->19468 19469 7ff707a181ba 19468->19469 19470 7ff707a181d4 19468->19470 19469->19461 19473 7ff707a09c58 __free_lconv_num 11 API calls 19469->19473 19477 7ff707a0e278 19470->19477 19473->19461 19474 7ff707a18213 19474->19457 19476 7ff707a09c58 __free_lconv_num 11 API calls 19474->19476 19475 7ff707a09c58 __free_lconv_num 11 API calls 19475->19474 19476->19457 19478 7ff707a0e020 __crtLCMapStringW 5 API calls 19477->19478 19479 7ff707a0e2b6 19478->19479 19480 7ff707a0e2be 19479->19480 19481 7ff707a0e4e0 __crtLCMapStringW 5 API calls 19479->19481 19480->19474 19480->19475 19482 7ff707a0e327 CompareStringW 19481->19482 19482->19480 19484 7ff707a16f6a HeapSize 19483->19484 19485 7ff707a16f51 19483->19485 19486 7ff707a043f4 _get_daylight 11 API calls 19485->19486 19487 7ff707a16f56 19486->19487 19488 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 19487->19488 19489 7ff707a16f61 19488->19489 19489->19148 19491 7ff707a16f99 19490->19491 19492 7ff707a16fa3 19490->19492 19493 7ff707a0c90c _fread_nolock 12 API calls 19491->19493 19494 7ff707a16fa8 19492->19494 19500 7ff707a16faf _get_daylight 19492->19500 19499 7ff707a16fa1 19493->19499 19497 7ff707a09c58 __free_lconv_num 11 API calls 19494->19497 19495 7ff707a16fe2 HeapReAlloc 19495->19499 19495->19500 19496 7ff707a16fb5 19498 7ff707a043f4 _get_daylight 11 API calls 19496->19498 19497->19499 19498->19499 19499->19152 19500->19495 19500->19496 19501 7ff707a128a0 _get_daylight 2 API calls 19500->19501 19501->19500 19503 7ff707a0e020 __crtLCMapStringW 5 API calls 19502->19503 19504 7ff707a0e254 19503->19504 19504->19156 19506 7ff707a047e6 19505->19506 19507 7ff707a0480a 19505->19507 19511 7ff707a09c58 __free_lconv_num 11 API calls 19506->19511 19514 7ff707a047f5 19506->19514 19508 7ff707a04864 19507->19508 19509 7ff707a0480f 19507->19509 19510 7ff707a0ebb0 _fread_nolock MultiByteToWideChar 19508->19510 19512 7ff707a04824 19509->19512 19509->19514 19515 7ff707a09c58 __free_lconv_num 11 API calls 19509->19515 19521 7ff707a04880 19510->19521 19511->19514 19516 7ff707a0c90c _fread_nolock 12 API calls 19512->19516 19513 7ff707a04887 GetLastError 19517 7ff707a04368 _fread_nolock 11 API calls 19513->19517 19514->19160 19514->19161 19515->19512 19516->19514 19520 7ff707a04894 19517->19520 19518 7ff707a048c2 19518->19514 19519 7ff707a0ebb0 _fread_nolock MultiByteToWideChar 19518->19519 19523 7ff707a04906 19519->19523 19524 7ff707a043f4 _get_daylight 11 API calls 19520->19524 19521->19513 19521->19518 19522 7ff707a048b5 19521->19522 19525 7ff707a09c58 __free_lconv_num 11 API calls 19521->19525 19526 7ff707a0c90c _fread_nolock 12 API calls 19522->19526 19523->19513 19523->19514 19524->19514 19525->19522 19526->19518 19528 7ff707a0853d 19527->19528 19535 7ff707a08539 19527->19535 19548 7ff707a11d4c GetEnvironmentStringsW 19528->19548 19531 7ff707a0854a 19533 7ff707a09c58 __free_lconv_num 11 API calls 19531->19533 19532 7ff707a08556 19555 7ff707a086a4 19532->19555 19533->19535 19535->19191 19540 7ff707a088e4 19535->19540 19537 7ff707a09c58 __free_lconv_num 11 API calls 19538 7ff707a0857d 19537->19538 19539 7ff707a09c58 __free_lconv_num 11 API calls 19538->19539 19539->19535 19541 7ff707a08907 19540->19541 19542 7ff707a0891e 19540->19542 19541->19191 19542->19541 19543 7ff707a0dea8 _get_daylight 11 API calls 19542->19543 19544 7ff707a08992 19542->19544 19545 7ff707a0ebb0 MultiByteToWideChar _fread_nolock 19542->19545 19547 7ff707a09c58 __free_lconv_num 11 API calls 19542->19547 19543->19542 19546 7ff707a09c58 __free_lconv_num 11 API calls 19544->19546 19545->19542 19546->19541 19547->19542 19549 7ff707a11d70 19548->19549 19550 7ff707a08542 19548->19550 19551 7ff707a0c90c _fread_nolock 12 API calls 19549->19551 19550->19531 19550->19532 19552 7ff707a11da7 memcpy_s 19551->19552 19553 7ff707a09c58 __free_lconv_num 11 API calls 19552->19553 19554 7ff707a11dc7 FreeEnvironmentStringsW 19553->19554 19554->19550 19556 7ff707a086cc 19555->19556 19557 7ff707a0dea8 _get_daylight 11 API calls 19556->19557 19569 7ff707a08707 19557->19569 19558 7ff707a0870f 19559 7ff707a09c58 __free_lconv_num 11 API calls 19558->19559 19560 7ff707a0855e 19559->19560 19560->19537 19561 7ff707a08789 19562 7ff707a09c58 __free_lconv_num 11 API calls 19561->19562 19562->19560 19563 7ff707a0dea8 _get_daylight 11 API calls 19563->19569 19564 7ff707a08778 19566 7ff707a087c0 11 API calls 19564->19566 19565 7ff707a0f784 37 API calls 19565->19569 19567 7ff707a08780 19566->19567 19570 7ff707a09c58 __free_lconv_num 11 API calls 19567->19570 19568 7ff707a087ac 19571 7ff707a09c10 _isindst 17 API calls 19568->19571 19569->19558 19569->19561 19569->19563 19569->19564 19569->19565 19569->19568 19572 7ff707a09c58 __free_lconv_num 11 API calls 19569->19572 19570->19558 19573 7ff707a087be 19571->19573 19572->19569 19575 7ff707a17e41 __crtLCMapStringW 19574->19575 19576 7ff707a0e278 6 API calls 19575->19576 19577 7ff707a163fe 19575->19577 19576->19577 19577->19215 19577->19216 20056 7ff7079fbe70 20057 7ff7079fbe80 20056->20057 20073 7ff707a08ec0 20057->20073 20059 7ff7079fbe8c 20079 7ff7079fc168 20059->20079 20061 7ff7079fc44c 7 API calls 20063 7ff7079fbf25 20061->20063 20062 7ff7079fbea4 _RTC_Initialize 20071 7ff7079fbef9 20062->20071 20084 7ff7079fc318 20062->20084 20065 7ff7079fbeb9 20087 7ff707a0832c 20065->20087 20071->20061 20072 7ff7079fbf15 20071->20072 20074 7ff707a08ed1 20073->20074 20075 7ff707a043f4 _get_daylight 11 API calls 20074->20075 20076 7ff707a08ed9 20074->20076 20077 7ff707a08ee8 20075->20077 20076->20059 20078 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 20077->20078 20078->20076 20080 7ff7079fc179 20079->20080 20083 7ff7079fc17e __scrt_release_startup_lock 20079->20083 20081 7ff7079fc44c 7 API calls 20080->20081 20080->20083 20082 7ff7079fc1f2 20081->20082 20083->20062 20112 7ff7079fc2dc 20084->20112 20086 7ff7079fc321 20086->20065 20088 7ff7079fbec5 20087->20088 20089 7ff707a0834c 20087->20089 20088->20071 20111 7ff7079fc3ec InitializeSListHead 20088->20111 20090 7ff707a0836a GetModuleFileNameW 20089->20090 20091 7ff707a08354 20089->20091 20095 7ff707a08395 20090->20095 20092 7ff707a043f4 _get_daylight 11 API calls 20091->20092 20093 7ff707a08359 20092->20093 20094 7ff707a09bf0 _invalid_parameter_noinfo 37 API calls 20093->20094 20094->20088 20096 7ff707a082cc 11 API calls 20095->20096 20097 7ff707a083d5 20096->20097 20098 7ff707a083dd 20097->20098 20103 7ff707a083f5 20097->20103 20099 7ff707a043f4 _get_daylight 11 API calls 20098->20099 20100 7ff707a083e2 20099->20100 20101 7ff707a09c58 __free_lconv_num 11 API calls 20100->20101 20101->20088 20102 7ff707a08417 20104 7ff707a09c58 __free_lconv_num 11 API calls 20102->20104 20103->20102 20105 7ff707a0845c 20103->20105 20106 7ff707a08443 20103->20106 20104->20088 20108 7ff707a09c58 __free_lconv_num 11 API calls 20105->20108 20107 7ff707a09c58 __free_lconv_num 11 API calls 20106->20107 20109 7ff707a0844c 20107->20109 20108->20102 20110 7ff707a09c58 __free_lconv_num 11 API calls 20109->20110 20110->20088 20113 7ff7079fc2f6 20112->20113 20115 7ff7079fc2ef 20112->20115 20116 7ff707a094fc 20113->20116 20115->20086 20119 7ff707a09138 20116->20119 20126 7ff707a0f5e8 EnterCriticalSection 20119->20126 19578 7ff707a0a2e0 19579 7ff707a0a2fa 19578->19579 19580 7ff707a0a2e5 19578->19580 19584 7ff707a0a300 19580->19584 19585 7ff707a0a34a 19584->19585 19586 7ff707a0a342 19584->19586 19588 7ff707a09c58 __free_lconv_num 11 API calls 19585->19588 19587 7ff707a09c58 __free_lconv_num 11 API calls 19586->19587 19587->19585 19589 7ff707a0a357 19588->19589 19590 7ff707a09c58 __free_lconv_num 11 API calls 19589->19590 19591 7ff707a0a364 19590->19591 19592 7ff707a09c58 __free_lconv_num 11 API calls 19591->19592 19593 7ff707a0a371 19592->19593 19594 7ff707a09c58 __free_lconv_num 11 API calls 19593->19594 19595 7ff707a0a37e 19594->19595 19596 7ff707a09c58 __free_lconv_num 11 API calls 19595->19596 19597 7ff707a0a38b 19596->19597 19598 7ff707a09c58 __free_lconv_num 11 API calls 19597->19598 19599 7ff707a0a398 19598->19599 19600 7ff707a09c58 __free_lconv_num 11 API calls 19599->19600 19601 7ff707a0a3a5 19600->19601 19602 7ff707a09c58 __free_lconv_num 11 API calls 19601->19602 19603 7ff707a0a3b5 19602->19603 19604 7ff707a09c58 __free_lconv_num 11 API calls 19603->19604 19605 7ff707a0a3c5 19604->19605 19610 7ff707a0a1a4 19605->19610 19624 7ff707a0f5e8 EnterCriticalSection 19610->19624 20130 7ff707a09060 20133 7ff707a08fe4 20130->20133 20140 7ff707a0f5e8 EnterCriticalSection 20133->20140

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 7ff7079f1000-7ff7079f3536 call 7ff7079ff138 call 7ff7079ff140 call 7ff7079fbb70 call 7ff707a04700 call 7ff707a04794 call 7ff7079f33e0 14 7ff7079f3544-7ff7079f3566 call 7ff7079f18f0 0->14 15 7ff7079f3538-7ff7079f353f 0->15 21 7ff7079f3736-7ff7079f374c call 7ff7079f3f70 14->21 22 7ff7079f356c-7ff7079f3583 call 7ff7079f1bf0 14->22 16 7ff7079f371a-7ff7079f3735 call 7ff7079fb870 15->16 29 7ff7079f3785-7ff7079f3793 call 7ff7079f25f0 21->29 30 7ff7079f374e-7ff7079f377b call 7ff7079f76a0 21->30 26 7ff7079f3588-7ff7079f35c1 22->26 27 7ff7079f3653-7ff7079f366d call 7ff7079f7e10 26->27 28 7ff7079f35c7-7ff7079f35cb 26->28 41 7ff7079f3695-7ff7079f369c 27->41 42 7ff7079f366f-7ff7079f3675 27->42 32 7ff7079f35cd-7ff7079f35e5 call 7ff707a04560 28->32 33 7ff7079f3638-7ff7079f364d call 7ff7079f18e0 28->33 38 7ff7079f3798-7ff7079f379a 29->38 45 7ff7079f379f-7ff7079f37be call 7ff7079f1bf0 30->45 46 7ff7079f377d-7ff7079f3780 call 7ff7079ff36c 30->46 50 7ff7079f35f2-7ff7079f360a call 7ff707a04560 32->50 51 7ff7079f35e7-7ff7079f35eb 32->51 33->27 33->28 44 7ff7079f3712 38->44 53 7ff7079f3844-7ff7079f3863 call 7ff7079f3e90 41->53 54 7ff7079f36a2-7ff7079f36c0 call 7ff7079f7e10 call 7ff7079f7f80 41->54 48 7ff7079f3682-7ff7079f3690 call 7ff707a0415c 42->48 49 7ff7079f3677-7ff7079f3680 42->49 44->16 61 7ff7079f37c1-7ff7079f37ca 45->61 46->29 48->41 49->48 66 7ff7079f360c-7ff7079f3610 50->66 67 7ff7079f3617-7ff7079f362f call 7ff707a04560 50->67 51->50 69 7ff7079f3865-7ff7079f386f call 7ff7079f3fe0 53->69 70 7ff7079f3871-7ff7079f3882 call 7ff7079f1bf0 53->70 79 7ff7079f36c6-7ff7079f36c9 54->79 80 7ff7079f380f-7ff7079f381e call 7ff7079f8400 54->80 61->61 65 7ff7079f37cc-7ff7079f37e9 call 7ff7079f18f0 61->65 65->26 84 7ff7079f37ef-7ff7079f3800 call 7ff7079f25f0 65->84 66->67 67->33 85 7ff7079f3631 67->85 76 7ff7079f3887-7ff7079f38a1 call 7ff7079f86b0 69->76 70->76 94 7ff7079f38a3 76->94 95 7ff7079f38af-7ff7079f38c1 SetDllDirectoryW 76->95 79->80 86 7ff7079f36cf-7ff7079f36f6 call 7ff7079f1bf0 79->86 92 7ff7079f3820 80->92 93 7ff7079f382c-7ff7079f3836 call 7ff7079f7c40 80->93 84->44 85->33 97 7ff7079f3805-7ff7079f380d call 7ff707a0415c 86->97 98 7ff7079f36fc-7ff7079f3703 call 7ff7079f25f0 86->98 92->93 93->76 110 7ff7079f3838 93->110 94->95 100 7ff7079f38c3-7ff7079f38ca 95->100 101 7ff7079f38d0-7ff7079f38ec call 7ff7079f6560 call 7ff7079f6b00 95->101 97->76 107 7ff7079f3708-7ff7079f370a 98->107 100->101 104 7ff7079f3a50-7ff7079f3a58 100->104 118 7ff7079f38ee-7ff7079f38f4 101->118 119 7ff7079f3947-7ff7079f394a call 7ff7079f6510 101->119 108 7ff7079f3a7d-7ff7079f3aaf call 7ff7079f33d0 call 7ff7079f3080 call 7ff7079f33a0 call 7ff7079f6780 call 7ff7079f6510 104->108 109 7ff7079f3a5a-7ff7079f3a77 PostMessageW GetMessageW 104->109 107->44 109->108 110->53 122 7ff7079f38f6-7ff7079f3903 call 7ff7079f65a0 118->122 123 7ff7079f390e-7ff7079f3918 call 7ff7079f6970 118->123 125 7ff7079f394f-7ff7079f3956 119->125 122->123 132 7ff7079f3905-7ff7079f390c 122->132 134 7ff7079f3923-7ff7079f3931 call 7ff7079f6cd0 123->134 135 7ff7079f391a-7ff7079f3921 123->135 125->104 129 7ff7079f395c-7ff7079f3966 call 7ff7079f30e0 125->129 129->107 141 7ff7079f396c-7ff7079f3980 call 7ff7079f83e0 129->141 137 7ff7079f393a-7ff7079f3942 call 7ff7079f2870 call 7ff7079f6780 132->137 134->125 147 7ff7079f3933 134->147 135->137 137->119 151 7ff7079f39a5-7ff7079f39e8 call 7ff7079f7f20 call 7ff7079f7fc0 call 7ff7079f6780 call 7ff7079f6510 call 7ff7079f7ec0 141->151 152 7ff7079f3982-7ff7079f399f PostMessageW GetMessageW 141->152 147->137 163 7ff7079f3a3d-7ff7079f3a4b call 7ff7079f18a0 151->163 164 7ff7079f39ea-7ff7079f3a00 call 7ff7079f81f0 call 7ff7079f7ec0 151->164 152->151 163->107 164->163 171 7ff7079f3a02-7ff7079f3a10 164->171 172 7ff7079f3a31-7ff7079f3a38 call 7ff7079f2870 171->172 173 7ff7079f3a12-7ff7079f3a2c call 7ff7079f25f0 call 7ff7079f18a0 171->173 172->163 173->107
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: FileModuleName
      • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$ERROR: failed to remove temporary directory: %s$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$MEI$PYINSTALLER_STRICT_UNPACK_MODE$Path exceeds PYI_PATH_MAX limit.$WARNING: failed to remove temporary directory: %s$_MEIPASS2$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-runtime-tmpdir
      • API String ID: 514040917-585287483
      • Opcode ID: f1770e319abfa29e3ed3a0f96f66652fb7dde05eac488e8e917425ea2983622d
      • Instruction ID: 62cd2c53b52a15a220e4b31ac05c993d6d37dbd3e7b1141385b7bac2d706ae20
      • Opcode Fuzzy Hash: f1770e319abfa29e3ed3a0f96f66652fb7dde05eac488e8e917425ea2983622d
      • Instruction Fuzzy Hash: D4F18CA1A28783A1FB18FB25DD552F9A361AF45780FC44032DA1D436D6EF2CE56AC360

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 245 7ff707a15c74-7ff707a15ce7 call 7ff707a159a8 248 7ff707a15ce9-7ff707a15cf2 call 7ff707a043d4 245->248 249 7ff707a15d01-7ff707a15d0b call 7ff707a07830 245->249 256 7ff707a15cf5-7ff707a15cfc call 7ff707a043f4 248->256 254 7ff707a15d0d-7ff707a15d24 call 7ff707a043d4 call 7ff707a043f4 249->254 255 7ff707a15d26-7ff707a15d8f CreateFileW 249->255 254->256 259 7ff707a15e0c-7ff707a15e17 GetFileType 255->259 260 7ff707a15d91-7ff707a15d97 255->260 267 7ff707a16042-7ff707a16062 256->267 262 7ff707a15e19-7ff707a15e54 GetLastError call 7ff707a04368 CloseHandle 259->262 263 7ff707a15e6a-7ff707a15e71 259->263 265 7ff707a15dd9-7ff707a15e07 GetLastError call 7ff707a04368 260->265 266 7ff707a15d99-7ff707a15d9d 260->266 262->256 279 7ff707a15e5a-7ff707a15e65 call 7ff707a043f4 262->279 270 7ff707a15e79-7ff707a15e7c 263->270 271 7ff707a15e73-7ff707a15e77 263->271 265->256 266->265 272 7ff707a15d9f-7ff707a15dd7 CreateFileW 266->272 277 7ff707a15e82-7ff707a15ed7 call 7ff707a07748 270->277 278 7ff707a15e7e 270->278 271->277 272->259 272->265 284 7ff707a15ed9-7ff707a15ee5 call 7ff707a15bb0 277->284 285 7ff707a15ef6-7ff707a15f27 call 7ff707a15728 277->285 278->277 279->256 284->285 290 7ff707a15ee7 284->290 291 7ff707a15f29-7ff707a15f2b 285->291 292 7ff707a15f2d-7ff707a15f6f 285->292 293 7ff707a15ee9-7ff707a15ef1 call 7ff707a09dd0 290->293 291->293 294 7ff707a15f91-7ff707a15f9c 292->294 295 7ff707a15f71-7ff707a15f75 292->295 293->267 298 7ff707a16040 294->298 299 7ff707a15fa2-7ff707a15fa6 294->299 295->294 297 7ff707a15f77-7ff707a15f8c 295->297 297->294 298->267 299->298 301 7ff707a15fac-7ff707a15ff1 CloseHandle CreateFileW 299->301 302 7ff707a15ff3-7ff707a16021 GetLastError call 7ff707a04368 call 7ff707a07970 301->302 303 7ff707a16026-7ff707a1603b 301->303 302->303 303->298
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
      • String ID:
      • API String ID: 1617910340-0
      • Opcode ID: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
      • Instruction ID: fe6f854e6f4c0fca1fbbe4291f83ce86092f99c97a32564259c7db34c11f4fd1
      • Opcode Fuzzy Hash: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
      • Instruction Fuzzy Hash: EEC1B276B28A4185FB10DF69C880AAC7761FB89B98B415235DF2E977D4CF38D462C360

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Find$CloseFileFirst
      • String ID:
      • API String ID: 2295610775-0
      • Opcode ID: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
      • Instruction ID: 789a80a83ead715c88e68f3963b75c78320679457a86672a199f532e2a474670
      • Opcode Fuzzy Hash: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
      • Instruction Fuzzy Hash: C6F06862A2D64286F7A09F64F849B66B390AF84768F850335D96D026D4DF3CD05A8A14

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 179 7ff7079f18f0-7ff7079f192b call 7ff7079f3f70 182 7ff7079f1bc1-7ff7079f1be5 call 7ff7079fb870 179->182 183 7ff7079f1931-7ff7079f1971 call 7ff7079f76a0 179->183 188 7ff7079f1bae-7ff7079f1bb1 call 7ff7079ff36c 183->188 189 7ff7079f1977-7ff7079f1987 call 7ff7079ff9f4 183->189 193 7ff7079f1bb6-7ff7079f1bbe 188->193 194 7ff7079f19a1-7ff7079f19bd call 7ff7079ff6bc 189->194 195 7ff7079f1989-7ff7079f199c call 7ff7079f2760 189->195 193->182 200 7ff7079f19bf-7ff7079f19d2 call 7ff7079f2760 194->200 201 7ff7079f19d7-7ff7079f19ec call 7ff707a04154 194->201 195->188 200->188 206 7ff7079f1a06-7ff7079f1a9f call 7ff7079f1bf0 * 2 call 7ff7079ff9f4 call 7ff707a04170 201->206 207 7ff7079f19ee-7ff7079f1a01 call 7ff7079f2760 201->207 218 7ff7079f1aa1-7ff7079f1ab4 call 7ff7079f2760 206->218 219 7ff7079f1ab9-7ff7079f1ad2 call 7ff7079ff6bc 206->219 207->188 218->188 224 7ff7079f1ad4-7ff7079f1ae7 call 7ff7079f2760 219->224 225 7ff7079f1aec-7ff7079f1b08 call 7ff7079ff430 219->225 224->188 230 7ff7079f1b1b-7ff7079f1b29 225->230 231 7ff7079f1b0a-7ff7079f1b16 call 7ff7079f25f0 225->231 230->188 233 7ff7079f1b2f-7ff7079f1b3e 230->233 231->188 235 7ff7079f1b40-7ff7079f1b46 233->235 236 7ff7079f1b60-7ff7079f1b6f 235->236 237 7ff7079f1b48-7ff7079f1b55 235->237 236->236 238 7ff7079f1b71-7ff7079f1b7a 236->238 237->238 239 7ff7079f1b8f 238->239 240 7ff7079f1b7c-7ff7079f1b7f 238->240 242 7ff7079f1b91-7ff7079f1bac 239->242 240->239 241 7ff7079f1b81-7ff7079f1b84 240->241 241->239 243 7ff7079f1b86-7ff7079f1b89 241->243 242->188 242->235 243->239 244 7ff7079f1b8b-7ff7079f1b8d 243->244 244->242
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _fread_nolock$Message
      • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
      • API String ID: 677216364-3497178890
      • Opcode ID: 620aea597a158353c9f1a37f88c06735d5bdd80b8431eba8f18faed9ceb3e2c9
      • Instruction ID: d47f74af4d0afbe97d8ceb596ccbe7aef7bffc256507200c12b8b763785e4d97
      • Opcode Fuzzy Hash: 620aea597a158353c9f1a37f88c06735d5bdd80b8431eba8f18faed9ceb3e2c9
      • Instruction Fuzzy Hash: C07184B1A2868BC5EB20EB28D8507B9A391FF48785F844035D98D47799EF2CE5478760

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 308 7ff707a0ad6c-7ff707a0ad92 309 7ff707a0adad-7ff707a0adb1 308->309 310 7ff707a0ad94-7ff707a0ada8 call 7ff707a043d4 call 7ff707a043f4 308->310 312 7ff707a0b187-7ff707a0b193 call 7ff707a043d4 call 7ff707a043f4 309->312 313 7ff707a0adb7-7ff707a0adbe 309->313 324 7ff707a0b19e 310->324 332 7ff707a0b199 call 7ff707a09bf0 312->332 313->312 315 7ff707a0adc4-7ff707a0adf2 313->315 315->312 318 7ff707a0adf8-7ff707a0adff 315->318 321 7ff707a0ae18-7ff707a0ae1b 318->321 322 7ff707a0ae01-7ff707a0ae13 call 7ff707a043d4 call 7ff707a043f4 318->322 327 7ff707a0ae21-7ff707a0ae27 321->327 328 7ff707a0b183-7ff707a0b185 321->328 322->332 330 7ff707a0b1a1-7ff707a0b1b8 324->330 327->328 329 7ff707a0ae2d-7ff707a0ae30 327->329 328->330 329->322 333 7ff707a0ae32-7ff707a0ae57 329->333 332->324 336 7ff707a0ae59-7ff707a0ae5b 333->336 337 7ff707a0ae8a-7ff707a0ae91 333->337 339 7ff707a0ae5d-7ff707a0ae64 336->339 340 7ff707a0ae82-7ff707a0ae88 336->340 341 7ff707a0ae93-7ff707a0ae9f call 7ff707a0c90c 337->341 342 7ff707a0ae66-7ff707a0ae7d call 7ff707a043d4 call 7ff707a043f4 call 7ff707a09bf0 337->342 339->340 339->342 344 7ff707a0af08-7ff707a0af1f 340->344 349 7ff707a0aea4-7ff707a0aebb call 7ff707a09c58 * 2 341->349 373 7ff707a0b010 342->373 347 7ff707a0af9a-7ff707a0afa4 call 7ff707a12c2c 344->347 348 7ff707a0af21-7ff707a0af29 344->348 361 7ff707a0afaa-7ff707a0afbf 347->361 362 7ff707a0b02e 347->362 348->347 353 7ff707a0af2b-7ff707a0af2d 348->353 369 7ff707a0aed8-7ff707a0af03 call 7ff707a0b594 349->369 370 7ff707a0aebd-7ff707a0aed3 call 7ff707a043f4 call 7ff707a043d4 349->370 353->347 357 7ff707a0af2f-7ff707a0af45 353->357 357->347 358 7ff707a0af47-7ff707a0af53 357->358 358->347 363 7ff707a0af55-7ff707a0af57 358->363 361->362 367 7ff707a0afc1-7ff707a0afd3 GetConsoleMode 361->367 365 7ff707a0b033-7ff707a0b053 ReadFile 362->365 363->347 368 7ff707a0af59-7ff707a0af71 363->368 371 7ff707a0b059-7ff707a0b061 365->371 372 7ff707a0b14d-7ff707a0b156 GetLastError 365->372 367->362 374 7ff707a0afd5-7ff707a0afdd 367->374 368->347 376 7ff707a0af73-7ff707a0af7f 368->376 369->344 370->373 371->372 378 7ff707a0b067 371->378 381 7ff707a0b158-7ff707a0b16e call 7ff707a043f4 call 7ff707a043d4 372->381 382 7ff707a0b173-7ff707a0b176 372->382 375 7ff707a0b013-7ff707a0b01d call 7ff707a09c58 373->375 374->365 380 7ff707a0afdf-7ff707a0b001 ReadConsoleW 374->380 375->330 376->347 385 7ff707a0af81-7ff707a0af83 376->385 389 7ff707a0b06e-7ff707a0b083 378->389 391 7ff707a0b022-7ff707a0b02c 380->391 392 7ff707a0b003 GetLastError 380->392 381->373 386 7ff707a0b009-7ff707a0b00b call 7ff707a04368 382->386 387 7ff707a0b17c-7ff707a0b17e 382->387 385->347 395 7ff707a0af85-7ff707a0af95 385->395 386->373 387->375 389->375 397 7ff707a0b085-7ff707a0b090 389->397 391->389 392->386 395->347 401 7ff707a0b0b7-7ff707a0b0bf 397->401 402 7ff707a0b092-7ff707a0b0ab call 7ff707a0a984 397->402 405 7ff707a0b13b-7ff707a0b148 call 7ff707a0a7c4 401->405 406 7ff707a0b0c1-7ff707a0b0d3 401->406 410 7ff707a0b0b0-7ff707a0b0b2 402->410 405->410 407 7ff707a0b12e-7ff707a0b136 406->407 408 7ff707a0b0d5 406->408 407->375 411 7ff707a0b0da-7ff707a0b0e1 408->411 410->375 413 7ff707a0b11d-7ff707a0b128 411->413 414 7ff707a0b0e3-7ff707a0b0e7 411->414 413->407 415 7ff707a0b0e9-7ff707a0b0f0 414->415 416 7ff707a0b103 414->416 415->416 417 7ff707a0b0f2-7ff707a0b0f6 415->417 418 7ff707a0b109-7ff707a0b119 416->418 417->416 419 7ff707a0b0f8-7ff707a0b101 417->419 418->411 420 7ff707a0b11b 418->420 419->418 420->407
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 68a47ba86f230bb5d63a3bd262fc543bc7d5861b4e9f61d57eff9af495398285
      • Instruction ID: affda7fa63f696c165de75bab3d1fb5b24d683f1ec917269e61cf1f8454c4416
      • Opcode Fuzzy Hash: 68a47ba86f230bb5d63a3bd262fc543bc7d5861b4e9f61d57eff9af495398285
      • Instruction Fuzzy Hash: 43C1F6E290C78695E610AB289C00ABEB751FF91BC1F954931DA5D83791CF7CE85783B0

      Control-flow Graph

      APIs
      • GetModuleFileNameW.KERNEL32(?,00007FF7079F3534), ref: 00007FF7079F3411
        • Part of subcall function 00007FF7079F29E0: GetLastError.KERNEL32(?,?,?,00007FF7079F342E,?,00007FF7079F3534), ref: 00007FF7079F2A14
        • Part of subcall function 00007FF7079F29E0: FormatMessageW.KERNEL32(?,?,?,00007FF7079F342E), ref: 00007FF7079F2A7D
        • Part of subcall function 00007FF7079F29E0: MessageBoxW.USER32 ref: 00007FF7079F2ACF
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Message$ErrorFileFormatLastModuleName
      • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
      • API String ID: 517058245-2863816727
      • Opcode ID: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
      • Instruction ID: e60028dffde2be2469e5cfb323ee468589feb00a88ad4abee17510cc2dce6995
      • Opcode Fuzzy Hash: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
      • Instruction Fuzzy Hash: BF2171A1B2C54391FA61BB28EC517B9D250BF49395FC00136D65D866E5EF2CE507C730

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Message$ByteCharMultiWide
      • String ID: Error$Error/warning (ANSI fallback)
      • API String ID: 1878133881-653037927
      • Opcode ID: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
      • Instruction ID: d4068887c32aa36b23ac310cd0c03c12e5c4f88bef5bb00ae4b91ee379b77e71
      • Opcode Fuzzy Hash: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
      • Instruction Fuzzy Hash: C21190B2628B8681FA20AB14F851BA9B364FF48784FD01136DA4C47644CF3CD606C760

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
      • String ID:
      • API String ID: 3251591375-0
      • Opcode ID: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
      • Instruction ID: 5663a80ca937884bcc36155d0ebbd6c88f9cf421991eb5d70dfebf5b33eff57f
      • Opcode Fuzzy Hash: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
      • Instruction Fuzzy Hash: 02313A91E2C64B81FA54BB689C127B993919F46384FC88435E90E477D3DF2DA807C275

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Process$CurrentExitTerminate
      • String ID:
      • API String ID: 1703294689-0
      • Opcode ID: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
      • Instruction ID: fc569db753d76504541e96bb10d88038a84c9024faeea732515eceb14185235e
      • Opcode Fuzzy Hash: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
      • Instruction Fuzzy Hash: 64D09ED0F1960687FB587B785C9997992115F5C702F901938D84B463A3DF3CA81F43B4

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 527 7ff7079ff45c-7ff7079ff489 528 7ff7079ff4a5 527->528 529 7ff7079ff48b-7ff7079ff48e 527->529 531 7ff7079ff4a7-7ff7079ff4bb 528->531 529->528 530 7ff7079ff490-7ff7079ff493 529->530 532 7ff7079ff495-7ff7079ff49a call 7ff707a043f4 530->532 533 7ff7079ff4bc-7ff7079ff4bf 530->533 545 7ff7079ff4a0 call 7ff707a09bf0 532->545 534 7ff7079ff4c1-7ff7079ff4cd 533->534 535 7ff7079ff4cf-7ff7079ff4d3 533->535 534->535 537 7ff7079ff4fa-7ff7079ff503 534->537 538 7ff7079ff4d5-7ff7079ff4df call 7ff707a197e0 535->538 539 7ff7079ff4e7-7ff7079ff4ea 535->539 543 7ff7079ff505-7ff7079ff508 537->543 544 7ff7079ff50a 537->544 538->539 539->532 542 7ff7079ff4ec-7ff7079ff4f8 539->542 542->532 542->537 547 7ff7079ff50f-7ff7079ff52e 543->547 544->547 545->528 549 7ff7079ff675-7ff7079ff678 547->549 550 7ff7079ff534-7ff7079ff542 547->550 549->531 551 7ff7079ff544-7ff7079ff54b 550->551 552 7ff7079ff5ba-7ff7079ff5bf 550->552 551->552 553 7ff7079ff54d 551->553 554 7ff7079ff5c1-7ff7079ff5cd 552->554 555 7ff7079ff62c-7ff7079ff62f call 7ff707a0b1bc 552->555 557 7ff7079ff553-7ff7079ff55d 553->557 558 7ff7079ff6a0 553->558 559 7ff7079ff5cf-7ff7079ff5d6 554->559 560 7ff7079ff5d9-7ff7079ff5df 554->560 564 7ff7079ff634-7ff7079ff637 555->564 562 7ff7079ff67d-7ff7079ff681 557->562 565 7ff7079ff563-7ff7079ff569 557->565 563 7ff7079ff6a5-7ff7079ff6b0 558->563 559->560 561 7ff7079ff5e5-7ff7079ff602 call 7ff707a0978c call 7ff707a0ad6c 560->561 560->562 586 7ff7079ff607-7ff7079ff609 561->586 568 7ff7079ff683-7ff7079ff68b call 7ff707a197e0 562->568 569 7ff7079ff690-7ff7079ff69b call 7ff707a043f4 562->569 563->531 564->563 571 7ff7079ff639-7ff7079ff63c 564->571 566 7ff7079ff5a1-7ff7079ff5b5 565->566 567 7ff7079ff56b-7ff7079ff56e 565->567 578 7ff7079ff65c-7ff7079ff667 566->578 572 7ff7079ff570-7ff7079ff576 567->572 573 7ff7079ff58c-7ff7079ff597 call 7ff707a043f4 call 7ff707a09bf0 567->573 568->569 569->545 571->562 577 7ff7079ff63e-7ff7079ff655 571->577 579 7ff7079ff582-7ff7079ff587 call 7ff707a197e0 572->579 580 7ff7079ff578-7ff7079ff580 call 7ff707a19140 572->580 593 7ff7079ff59c 573->593 577->578 578->550 584 7ff7079ff66d 578->584 579->573 580->593 584->549 590 7ff7079ff6b5-7ff7079ff6ba 586->590 591 7ff7079ff60f 586->591 590->563 591->558 594 7ff7079ff615-7ff7079ff62a 591->594 593->566 594->578
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: bcfcf1faf55df9f9e23f958511fce33fc2a490ff62131b022dace26bbec7c8c2
      • Instruction ID: f3753b1836bacc79054fe5b2e5f967d759cee65600e7c44b1567c99304b9ed6d
      • Opcode Fuzzy Hash: bcfcf1faf55df9f9e23f958511fce33fc2a490ff62131b022dace26bbec7c8c2
      • Instruction Fuzzy Hash: 4651C962B1968746F624BE399C04A7AA292FF44BB4F944734DD7D477D5CF3CE4028620

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: ErrorFileLastPointer
      • String ID:
      • API String ID: 2976181284-0
      • Opcode ID: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
      • Instruction ID: efb92377010c812123f6f7b23e21ac8535849d8c6a45c13830e408ddd6bfcf46
      • Opcode Fuzzy Hash: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
      • Instruction Fuzzy Hash: 2811C1E1A08A8181DA10AB29AD44579A361FF44BF4F940731EE7D47BE9CF7CD15287A0

      Control-flow Graph

      APIs
      • CloseHandle.KERNELBASE(?,?,?,00007FF707A09CE5,?,?,00000000,00007FF707A09D9A), ref: 00007FF707A09ED6
      • GetLastError.KERNEL32(?,?,?,00007FF707A09CE5,?,?,00000000,00007FF707A09D9A), ref: 00007FF707A09EE0
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: CloseErrorHandleLast
      • String ID:
      • API String ID: 918212764-0
      • Opcode ID: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
      • Instruction ID: a748b8d0ee1beaf9eb82687c94cc21b2f5a13ab422aa85f49e1314a026067a79
      • Opcode Fuzzy Hash: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
      • Instruction Fuzzy Hash: 8821D791F1C68240FE54B77DAC4077E92915F847A1F840A35EA2D873D2CF6CB84383A1

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
      • Instruction ID: a9cdffff2838f18c5dda1d7c134ec7e9d0e9f7ae2cb49b5b1aad2fb8a11db608
      • Opcode Fuzzy Hash: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
      • Instruction Fuzzy Hash: 1741B6B290824147EA24AB3DAE5157EB3A0EF55782F540531D69DC3691CF3CE503C7B1

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _fread_nolock
      • String ID:
      • API String ID: 840049012-0
      • Opcode ID: dd5b2227001afc13c5a7990e13e49d1c192561707a6cc0805bc8ebd48f98ae76
      • Instruction ID: 99ce88e23023d280247e0ba5daa9dda8e59014eebb364af9869d9c26b74a95c9
      • Opcode Fuzzy Hash: dd5b2227001afc13c5a7990e13e49d1c192561707a6cc0805bc8ebd48f98ae76
      • Instruction Fuzzy Hash: 6A216021B3869245FA10BA66AD047BAE651BF49BD4FC84430EE0D4B786DF7DE043C620

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 41d876f7d863186cb99ffae5cfc70294694b7844598519de76c307bd1dc1648a
      • Instruction ID: b834407d89da3eb635f7606e498dae412788e26c5e5fca4058f0d76726846acf
      • Opcode Fuzzy Hash: 41d876f7d863186cb99ffae5cfc70294694b7844598519de76c307bd1dc1648a
      • Instruction Fuzzy Hash: 1931B2A2A1868182E6057B7D9C40B7DA650AF54BA2F814935DA1D833D2CF7CE45383B1
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: HandleModule$AddressFreeLibraryProc
      • String ID:
      • API String ID: 3947729631-0
      • Opcode ID: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
      • Instruction ID: 4caf3c147920db4a52f4b5dee5cefcd6238a427bcb5231240c95a3754b5de4fe
      • Opcode Fuzzy Hash: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
      • Instruction Fuzzy Hash: BE21A1B2A167058AEB24AF78C8506EC73B0FF04719F840A3AD61C86AC5DF3CD446C7A4
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
      • Instruction ID: 10867722c7c56b2a99ceddd7520e6da88194f5d98529a4e35d96f6996b08a431
      • Opcode Fuzzy Hash: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
      • Instruction Fuzzy Hash: 3211A761E0D68141EA60BF799C00D7EE2A4BF59B81FC44831EB4CD7696CF3CD4628BA1
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
      • Instruction ID: 7ae0c5dffc73712f7318144eb94c4300e84b0b538a6da3778e248dad25db5611
      • Opcode Fuzzy Hash: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
      • Instruction Fuzzy Hash: 262198B2A1868186EB61AF1CD840779B661EFC4B94F984234D65D877D5DF3CD412CB10
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
      • Instruction ID: d072bc910d00dedc8f41672b653c737bd0147e85bec807a8dc65c1b9d4d16b47
      • Opcode Fuzzy Hash: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
      • Instruction Fuzzy Hash: 6501C461A1878341EA04FF669D0046AE696BF96FE0F884631EE6C53BD6DF3CE5138710
      APIs
      • HeapAlloc.KERNEL32(?,?,?,00007FF7079FFFB0,?,?,?,00007FF707A0161A,?,?,?,?,?,00007FF707A02E09), ref: 00007FF707A0C94A
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: AllocHeap
      • String ID:
      • API String ID: 4292702814-0
      • Opcode ID: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
      • Instruction ID: 3ec25def307bf4bd984e8fe566c8a4d124d631b24b5c7b33e52ace2d8074d70a
      • Opcode Fuzzy Hash: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
      • Instruction Fuzzy Hash: 9CF03A80F1824744FE1476B95C11AB591805F487B2F880B30A96EC56C1EF1CA45382B0
      APIs
      • GetProcAddress.KERNEL32(?,00007FF7079F5C57,?,00007FF7079F308E), ref: 00007FF7079F50C0
      • GetProcAddress.KERNEL32(?,00007FF7079F5C57,?,00007FF7079F308E), ref: 00007FF7079F5101
      • GetProcAddress.KERNEL32(?,00007FF7079F5C57,?,00007FF7079F308E), ref: 00007FF7079F5126
      • GetProcAddress.KERNEL32(?,00007FF7079F5C57,?,00007FF7079F308E), ref: 00007FF7079F514B
      • GetProcAddress.KERNEL32(?,00007FF7079F5C57,?,00007FF7079F308E), ref: 00007FF7079F5173
      • GetProcAddress.KERNEL32(?,00007FF7079F5C57,?,00007FF7079F308E), ref: 00007FF7079F519B
      • GetProcAddress.KERNEL32(?,00007FF7079F5C57,?,00007FF7079F308E), ref: 00007FF7079F51C3
      • GetProcAddress.KERNEL32(?,00007FF7079F5C57,?,00007FF7079F308E), ref: 00007FF7079F51EB
      • GetProcAddress.KERNEL32(?,00007FF7079F5C57,?,00007FF7079F308E), ref: 00007FF7079F5213
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
      • API String ID: 190572456-2007157414
      • Opcode ID: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
      • Instruction ID: ecbf5e6b055c44e724f83941b8edb52262f72f4dba64aa056435c1c0888f2c58
      • Opcode Fuzzy Hash: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
      • Instruction Fuzzy Hash: CD1296E499EB0391FA55FB08AC509B4A3A0AF09761BD92435D81E123A0FF7CB55BC370
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
      • API String ID: 808467561-2761157908
      • Opcode ID: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
      • Instruction ID: c4679132e372f36dd6904c78bd52129b8c14760be43ae1c9c9318aec08e1bd07
      • Opcode Fuzzy Hash: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
      • Instruction Fuzzy Hash: E4B2E6B2A182828BFB659F6DD840BFDB7A1FF54384F845135DA0D57B84DB38A902CB50
      APIs
      • FindFirstFileW.KERNEL32(?,00007FF7079F7EF9,00007FF7079F39E6), ref: 00007FF7079F7A1B
      • RemoveDirectoryW.KERNEL32(?,00007FF7079F7EF9,00007FF7079F39E6), ref: 00007FF7079F7A9E
      • DeleteFileW.KERNEL32(?,00007FF7079F7EF9,00007FF7079F39E6), ref: 00007FF7079F7ABD
      • FindNextFileW.KERNEL32(?,00007FF7079F7EF9,00007FF7079F39E6), ref: 00007FF7079F7ACB
      • FindClose.KERNEL32(?,00007FF7079F7EF9,00007FF7079F39E6), ref: 00007FF7079F7ADC
      • RemoveDirectoryW.KERNEL32(?,00007FF7079F7EF9,00007FF7079F39E6), ref: 00007FF7079F7AE5
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
      • String ID: %s\*
      • API String ID: 1057558799-766152087
      • Opcode ID: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
      • Instruction ID: d4a30aedf41bc48a3a35f8a7a4aa774064a5c9cf9512c9bdeec9c78952bbc41d
      • Opcode Fuzzy Hash: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
      • Instruction Fuzzy Hash: BC41C261A2D94391FA20BB68EC449B9A361FF98750FC10632D99D436D4DF3CD64BC720
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
      • API String ID: 0-2665694366
      • Opcode ID: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
      • Instruction ID: de21560019932b214412b07bfa4361a564c994d3c919ac92bcdb9afb527814a2
      • Opcode Fuzzy Hash: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
      • Instruction Fuzzy Hash: 7752F672A286A64BD7A49F14C858B7E7BE9FF45340F818139E64E87780DB3CE845CB50
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
      • String ID:
      • API String ID: 3140674995-0
      • Opcode ID: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
      • Instruction ID: 91e560971d16e0d64d61e6eff8a1f9f7a1c333119f9ea62c933990aa68dd6074
      • Opcode Fuzzy Hash: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
      • Instruction Fuzzy Hash: D5316DB2618B8186EB60AF64E8407FEB365FF85744F84403ADA4D47B98DF38D549C720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Message$ErrorFormatLast
      • String ID: %ls%ls: %ls$<FormatMessageW failed.>$Error
      • API String ID: 3971115935-1149178304
      • Opcode ID: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
      • Instruction ID: 59d5e211cd619bdbb4ded2f9b4ec78ae6815d3d0601b2a55722a82baf9e819db
      • Opcode Fuzzy Hash: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
      • Instruction Fuzzy Hash: 832115B2618A8581F720AB14F8506DAB3A4FF88784F900136EACD53B58DF7CD557C754
      APIs
      • _get_daylight.LIBCMT ref: 00007FF707A14F55
        • Part of subcall function 00007FF707A148A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF707A148BC
        • Part of subcall function 00007FF707A09C58: HeapFree.KERNEL32(?,?,?,00007FF707A12032,?,?,?,00007FF707A1206F,?,?,00000000,00007FF707A12535,?,?,?,00007FF707A12467), ref: 00007FF707A09C6E
        • Part of subcall function 00007FF707A09C58: GetLastError.KERNEL32(?,?,?,00007FF707A12032,?,?,?,00007FF707A1206F,?,?,00000000,00007FF707A12535,?,?,?,00007FF707A12467), ref: 00007FF707A09C78
        • Part of subcall function 00007FF707A09C10: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF707A09BEF,?,?,?,?,?,00007FF707A09ADA), ref: 00007FF707A09C19
        • Part of subcall function 00007FF707A09C10: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF707A09BEF,?,?,?,?,?,00007FF707A09ADA), ref: 00007FF707A09C3E
      • _get_daylight.LIBCMT ref: 00007FF707A14F44
        • Part of subcall function 00007FF707A14908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF707A1491C
      • _get_daylight.LIBCMT ref: 00007FF707A151BA
      • _get_daylight.LIBCMT ref: 00007FF707A151CB
      • _get_daylight.LIBCMT ref: 00007FF707A151DC
      • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF707A1541C), ref: 00007FF707A15203
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
      • String ID:
      • API String ID: 4070488512-0
      • Opcode ID: ec3da476d7abf2ffb0f6397319154e28f094a84f5b0708b50d9998a811af1003
      • Instruction ID: 3b5c8fa3f04e449474397f1380b7996214fcc187a5a4b32e114fdfa9bf6facc2
      • Opcode Fuzzy Hash: ec3da476d7abf2ffb0f6397319154e28f094a84f5b0708b50d9998a811af1003
      • Instruction Fuzzy Hash: 0BD1AFA6E1829286F724BF2DDC509B9A391EF84784FC44135EA0D47B85DF3CE452C760
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
      • String ID:
      • API String ID: 1239891234-0
      • Opcode ID: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
      • Instruction ID: 69aef0dad878db75fd9943ca368d339436260ae8a6704f0bd4c192a7a19d4c07
      • Opcode Fuzzy Hash: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
      • Instruction Fuzzy Hash: 79317472618B8185EB60DF29EC406AEB3A4FF88754F940135EA9D43B65DF3CD156CB10
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: FileFindFirst_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2227656907-0
      • Opcode ID: 537ca4dcf685df196dbb745ebf7a8e3eb288cf6b089b90446fc853c3fde494ee
      • Instruction ID: 45cf56317943458990a51ac8d33133dccfdfb2934b5ae0bcabba9fdbe8d7d9e2
      • Opcode Fuzzy Hash: 537ca4dcf685df196dbb745ebf7a8e3eb288cf6b089b90446fc853c3fde494ee
      • Instruction Fuzzy Hash: 85B1B7A6B1969681FA60AB2A9C009BBF391EF44BE4F845131ED5D47BC5DF3CE482C710
      APIs
      • _get_daylight.LIBCMT ref: 00007FF707A151BA
        • Part of subcall function 00007FF707A14908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF707A1491C
      • _get_daylight.LIBCMT ref: 00007FF707A151CB
        • Part of subcall function 00007FF707A148A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF707A148BC
      • _get_daylight.LIBCMT ref: 00007FF707A151DC
        • Part of subcall function 00007FF707A148D8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF707A148EC
        • Part of subcall function 00007FF707A09C58: HeapFree.KERNEL32(?,?,?,00007FF707A12032,?,?,?,00007FF707A1206F,?,?,00000000,00007FF707A12535,?,?,?,00007FF707A12467), ref: 00007FF707A09C6E
        • Part of subcall function 00007FF707A09C58: GetLastError.KERNEL32(?,?,?,00007FF707A12032,?,?,?,00007FF707A1206F,?,?,00000000,00007FF707A12535,?,?,?,00007FF707A12467), ref: 00007FF707A09C78
      • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF707A1541C), ref: 00007FF707A15203
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
      • String ID:
      • API String ID: 3458911817-0
      • Opcode ID: 246ddfbbe37c4787f9720b27dc9f743496b3bb1ed6dcb5155dd6029a6c9a153e
      • Instruction ID: 4101d1f353a27ebab3f4e44e0a2199d081c17b9a415caa2c15351866a54be879
      • Opcode Fuzzy Hash: 246ddfbbe37c4787f9720b27dc9f743496b3bb1ed6dcb5155dd6029a6c9a153e
      • Instruction Fuzzy Hash: A95170B2E1868286F710FF2DEC909A9A360BF88784F844135EA0D87795DF3CE4528760
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
      • String ID:
      • API String ID: 2933794660-0
      • Opcode ID: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
      • Instruction ID: b2441ebf8f30315191a2fc1df7ad746a484bc32a703fb81d4c50b1aaad015d96
      • Opcode Fuzzy Hash: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
      • Instruction Fuzzy Hash: 53114C62B18B458AEB00DB64EC446A873A4FB59758F840E31DA2D46BA4DF7CD19A8350
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: memcpy_s
      • String ID:
      • API String ID: 1502251526-0
      • Opcode ID: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
      • Instruction ID: 119e9e951df09d024f8ffcd62f658cf2bb1ba4c434903ba699b7644575e7fa83
      • Opcode Fuzzy Hash: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
      • Instruction Fuzzy Hash: CBC1E4B2B1868687EF24DF19A444A6AF791FB94B84F858135DB4E47784DF3DE802CB00
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID: $header crc mismatch$unknown header flags set
      • API String ID: 0-1127688429
      • Opcode ID: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
      • Instruction ID: db3175ae7911c313068d75d73aee554952e9931f521dc2183f4c15ef3906bdd6
      • Opcode Fuzzy Hash: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
      • Instruction Fuzzy Hash: E7F1C572A283C64BE7A5AF19C888F3ABAEDEF44754F454534DA4D87390CB38E442C750
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: ExceptionRaise_clrfp
      • String ID:
      • API String ID: 15204871-0
      • Opcode ID: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
      • Instruction ID: 94df3fcb8e47977c11621cec48ce7bf9205d699461f01d2e1c9899416c8d1057
      • Opcode Fuzzy Hash: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
      • Instruction Fuzzy Hash: 31B158B3605B898AEB15CF2DC88676C7BA0FB44B98F198931DA5D837A4CB3DD452C710
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID: $
      • API String ID: 0-227171996
      • Opcode ID: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
      • Instruction ID: 7eb3daaf67f90041641a08731f44d278227caa7b263f7e4f1001f0e23ba17017
      • Opcode Fuzzy Hash: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
      • Instruction Fuzzy Hash: 89E1F7B2A0970285EB68AE3DC854A3DB760FF44B49F944935DA0E836D4DF39D853C390
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID: incorrect header check$invalid window size
      • API String ID: 0-900081337
      • Opcode ID: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
      • Instruction ID: b31135776488e88942ca5c3dac62bd1fe19bd309fcbd3cd844854ace99fec788
      • Opcode Fuzzy Hash: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
      • Instruction Fuzzy Hash: B791B872A282C74BE7A59F14C858B3E7AA9FF45354F518139DA4E867C0CB38E542CB10
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID: e+000$gfff
      • API String ID: 0-3030954782
      • Opcode ID: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
      • Instruction ID: 4e7b8c24fd65574913e9b05bd5ab6bf461ea68bd2edec0eaa844bbb5b43ae45a
      • Opcode Fuzzy Hash: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
      • Instruction Fuzzy Hash: E05146A3B182C146E7249F799C11B69AB91EB44B94F889631CA988BAC1CF3DE442C751
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: CurrentFeaturePresentProcessProcessor
      • String ID:
      • API String ID: 1010374628-0
      • Opcode ID: 5b606b63c70e86b5db4eecb07275e8e9c3e0e1f08e56a2b99ea5de7f73ebbe88
      • Instruction ID: 606dfb273c015e6a157c58aafb8cf2beccb45851497fe1eddbfe93cafa85468b
      • Opcode Fuzzy Hash: 5b606b63c70e86b5db4eecb07275e8e9c3e0e1f08e56a2b99ea5de7f73ebbe88
      • Instruction Fuzzy Hash: F002C3A1F1D68344FA64BB2D9C01E7AE680AF05B91FC54A35ED6D963D2DF3CA4438360
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID: gfffffff
      • API String ID: 0-1523873471
      • Opcode ID: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
      • Instruction ID: 0ac452ea2eb9d4d0e519714abd578397245c4e51a4d9502f41ac1f33504d7f21
      • Opcode Fuzzy Hash: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
      • Instruction Fuzzy Hash: B4A146A3B0878586EB21DF3DA850BAABB90AF50B94F408532DE4D87781DB3DD502C761
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: TMP
      • API String ID: 3215553584-3125297090
      • Opcode ID: fa9fc3ba0f2a0ca574b62e3049f007bc07c74431d5877200bfd71a39e50ac507
      • Instruction ID: 289311c176d6dc22ca9cc0b31a8f05aac1a4805c87db220e9b1bce192c782dbb
      • Opcode Fuzzy Hash: fa9fc3ba0f2a0ca574b62e3049f007bc07c74431d5877200bfd71a39e50ac507
      • Instruction Fuzzy Hash: 25518191F0864241FE64BA3E5D1197AE291AF95BD6F884834DE0E877D5EF3CF44342A0
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: HeapProcess
      • String ID:
      • API String ID: 54951025-0
      • Opcode ID: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
      • Instruction ID: 5472a763a32c858759564dec785cb5a448d84d5e49ae29213ead3133893ec992
      • Opcode Fuzzy Hash: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
      • Instruction Fuzzy Hash: 60B09B50E07645C1E5043B595C4551452557F48700FD54034C40C41320DF2C10B64720
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
      • Instruction ID: 870229dbd380790525591d08b4374676ec791bafc0be207f1347060ea9e5f721
      • Opcode Fuzzy Hash: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
      • Instruction Fuzzy Hash: C3D109A2A0874285EB78AE3D8858B7DA390FF05B59F944935CE0D836D4DF39D853C3A0
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
      • Instruction ID: 59b8ac7b950e7fbcce8c52567af574316935c08feb1af2b06182db1305c524f9
      • Opcode Fuzzy Hash: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
      • Instruction Fuzzy Hash: 63C1A6722142F24FD289FB29E85997A73D1FB98309BD4402BEB8747B85CA3CE415D760
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
      • Instruction ID: 219b9d529dcdd0b5842a0532a17f82e9a6815342dd0bcc4493cfcdea22addfe2
      • Opcode Fuzzy Hash: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
      • Instruction Fuzzy Hash: 1DB1A1B290874585E7649F3DC85867CBBA0FB49B49FA40535CB4E87395CF39E842C7A0
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
      • Instruction ID: 39c69d5610a78aade6844f70b9d97b8c4030fb7e392d157f29d5a84c202ebff1
      • Opcode Fuzzy Hash: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
      • Instruction Fuzzy Hash: E081D2B3B0C68146E774DF6D984077AAA91EF86794F844635EA8D83B89CF3CE4018B50
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: d2b2a23e656420a48cffdcfc29ff0550bdd13d7615b538a3eaf25f4462ec28d4
      • Instruction ID: 3dbca2d75b6cdb6d6402f38befd59e15bb1938db1cc47eae3c4e09fe905f6295
      • Opcode Fuzzy Hash: d2b2a23e656420a48cffdcfc29ff0550bdd13d7615b538a3eaf25f4462ec28d4
      • Instruction Fuzzy Hash: 25610DA2E1C28246F764AA2C8C10E3DE681EFC0770FD44635E65D86BD1DF7DE8128B21
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
      • Instruction ID: c7e06c0cd7c8dc346f6858bf7c111c5331f882dd57025b1395a8883f1633d51f
      • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
      • Instruction Fuzzy Hash: 0A51A3B6A1865982E7249B3DC84066CB3A0FF49B59F644535CA8C87794CB3AE853C7D0
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
      • Instruction ID: 77d6f2102cac2000924732834c25f999437f6da20ac69a7d23f86ebed7b21901
      • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
      • Instruction Fuzzy Hash: 1B51C7B6A1865582E7249B3DC844ABC73A0EF45B59F644531CE4D877A4CF3AE843C790
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
      • Instruction ID: 899569cc7b1ecf7322fdef4babfe4ab87da66c07f5e6178b84ce1cf406477c41
      • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
      • Instruction Fuzzy Hash: 7751B0B2A1865186E7249B3DC440B3EB3A1EF44B69F644531CE8C97795CB3AE843C7E0
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
      • Instruction ID: 1a038a993b000102980418a4f72e4f2ab6463e8c14b948bff0050a45d5e720c6
      • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
      • Instruction Fuzzy Hash: E751D1B2A1869586E7249B3CC440B7EA3A0EF44F59FA44431CE4C97794CB3AEC43C790
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
      • Instruction ID: c7bf2d743177c84acda7f22fe41540ff5116116c9d00ffc1c4816d4ba4a02b5a
      • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
      • Instruction Fuzzy Hash: CF51F6B2A1865581E7649B3DC440ABCB3A1EF48B59FA44431CE4C877A8CF3AE853C7D0
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
      • Instruction ID: fdf081fa964376dc3c69b6b574a831713479f57b2a5e2963c9e5a01e0c948fef
      • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
      • Instruction Fuzzy Hash: 1B51D2B2A1865182E7249B3CC440B3AB7A0EF45F59FA44431CE4D97794DF3AE853C7A0
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
      • Instruction ID: 4891668255f805f3039c6754082b60ca8117988db33c36364c3eeb1e583bcb28
      • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
      • Instruction Fuzzy Hash: F241BAD2D4974A04E955AD3C0D14E789680BF137A2DE81670CD9D933C2DB0D6DA7C9F0
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: ErrorFreeHeapLast
      • String ID:
      • API String ID: 485612231-0
      • Opcode ID: 4c2069438db7bd6821668209f3bed185f6ed925e7f6c63ba07488e81febeb59c
      • Instruction ID: d07ab46d7ee08d49e52fde8f4e50c34018c159b7a2b95466604637b65a293eec
      • Opcode Fuzzy Hash: 4c2069438db7bd6821668209f3bed185f6ed925e7f6c63ba07488e81febeb59c
      • Instruction Fuzzy Hash: 4C41B3A2718A5581EF04DF2EDD5496AB391BB48FD0B899436DE0D97B58DF3CD0438340
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6955196b928ea369f318f1367a91d651b99cb7ed2675060227c8542cf7a82c4a
      • Instruction ID: 1193f7943ec745c9d83f0caa74841ff66ea4c80b3f8cda256210f0a4f76864fd
      • Opcode Fuzzy Hash: 6955196b928ea369f318f1367a91d651b99cb7ed2675060227c8542cf7a82c4a
      • Instruction Fuzzy Hash: 5C310572B08B8241EB24AF396C8053EAAD4AF84BD1F544638EA5D93BD5DF3CE0134754
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
      • Instruction ID: df6efac03813287e4f8eb5b8bd321e555ed7aafe553e96ee169a7b26cf878f6e
      • Opcode Fuzzy Hash: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
      • Instruction Fuzzy Hash: 26F044B1A196958EDB989F2DA812A6977D0FB08380B808039F58983B04DB7C90618F14
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
      • Instruction ID: cd9475cae9403348252fd9ab177062240b0751f1c6b51f7cf939a6a56cdd3b70
      • Opcode Fuzzy Hash: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
      • Instruction Fuzzy Hash: 56A001A192CC6BE0E648AB08AC50525A220BF59300B905071D00D411A0DF3CA4068234
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: AddressProc
      • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
      • API String ID: 190572456-3427451314
      • Opcode ID: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
      • Instruction ID: 123003a7bdf6a3d523cf6c11a6903e6753eda7baa897d961e976e74a697b79d2
      • Opcode Fuzzy Hash: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
      • Instruction Fuzzy Hash: F4E18FE5A2DB1390FA59FF58AC509B4E3A5AF08750FD81036D81E063A4EF7CB55AC230
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Message
      • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
      • API String ID: 2030045667-1550345328
      • Opcode ID: de2886e9ec4bce8e7a82fd945c19092a17145b62ba3eb50971492c1082ce60c7
      • Instruction ID: de52d37b70e2dcb956928210b001e591a8aab2e681f7ed9972658445d007b48c
      • Opcode Fuzzy Hash: de2886e9ec4bce8e7a82fd945c19092a17145b62ba3eb50971492c1082ce60c7
      • Instruction Fuzzy Hash: F851C0A1B28A4792FA10BB19ED405B9A3A0BF44B94FC44131EE1C47BE5EF3CE5578760
      APIs
        • Part of subcall function 00007FF7079F86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF7079F3FA4,00000000,00007FF7079F1925), ref: 00007FF7079F86E9
      • ExpandEnvironmentStringsW.KERNEL32(?,00007FF7079F7C97,?,?,FFFFFFFF,00007FF7079F3834), ref: 00007FF7079F782C
        • Part of subcall function 00007FF7079F26C0: MessageBoxW.USER32 ref: 00007FF7079F2736
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
      • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
      • API String ID: 1662231829-930877121
      • Opcode ID: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
      • Instruction ID: d70c6073aaca2f1dc1aa155f2f2aac1a9bc600eda30f04fee46a5bb058a8585d
      • Opcode Fuzzy Hash: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
      • Instruction Fuzzy Hash: F3418261B3CA4381FA50FB68EC51ABAE361AF84784FD44431D64E82795EF2CE5468770
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: MoveWindow$ObjectSelect$DrawReleaseText
      • String ID: P%
      • API String ID: 2147705588-2959514604
      • Opcode ID: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
      • Instruction ID: 06c5339ae1085e6683c7b56af5fdb6916dfbd3ee7ed50125ac20368c203c00fa
      • Opcode Fuzzy Hash: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
      • Instruction Fuzzy Hash: 94510866614BA186E6349F26E8185BAF7A1FB98B61F404131EFDE43794DF3CD046CB20
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: -$:$f$p$p
      • API String ID: 3215553584-2013873522
      • Opcode ID: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
      • Instruction ID: 870385301baf61879586602913a362126afd1b89060d413d760ad399c2b600e9
      • Opcode Fuzzy Hash: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
      • Instruction Fuzzy Hash: 8812C5A1E0C24386FB20BA38D844E79F651FF41752FD44835E689865C4DF3CE5A28FA0
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: f$f$p$p$f
      • API String ID: 3215553584-1325933183
      • Opcode ID: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
      • Instruction ID: c1804a0ec744922845777f3d8624b0e508fab3c061b3012ab383e6d396394553
      • Opcode Fuzzy Hash: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
      • Instruction Fuzzy Hash: 1012D9A1E0C14386FB247A38D814B7BF252FF80756FD44931E689865C4DF7CE5828BA1
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Message
      • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
      • API String ID: 2030045667-3659356012
      • Opcode ID: 876584c299d027f33137fc7dabb205f158a195f132e989b932e28c0aba37e536
      • Instruction ID: d7d4b1cf1c843f5042a746109555084eb757a5290e9f19ecd1864bf50e30b7af
      • Opcode Fuzzy Hash: 876584c299d027f33137fc7dabb205f158a195f132e989b932e28c0aba37e536
      • Instruction Fuzzy Hash: F2418E61B68A4782FA10FB16AC406BAE2A1BF45BD4F944031DD5D47B95DF3CF40683A0
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Message
      • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
      • API String ID: 2030045667-3659356012
      • Opcode ID: f2249ae50f4d5a80524765fe3aa1f2ed55e82a04716e5ab33badeebc7b74e53e
      • Instruction ID: 9ae5c9f03d31dc2ac3606bd0f198eb3b8155ad1a252151a09450c5d1c99b2fdd
      • Opcode Fuzzy Hash: f2249ae50f4d5a80524765fe3aa1f2ed55e82a04716e5ab33badeebc7b74e53e
      • Instruction Fuzzy Hash: 5D416FA1A6864782FA20BB19AC405BAE3A0FF44BD4FD44031DE5D47B95EF3CE5478760
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
      • String ID: CreateProcessW$Failed to create child process!
      • API String ID: 2895956056-699529898
      • Opcode ID: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
      • Instruction ID: eee9ded61cdcf3b62d5795ae7a4a924319a2afe311d25ae7025e11b6d8a724f2
      • Opcode Fuzzy Hash: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
      • Instruction Fuzzy Hash: 96412771A18B8281EA10AB24F8556AEF391FF85360F900735E6AD477D5DF7CD0468B50
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
      • String ID: csm$csm$csm
      • API String ID: 849930591-393685449
      • Opcode ID: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
      • Instruction ID: 1c1c51be65dae32747688e21e95e0c7f90825c17048c7d5468f8f5ba4dde9361
      • Opcode Fuzzy Hash: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
      • Instruction Fuzzy Hash: 35D1A572A28B4286EB20EF65D8403ADB7A0FF55788F544135EE4D57BA5CF38E482C760
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Message
      • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
      • API String ID: 2030045667-2813020118
      • Opcode ID: 5f86db0b88a8597635f99d5b4cac90fa4f731a3afe8888101c8cea5847f0d3ec
      • Instruction ID: b32089e50e9754f7af708b2de80e3ec78a5264efc08d825fabd8585320321f9e
      • Opcode Fuzzy Hash: 5f86db0b88a8597635f99d5b4cac90fa4f731a3afe8888101c8cea5847f0d3ec
      • Instruction Fuzzy Hash: C5511362A1868781EA20BB16AC403BAA291FF85794FC40135EE4D87BD5EF3CE407C760
      APIs
      • FreeLibrary.KERNEL32(?,?,?,00007FF707A0E3BA,?,?,-00000018,00007FF707A0A063,?,?,?,00007FF707A09F5A,?,?,?,00007FF707A0524E), ref: 00007FF707A0E19C
      • GetProcAddress.KERNEL32(?,?,?,00007FF707A0E3BA,?,?,-00000018,00007FF707A0A063,?,?,?,00007FF707A09F5A,?,?,?,00007FF707A0524E), ref: 00007FF707A0E1A8
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: AddressFreeLibraryProc
      • String ID: api-ms-$ext-ms-
      • API String ID: 3013587201-537541572
      • Opcode ID: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
      • Instruction ID: 7651a88acd82148b64a25853f4b63cccdb688e96e63108f18421266870333990
      • Opcode Fuzzy Hash: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
      • Instruction Fuzzy Hash: 984113B1B1D60281FA11BB2EAD00E75A392BF05B90F894935DE0D97794EF3CE40793A0
      APIs
      • GetTempPathW.KERNEL32(?,?,FFFFFFFF,00007FF7079F3834), ref: 00007FF7079F7CE4
      • CreateDirectoryW.KERNEL32(?,?,FFFFFFFF,00007FF7079F3834), ref: 00007FF7079F7D2C
        • Part of subcall function 00007FF7079F7E10: GetEnvironmentVariableW.KERNEL32(00007FF7079F365F), ref: 00007FF7079F7E47
        • Part of subcall function 00007FF7079F7E10: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF7079F7E69
        • Part of subcall function 00007FF707A07548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF707A07561
        • Part of subcall function 00007FF7079F26C0: MessageBoxW.USER32 ref: 00007FF7079F2736
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Environment$CreateDirectoryExpandMessagePathStringsTempVariable_invalid_parameter_noinfo
      • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
      • API String ID: 740614611-1339014028
      • Opcode ID: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
      • Instruction ID: a443b7cb686a073d40364a10d26465c2b1939051fc624b20a3f51b42a5b38934
      • Opcode Fuzzy Hash: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
      • Instruction Fuzzy Hash: EA418051B29A8380FA60FB699D55AF99251AF49784FD00432EE1D87796EF3CE50383A0
      APIs
      • LoadLibraryExW.KERNEL32(?,?,?,00007FF7079FD29A,?,?,?,00007FF7079FCF8C,?,?,?,00007FF7079FCB89), ref: 00007FF7079FD06D
      • GetLastError.KERNEL32(?,?,?,00007FF7079FD29A,?,?,?,00007FF7079FCF8C,?,?,?,00007FF7079FCB89), ref: 00007FF7079FD07B
      • LoadLibraryExW.KERNEL32(?,?,?,00007FF7079FD29A,?,?,?,00007FF7079FCF8C,?,?,?,00007FF7079FCB89), ref: 00007FF7079FD0A5
      • FreeLibrary.KERNEL32(?,?,?,00007FF7079FD29A,?,?,?,00007FF7079FCF8C,?,?,?,00007FF7079FCB89), ref: 00007FF7079FD113
      • GetProcAddress.KERNEL32(?,?,?,00007FF7079FD29A,?,?,?,00007FF7079FCF8C,?,?,?,00007FF7079FCB89), ref: 00007FF7079FD11F
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Library$Load$AddressErrorFreeLastProc
      • String ID: api-ms-
      • API String ID: 2559590344-2084034818
      • Opcode ID: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
      • Instruction ID: 1b3a3508cd69d397609ec94e28ab60106fb6c6ad5dd9b41dff7efff431c0207c
      • Opcode Fuzzy Hash: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
      • Instruction Fuzzy Hash: 48319065B2AA4391EE16EB16AC10679A3A4FF09BA4F9E0535DD1D47384EF3CE4478320
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
      • String ID:
      • API String ID: 995526605-0
      • Opcode ID: 8356e17e6427c03366acad688ef96df5430cd8c67dfe58d52091e88c81740b7d
      • Instruction ID: e1a2a3245c10cfb54a37a3bd17d8acfff2e16568be5125ac450c6ac3652b1863
      • Opcode Fuzzy Hash: 8356e17e6427c03366acad688ef96df5430cd8c67dfe58d52091e88c81740b7d
      • Instruction Fuzzy Hash: 16214671A1CA4341EB10AF99E84463AE3A1FF857B4F900635DA6D43BE4DFBCD4468720
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Value$ErrorLast
      • String ID:
      • API String ID: 2506987500-0
      • Opcode ID: 4f1009f36f4b7e41e642a617816a0843c7a4fdcae41be86a1245b23186b7dd2e
      • Instruction ID: ae1ace3e12255b2b38eef3eca88793e2ce3c1aa6359df5971cc9974415176ea5
      • Opcode Fuzzy Hash: 4f1009f36f4b7e41e642a617816a0843c7a4fdcae41be86a1245b23186b7dd2e
      • Instruction Fuzzy Hash: 89216DA4B0C24242FA68733D5E45939E1525F487B2F848F34D93E86AD6DF2CB44347A1
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
      • String ID: CONOUT$
      • API String ID: 3230265001-3130406586
      • Opcode ID: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
      • Instruction ID: f9b7cf4bd92175ac9e17077b01c0583207a0e806295f7f3df18577127b51ebe5
      • Opcode Fuzzy Hash: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
      • Instruction Fuzzy Hash: B21196A1B18B4186F7509B5AEC44B25A3A1FF88BE4F850234EA1D477A4DF3CD446C750
      APIs
      • GetCurrentProcess.KERNEL32(?,00000000,?,00007FF7079F39F2), ref: 00007FF7079F821D
      • K32EnumProcessModules.KERNEL32(?,00000000,?,00007FF7079F39F2), ref: 00007FF7079F827A
        • Part of subcall function 00007FF7079F86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF7079F3FA4,00000000,00007FF7079F1925), ref: 00007FF7079F86E9
      • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF7079F39F2), ref: 00007FF7079F8305
      • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF7079F39F2), ref: 00007FF7079F8364
      • FreeLibrary.KERNEL32(?,00000000,?,00007FF7079F39F2), ref: 00007FF7079F8375
      • FreeLibrary.KERNEL32(?,00000000,?,00007FF7079F39F2), ref: 00007FF7079F838A
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
      • String ID:
      • API String ID: 3462794448-0
      • Opcode ID: c116373e2a09e68fc95a37a35a910f387ed59b49a7d0ab4690c2b7d3ff367989
      • Instruction ID: 0c4e6c489d9d8f2746b3856d0e78f0ebd17bb9bf5e72cb2aae39bff3c6e244e3
      • Opcode Fuzzy Hash: c116373e2a09e68fc95a37a35a910f387ed59b49a7d0ab4690c2b7d3ff367989
      • Instruction Fuzzy Hash: D341B6A2A2968381EA70AF25E800ABAB394FF85BC4F854135DF5D57795DF3CE402C720
      APIs
        • Part of subcall function 00007FF7079F7B50: GetCurrentProcess.KERNEL32 ref: 00007FF7079F7B70
        • Part of subcall function 00007FF7079F7B50: OpenProcessToken.ADVAPI32 ref: 00007FF7079F7B83
        • Part of subcall function 00007FF7079F7B50: GetTokenInformation.ADVAPI32 ref: 00007FF7079F7BA8
        • Part of subcall function 00007FF7079F7B50: GetLastError.KERNEL32 ref: 00007FF7079F7BB2
        • Part of subcall function 00007FF7079F7B50: GetTokenInformation.ADVAPI32 ref: 00007FF7079F7BF2
        • Part of subcall function 00007FF7079F7B50: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF7079F7C0E
        • Part of subcall function 00007FF7079F7B50: CloseHandle.KERNEL32 ref: 00007FF7079F7C26
      • LocalFree.KERNEL32(?,00007FF7079F3814), ref: 00007FF7079F848C
      • LocalFree.KERNEL32(?,00007FF7079F3814), ref: 00007FF7079F8495
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
      • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
      • API String ID: 6828938-1529539262
      • Opcode ID: 795f95526d0a951be163d7ee57e77295e71c5006ab84a191c0455a0dace466c7
      • Instruction ID: 175da053a165661757c4ecfed2d25cea65d21664b5ac05fd32c9e5b1faab8eab
      • Opcode Fuzzy Hash: 795f95526d0a951be163d7ee57e77295e71c5006ab84a191c0455a0dace466c7
      • Instruction Fuzzy Hash: 19216D71A2864286F750BB20EC157EAA3A1FF88780FD44435EA4D43B96DF3CD846C7A0
      APIs
      • GetLastError.KERNEL32(?,?,?,00007FF707A043FD,?,?,?,?,00007FF707A0979A,?,?,?,?,00007FF707A0649F), ref: 00007FF707A0A5E7
      • FlsSetValue.KERNEL32(?,?,?,00007FF707A043FD,?,?,?,?,00007FF707A0979A,?,?,?,?,00007FF707A0649F), ref: 00007FF707A0A61D
      • FlsSetValue.KERNEL32(?,?,?,00007FF707A043FD,?,?,?,?,00007FF707A0979A,?,?,?,?,00007FF707A0649F), ref: 00007FF707A0A64A
      • FlsSetValue.KERNEL32(?,?,?,00007FF707A043FD,?,?,?,?,00007FF707A0979A,?,?,?,?,00007FF707A0649F), ref: 00007FF707A0A65B
      • FlsSetValue.KERNEL32(?,?,?,00007FF707A043FD,?,?,?,?,00007FF707A0979A,?,?,?,?,00007FF707A0649F), ref: 00007FF707A0A66C
      • SetLastError.KERNEL32(?,?,?,00007FF707A043FD,?,?,?,?,00007FF707A0979A,?,?,?,?,00007FF707A0649F), ref: 00007FF707A0A687
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Value$ErrorLast
      • String ID:
      • API String ID: 2506987500-0
      • Opcode ID: 5dcac91248c0014d458aec840eea87d8b317a92cf5de5997ea3edf93bd94a031
      • Instruction ID: 47eebc5cb8409429fbeebaf4f980d28511bddc443ab1dfb3a680267ca8b72025
      • Opcode Fuzzy Hash: 5dcac91248c0014d458aec840eea87d8b317a92cf5de5997ea3edf93bd94a031
      • Instruction Fuzzy Hash: 08115BA4F0C64242FA68733D9E85939E2525F487A1F848B34D83E866D6DF2CB44347A2
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
      • String ID: Unhandled exception in script
      • API String ID: 3081866767-2699770090
      • Opcode ID: 43e0e9fc7257205e5ba4956726e7fb7afbd4954ec96d29d9005c09c1dc537ba6
      • Instruction ID: fc69cd6f546d2476b2c03a48e0d225d01c152cb2569a7c8fd9a9ebdb2a1a283a
      • Opcode Fuzzy Hash: 43e0e9fc7257205e5ba4956726e7fb7afbd4954ec96d29d9005c09c1dc537ba6
      • Instruction Fuzzy Hash: A53180B2A18A8289EB20FF65EC556F9A360FF89784F940135EA4D87B59DF3CD106C710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Message$ByteCharMultiWide
      • String ID: %s%s: %s$Error$Error/warning (ANSI fallback)
      • API String ID: 1878133881-640379615
      • Opcode ID: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
      • Instruction ID: d7c3d1b9016efe316e4cb3d1816a23e58468d72096f8a5ad21a91793b57c4546
      • Opcode Fuzzy Hash: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
      • Instruction Fuzzy Hash: 422135B2628A8681F620AB14F8517EAA364FF88784F801136E68D53B59DF7CD646C750
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: AddressFreeHandleLibraryModuleProc
      • String ID: CorExitProcess$mscoree.dll
      • API String ID: 4061214504-1276376045
      • Opcode ID: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
      • Instruction ID: f7c2ef7c4095663688ee206a005b8fa2ab055a0768cf38e6d698a03213717309
      • Opcode Fuzzy Hash: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
      • Instruction Fuzzy Hash: 91F062E1A1970281FA14AB2CEC44B799320AF49761FD40635C96D466F4CF3CD14BC774
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID:
      • API String ID: 1156100317-0
      • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
      • Instruction ID: d4b4a2c83569c4c74d126c869b82a88387df78b1f32acdb4bbade6f62d68abf7
      • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
      • Instruction Fuzzy Hash: 231191BAE5CE0341F654312CEC55B7991406F55374FD94634E97E067D6CF2CA8838631
      APIs
      • FlsGetValue.KERNEL32(?,?,?,00007FF707A098B3,?,?,00000000,00007FF707A09B4E,?,?,?,?,?,00007FF707A09ADA), ref: 00007FF707A0A6BF
      • FlsSetValue.KERNEL32(?,?,?,00007FF707A098B3,?,?,00000000,00007FF707A09B4E,?,?,?,?,?,00007FF707A09ADA), ref: 00007FF707A0A6DE
      • FlsSetValue.KERNEL32(?,?,?,00007FF707A098B3,?,?,00000000,00007FF707A09B4E,?,?,?,?,?,00007FF707A09ADA), ref: 00007FF707A0A706
      • FlsSetValue.KERNEL32(?,?,?,00007FF707A098B3,?,?,00000000,00007FF707A09B4E,?,?,?,?,?,00007FF707A09ADA), ref: 00007FF707A0A717
      • FlsSetValue.KERNEL32(?,?,?,00007FF707A098B3,?,?,00000000,00007FF707A09B4E,?,?,?,?,?,00007FF707A09ADA), ref: 00007FF707A0A728
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Value
      • String ID:
      • API String ID: 3702945584-0
      • Opcode ID: 25d361a094b2c99e262beff41eaee06ac9464b6f74968b1c14d3cfe42ff85be4
      • Instruction ID: a3aef19a2b15acc6b6d13377d7991cc96685f9be404d46b76a8eeb776537f51d
      • Opcode Fuzzy Hash: 25d361a094b2c99e262beff41eaee06ac9464b6f74968b1c14d3cfe42ff85be4
      • Instruction Fuzzy Hash: C6115EA0F0C34241FA58733D9D85979E1515F587A1E848B34D83DD66D6DF2CF4434AA1
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Value
      • String ID:
      • API String ID: 3702945584-0
      • Opcode ID: a853173f6999e7d5ef833d9e4f06cbd56a904a1eb1d6261c936ae8f95b9bedb9
      • Instruction ID: a88d5a29a133d41e76681b6604656046cfb346429bdb2b0ecb8ece2aee9e499d
      • Opcode Fuzzy Hash: a853173f6999e7d5ef833d9e4f06cbd56a904a1eb1d6261c936ae8f95b9bedb9
      • Instruction Fuzzy Hash: 101106A0F0C20742FA6C723D4C56979A2815F59762EC49F34D93E9A2D2EF2CB44356B2
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: verbose
      • API String ID: 3215553584-579935070
      • Opcode ID: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
      • Instruction ID: f4fdb673cc02bf408006f9bf69fb6150690fc2d4ed6e91ad218e875c7cbf0182
      • Opcode Fuzzy Hash: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
      • Instruction Fuzzy Hash: 8991E4B2E0864641F724AE39D850FBDB292AF00B56FD44935DA4D833D5DF3DE4228BA1
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: UTF-16LEUNICODE$UTF-8$ccs
      • API String ID: 3215553584-1196891531
      • Opcode ID: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
      • Instruction ID: f2cd2697bccda39396f6fe06b9e93d88f6f2fc2ae9be53bf0e6924ce5ff0c100
      • Opcode Fuzzy Hash: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
      • Instruction Fuzzy Hash: 708196F2E0C14389FB747E3DC910A78B6A0BF11745FD58835DA09E7285EB2DE80392A1
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
      • String ID: csm
      • API String ID: 2395640692-1018135373
      • Opcode ID: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
      • Instruction ID: 59fc41fb2bef9154000b42d9f296b602807a6523b5e67b0f87eb97083987aa7f
      • Opcode Fuzzy Hash: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
      • Instruction Fuzzy Hash: 9151B236B2960B8ADB14EF19E844A79B791EF45B98F90C531DA4D43788DF7CE842C720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
      • String ID: csm$csm
      • API String ID: 3896166516-3733052814
      • Opcode ID: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
      • Instruction ID: 9a3f6525572f574ed444e4213ca49d3b1cb8096c2abcc3818f25e40484c74542
      • Opcode Fuzzy Hash: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
      • Instruction Fuzzy Hash: 2951BF36A2874786EB34AB219844378B7A0EF54B94F944136DA5C47BE5CF3CE462CB20
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: CallEncodePointerTranslator
      • String ID: MOC$RCC
      • API String ID: 3544855599-2084237596
      • Opcode ID: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
      • Instruction ID: 39b198bb125fc03902a38a248a90589ab5ce0866e484633b2375a9d96e0bc7a9
      • Opcode Fuzzy Hash: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
      • Instruction Fuzzy Hash: B161A432918BC681D721AB25E8407AAF7A0FF85B94F444235EB9C03BA5DF7CE191CB10
      APIs
      • CreateDirectoryW.KERNEL32(00000000,?,00007FF7079F324C,?,?,00007FF7079F3964), ref: 00007FF7079F7642
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: CreateDirectory
      • String ID: %.*s$%s%c$\
      • API String ID: 4241100979-1685191245
      • Opcode ID: 1156698ca0d33aa8d2468b4f0fdefbfa17a3fd1640f2d1a941dba21d9585616c
      • Instruction ID: 732acf8d927c0141a85b00d6e6d0cd962b15f37aafd7dfd83ba54c6dfb26b601
      • Opcode Fuzzy Hash: 1156698ca0d33aa8d2468b4f0fdefbfa17a3fd1640f2d1a941dba21d9585616c
      • Instruction Fuzzy Hash: DA31B861B29AC685FA21AB25EC107A6A255EF44BE4FC44231EE6D477C9DF2CD2078710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: Message$ByteCharMultiWide
      • String ID: Error/warning (ANSI fallback)$Warning
      • API String ID: 1878133881-2698358428
      • Opcode ID: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
      • Instruction ID: 232f64131415608539bb7478643c1469b610902d151722172898ac0a0fae0d0c
      • Opcode Fuzzy Hash: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
      • Instruction Fuzzy Hash: 581190B2628B8681FA24AB14F851BA9B364FF48784FD01135DA4C47644CF3CD606C760
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: FileWrite$ConsoleErrorLastOutput
      • String ID:
      • API String ID: 2718003287-0
      • Opcode ID: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
      • Instruction ID: e5622876b183b7537e403760413ec4f9fbc24a51a5cf9b8c6be2daca19cbc9b0
      • Opcode Fuzzy Hash: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
      • Instruction Fuzzy Hash: 1CD111B2B08A818AE710DF79D9406AC77B1FB48798B844635CE5E97B89DF38D417C360
      APIs
      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF707A0C25B), ref: 00007FF707A0C38C
      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF707A0C25B), ref: 00007FF707A0C417
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: ConsoleErrorLastMode
      • String ID:
      • API String ID: 953036326-0
      • Opcode ID: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
      • Instruction ID: 290d4449dab53894b5131ac6f9d9d428d36cef7e6f00f85b1dcea476681d6751
      • Opcode Fuzzy Hash: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
      • Instruction Fuzzy Hash: 1C91F4A2E0865185F750AF7D9C44ABDABA1BF04B99F944639DE0E93A84DF38D443C370
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _get_daylight$_isindst
      • String ID:
      • API String ID: 4170891091-0
      • Opcode ID: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
      • Instruction ID: a1b1c32b3828123460b7786e358a03864eee44beacc4e9bbafef954c26157ea0
      • Opcode Fuzzy Hash: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
      • Instruction Fuzzy Hash: 655116B2F081569AFB14FF7C9D41ABCA7A1AF0035AF900935DE1D92AE5DB38A4038750
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
      • String ID:
      • API String ID: 2780335769-0
      • Opcode ID: 1ec8bf387a2241cb1ee0019bb6bb5a321e30a3d38cbcbe421edb0c1d83f6d5d9
      • Instruction ID: 0fbde584b4666312f0598faa955ceb969f316cd603037e05fd8b95513ec39b44
      • Opcode Fuzzy Hash: 1ec8bf387a2241cb1ee0019bb6bb5a321e30a3d38cbcbe421edb0c1d83f6d5d9
      • Instruction Fuzzy Hash: 5D51A1A2A086818AFB14EFB9D8407BD67A1BF4D749F504835DF0987648DF38D452C7A0
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1279662727-0
      • Opcode ID: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
      • Instruction ID: 2ed6594fe3f093588d09bbb2a6cf9b54372dc97a97151cd269c51396d6403427
      • Opcode Fuzzy Hash: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
      • Instruction Fuzzy Hash: 4641B4A2D187C143F314AB749910769A260FF997A5F509734E75C43AD1DF7CA0F18760
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: LongWindow$DialogInvalidateRect
      • String ID:
      • API String ID: 1956198572-0
      • Opcode ID: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
      • Instruction ID: 9be8959f1302cfc74748f2cb2dcc062a5686704d862fea810bccfaf432419fa3
      • Opcode Fuzzy Hash: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
      • Instruction Fuzzy Hash: C111A962E2814742FA54AB69FD447BD92A1FF88B90FC88031DA4907B99CF2DD4D38620
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: _get_daylight$_invalid_parameter_noinfo
      • String ID: ?
      • API String ID: 1286766494-1684325040
      • Opcode ID: 03a08327e3a10131aa5bb8fa3ef37a2eed6d70488736d84a243644e572cc7fb3
      • Instruction ID: e1d79b7658a5f8381ed44c8090f0983e98dd87e7be2290ae1a52b6884af30daa
      • Opcode Fuzzy Hash: 03a08327e3a10131aa5bb8fa3ef37a2eed6d70488736d84a243644e572cc7fb3
      • Instruction Fuzzy Hash: 8241FB62A187C245FB24BB2DDC01B7AD650EF85BA4F944235EE5C46BD5DF3CD4428710
      APIs
      • _invalid_parameter_noinfo.LIBCMT ref: 00007FF707A0835E
        • Part of subcall function 00007FF707A09C58: HeapFree.KERNEL32(?,?,?,00007FF707A12032,?,?,?,00007FF707A1206F,?,?,00000000,00007FF707A12535,?,?,?,00007FF707A12467), ref: 00007FF707A09C6E
        • Part of subcall function 00007FF707A09C58: GetLastError.KERNEL32(?,?,?,00007FF707A12032,?,?,?,00007FF707A1206F,?,?,00000000,00007FF707A12535,?,?,?,00007FF707A12467), ref: 00007FF707A09C78
      • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF7079FBEC5), ref: 00007FF707A0837C
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
      • String ID: C:\Users\user\Desktop\vRWw6y4Pj2.exe
      • API String ID: 3580290477-4072284935
      • Opcode ID: 53ad205ea1c6cb2f7bb7661613e3da0ecc1c0905bf47b453e04b3a6da8a19941
      • Instruction ID: 4e8d0510552851c1f379c152883b1a25f3cd6cdba43e740b79b78e27b825fb79
      • Opcode Fuzzy Hash: 53ad205ea1c6cb2f7bb7661613e3da0ecc1c0905bf47b453e04b3a6da8a19941
      • Instruction Fuzzy Hash: 0141D5B1A08B528AE714FF39AC808BDA394EF45791BC54435FA4D83745CF3DE49287A0
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: CurrentDirectory_invalid_parameter_noinfo
      • String ID: .$:
      • API String ID: 2020911589-4202072812
      • Opcode ID: 02917ae70002487e25aaa57807b70e18839398bc457e7bd9011200fb9d4eab61
      • Instruction ID: 50c41a717ca165e8f708677e7508a4f793a433f60647160775e0468f5593bdc0
      • Opcode Fuzzy Hash: 02917ae70002487e25aaa57807b70e18839398bc457e7bd9011200fb9d4eab61
      • Instruction Fuzzy Hash: C8418162F087529CFB10EBB99C505FC66B47F14399F940835EE0DA7A45DF38A45383A0
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: ErrorFileLastWrite
      • String ID: U
      • API String ID: 442123175-4171548499
      • Opcode ID: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
      • Instruction ID: b088d44d6eca07b0233315da3df700a80db3a5dcaf2231806a4631a2b65e8956
      • Opcode Fuzzy Hash: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
      • Instruction Fuzzy Hash: 9B41D6B2A1868185DB20DF29E844BA9B760FF88794F804531EE4D87B48DF3CD442C760
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: CurrentDirectory
      • String ID: :
      • API String ID: 1611563598-336475711
      • Opcode ID: e37c33f8f2befd5fbd3c49cdc0b6d52123385b6fd944ea7372e41dd3f6ca63dc
      • Instruction ID: 256b2487a3d092cb6314764808e991ebc7c7b986b4e827ef3828db3defdc8e79
      • Opcode Fuzzy Hash: e37c33f8f2befd5fbd3c49cdc0b6d52123385b6fd944ea7372e41dd3f6ca63dc
      • Instruction Fuzzy Hash: 9721D9A2B0C68181FB60BB29D84467DE3A1FF84B85FC54835D68C83684CF7CE946C7A1
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: ExceptionFileHeaderRaise
      • String ID: csm
      • API String ID: 2573137834-1018135373
      • Opcode ID: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
      • Instruction ID: c545a9a02d82777feabdb271300f64aeb5c2f82674f5bae2af9b41ef2ffa2a4a
      • Opcode Fuzzy Hash: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
      • Instruction Fuzzy Hash: 81112B76618B8582EB219B15F840269B7E5FF88B94F984231DB8D07B68DF3CD5528B10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.2184858693.00007FF7079F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7079F0000, based on PE: true
      • Associated: 00000001.00000002.2184839341.00007FF7079F0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184929721.00007FF707A1B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A2E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184955009.00007FF707A34000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.2184993239.00007FF707A36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff7079f0000_vRWw6y4Pj2.jbxd
      Similarity
      • API ID: DriveType_invalid_parameter_noinfo
      • String ID: :
      • API String ID: 2595371189-336475711
      • Opcode ID: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
      • Instruction ID: 8667788688401b3b824a79eb0d7b2395ee05d0da4c8b498304b6908924347253
      • Opcode Fuzzy Hash: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
      • Instruction Fuzzy Hash: 410171A191C64286FB30BF789861A7EA290EF48749FC01835D54DC2691DF3CE5178A64