Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NgenTool.exe

Overview

General Information

Sample name:NgenTool.exe
Analysis ID:1523267
MD5:28c81359da168d5f0fd071abc2651dec
SHA1:15b69391fa49a2684eed322eab04017a8bfe440a
SHA256:8059e259a6744f78dd41ad5854522c8e5f7ae61940d9187f95fa3e4f7af5f5a6
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • NgenTool.exe (PID: 1984 cmdline: "C:\Users\user\Desktop\NgenTool.exe" MD5: 28C81359DA168D5F0FD071ABC2651DEC)
    • conhost.exe (PID: 3868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: NgenTool.exeVirustotal: Detection: 7%Perma Link
Source: NgenTool.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: NgenTool.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: G:\Projects\Git\SLSII_v4.2\Installer\NgenTool\Release\NgenTool.pdb source: NgenTool.exe
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A1000 FindFirstFileW,_wcsstr,FindNextFileW,FindClose,0_2_001A1000
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A54C2 FindFirstFileExW,0_2_001A54C2
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A11000_2_001A1100
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001AB2550_2_001AB255
Source: NgenTool.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal48.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3868:120:WilError_03
Source: NgenTool.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\NgenTool.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: NgenTool.exeVirustotal: Detection: 7%
Source: unknownProcess created: C:\Users\user\Desktop\NgenTool.exe "C:\Users\user\Desktop\NgenTool.exe"
Source: C:\Users\user\Desktop\NgenTool.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\NgenTool.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\NgenTool.exeSection loaded: kernel.appcore.dllJump to behavior
Source: NgenTool.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: NgenTool.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: NgenTool.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: NgenTool.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: NgenTool.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: NgenTool.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: NgenTool.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: NgenTool.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: G:\Projects\Git\SLSII_v4.2\Installer\NgenTool\Release\NgenTool.pdb source: NgenTool.exe
Source: NgenTool.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: NgenTool.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: NgenTool.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: NgenTool.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: NgenTool.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A2096 push ecx; ret 0_2_001A20A9
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A1000 FindFirstFileW,_wcsstr,FindNextFileW,FindClose,0_2_001A1000
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A54C2 FindFirstFileExW,0_2_001A54C2
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A485C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001A485C
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A3DF1 mov eax, dword ptr fs:[00000030h]0_2_001A3DF1
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A7649 GetProcessHeap,0_2_001A7649
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A485C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001A485C
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A1944 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_001A1944
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A1E3F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001A1E3F
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A1F9E SetUnhandledExceptionFilter,0_2_001A1F9E
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A21C2 cpuid 0_2_001A21C2
Source: C:\Users\user\Desktop\NgenTool.exeCode function: 0_2_001A1D24 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_001A1D24
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1523267 Sample: NgenTool.exe Startdate: 01/10/2024 Architecture: WINDOWS Score: 48 10 Multi AV Scanner detection for submitted file 2->10 6 NgenTool.exe 1 2->6         started        process3 process4 8 conhost.exe 6->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
NgenTool.exe2%ReversingLabs
NgenTool.exe7%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1523267
Start date and time:2024-10-01 11:38:38 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 36s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:NgenTool.exe
Detection:MAL
Classification:mal48.winEXE@2/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 94%
  • Number of executed functions: 5
  • Number of non-executed functions: 13
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):6.305161796001363
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:NgenTool.exe
File size:80'384 bytes
MD5:28c81359da168d5f0fd071abc2651dec
SHA1:15b69391fa49a2684eed322eab04017a8bfe440a
SHA256:8059e259a6744f78dd41ad5854522c8e5f7ae61940d9187f95fa3e4f7af5f5a6
SHA512:6c995151203a882b31b4cadd284d61d648d90e6c2da27004b270a3e98967f3ff9fa40cda1278ea470e60b8b8b1090dba1c0034635eab508a70f18f30c2ede9e4
SSDEEP:1536:bRAMkGk50LRVxXoCmNB80YKJiyRdq4fal+mqEjsY/R4IsWMcdQATD/Yptn/7:O5KxXoC8b1gyRda+4jsWFQATD/Ypt/7
TLSH:37734A03B5D19471E47359325870C9B19A2EF9214F60DEAB6798173E4F380D09A3AEBB
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......P.A`../3../3../3.M.3../3.M.3m./3.M.3../3/.,2../3/.*27./3/.+2../3...3../3...3K./3..&2../3../2../3...3../3..-2../3Rich../3.......
Icon Hash:90cececece8e8eb0
Entrypoint:0x40193a
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x5BEB7FC3 [Wed Nov 14 01:52:03 2018 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:11b54a0dfe1242390c8cbbe62ba9ee15
Instruction
call 00007F15DD15CD4Ah
jmp 00007F15DD15C7ECh
push ebp
mov ebp, esp
push 00000000h
call dword ptr [0040D048h]
push dword ptr [ebp+08h]
call dword ptr [0040D044h]
push C0000409h
call dword ptr [0040D010h]
push eax
call dword ptr [0040D04Ch]
pop ebp
ret
push ebp
mov ebp, esp
sub esp, 00000324h
push 00000017h
call 00007F15DD166805h
test eax, eax
je 00007F15DD15C967h
push 00000002h
pop ecx
int 29h
mov dword ptr [004138E8h], eax
mov dword ptr [004138E4h], ecx
mov dword ptr [004138E0h], edx
mov dword ptr [004138DCh], ebx
mov dword ptr [004138D8h], esi
mov dword ptr [004138D4h], edi
mov word ptr [00413900h], ss
mov word ptr [004138F4h], cs
mov word ptr [004138D0h], ds
mov word ptr [004138CCh], es
mov word ptr [004138C8h], fs
mov word ptr [004138C4h], gs
pushfd
pop dword ptr [004138F8h]
mov eax, dword ptr [ebp+00h]
mov dword ptr [004138ECh], eax
mov eax, dword ptr [ebp+04h]
mov dword ptr [004138F0h], eax
lea eax, dword ptr [ebp+08h]
mov dword ptr [004138FCh], eax
mov eax, dword ptr [ebp-00000324h]
mov dword ptr [00413838h], 00010001h
Programming Language:
  • [EXP] VS2015 UPD3.1 build 24215
  • [RES] VS2015 UPD3 build 24213
  • [LNK] VS2015 UPD3.1 build 24215
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x125800x64.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x125e40x50.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x1e8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x170000xecc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x11c000x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11c700x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xbb170xbc0039a6bb936b987204b6719f14eae321e1False0.5854180518617021data6.628609223744442IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xd0000x5d260x5e00b6f708ff8b0919be45fc54fcb87b990eFalse0.42137632978723405data4.874557617214814IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x130000x13080x800ccad542ebfe74a9ed27efa01de45c1a2False0.1962890625data2.3897071320344967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.gfids0x150000xdc0x200a70d99d6c2640540375a7055666b462fFalse0.31640625data1.6486420276660951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x160000x1e80x20067d99a0fbaad406a6bdc2924a81afdacFalse0.537109375data4.7605137014493595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x170000xecc0x1000b2bb5bec1555864a927bf74a15798777False0.768310546875data6.339476613310989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x160600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
DLLImport
SHLWAPI.dllPathFileExistsW
KERNEL32.dllGetCurrentProcess, GetEnvironmentVariableW, FindClose, WaitForSingleObject, FindNextFileW, GetCurrentDirectoryW, SetCurrentDirectoryW, CreateProcessW, IsWow64Process, FindFirstFileW, DecodePointer, CloseHandle, GetModuleFileNameW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RaiseException, RtlUnwind, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, GetACP, HeapFree, HeapAlloc, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, CompareStringW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap, HeapSize, HeapReAlloc, FlushFileBuffers, GetConsoleCP, GetConsoleMode, SetFilePointerEx, WriteConsoleW
ADVAPI32.dllRegOpenKeyExW, RegQueryValueExW, RegCloseKey
NameOrdinalAddress
_Install@410x401670
_UnInstall@420x401690
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:05:39:27
Start date:01/10/2024
Path:C:\Users\user\Desktop\NgenTool.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\NgenTool.exe"
Imagebase:0x1a0000
File size:80'384 bytes
MD5 hash:28C81359DA168D5F0FD071ABC2651DEC
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:05:39:27
Start date:01/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:3.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:5%
    Total number of Nodes:1672
    Total number of Limit Nodes:19
    execution_graph 7085 1a3f9a 7086 1a3fa6 ___scrt_is_nonwritable_in_current_image 7085->7086 7087 1a3fdd ___scrt_is_nonwritable_in_current_image 7086->7087 7093 1a6433 EnterCriticalSection 7086->7093 7089 1a3fba 7090 1a7581 __fassign 20 API calls 7089->7090 7091 1a3fca 7090->7091 7094 1a3fe3 7091->7094 7093->7089 7097 1a647b LeaveCriticalSection 7094->7097 7096 1a3fea 7096->7087 7097->7096 7098 1a459b 7099 1a27ef ___vcrt_uninitialize 8 API calls 7098->7099 7100 1a45a2 7099->7100 7104 1a9a91 7105 1a9ab1 7104->7105 7108 1a9ae8 7105->7108 7107 1a9adb 7110 1a9aef 7108->7110 7109 1a9b50 7112 1aa64e 7109->7112 7117 1aa757 7109->7117 7110->7109 7114 1a9b0f 7110->7114 7112->7107 7114->7112 7115 1aa757 21 API calls 7114->7115 7116 1aa67e 7115->7116 7116->7107 7118 1aa760 7117->7118 7121 1aae2f 7118->7121 7122 1aae6e __startOneArgErrorHandling 7121->7122 7127 1aaef0 __startOneArgErrorHandling 7122->7127 7131 1ab232 7122->7131 7124 1aaf1a 7126 1aaf26 7124->7126 7138 1ab546 7124->7138 7129 1a16ee _ValidateLocalCookies 5 API calls 7126->7129 7127->7124 7134 1a3581 7127->7134 7130 1a9b9e 7129->7130 7130->7107 7145 1ab255 7131->7145 7135 1a35a9 7134->7135 7136 1a16ee _ValidateLocalCookies 5 API calls 7135->7136 7137 1a35c6 7136->7137 7137->7124 7139 1ab568 7138->7139 7140 1ab553 7138->7140 7142 1a4ae2 __dosmaperr 20 API calls 7139->7142 7141 1ab56d 7140->7141 7143 1a4ae2 __dosmaperr 20 API calls 7140->7143 7141->7126 7142->7141 7144 1ab560 7143->7144 7144->7126 7146 1ab280 __raise_exc 7145->7146 7147 1ab479 RaiseException 7146->7147 7148 1ab250 7147->7148 7148->7127 7149 1a6095 7150 1a60a5 7149->7150 7153 1a60b5 _wcschr 7149->7153 7151 1a4ae2 __dosmaperr 20 API calls 7150->7151 7152 1a60aa 7151->7152 7154 1a6119 7153->7154 7156 1a60ee 7153->7156 7195 1a62d2 7153->7195 7155 1a4ae2 __dosmaperr 20 API calls 7154->7155 7157 1a611e 7155->7157 7160 1a6137 7156->7160 7163 1a6110 7156->7163 7173 1a617c 7156->7173 7161 1a46da ___vcrt_freefls@4 20 API calls 7157->7161 7160->7157 7165 1a47ff _abort 20 API calls 7160->7165 7176 1a6153 7160->7176 7161->7152 7163->7154 7163->7173 7164 1a61a9 7167 1a46da ___vcrt_freefls@4 20 API calls 7164->7167 7168 1a6148 7165->7168 7166 1a47ff _abort 20 API calls 7169 1a6171 7166->7169 7175 1a61b1 7167->7175 7171 1a46da ___vcrt_freefls@4 20 API calls 7168->7171 7172 1a46da ___vcrt_freefls@4 20 API calls 7169->7172 7170 1a61ed 7170->7157 7174 1a75d1 __onexit 29 API calls 7170->7174 7171->7176 7172->7173 7173->7157 7210 1a6390 7173->7210 7177 1a621b 7174->7177 7179 1a75d1 __onexit 29 API calls 7175->7179 7180 1a61ba 7175->7180 7176->7157 7176->7166 7176->7173 7178 1a46da ___vcrt_freefls@4 20 API calls 7177->7178 7178->7180 7181 1a61da 7179->7181 7180->7157 7180->7180 7183 1a47ff _abort 20 API calls 7180->7183 7182 1a46da ___vcrt_freefls@4 20 API calls 7181->7182 7182->7180 7184 1a626e 7183->7184 7185 1a62b2 7184->7185 7186 1a3077 26 API calls 7184->7186 7187 1a46da ___vcrt_freefls@4 20 API calls 7185->7187 7188 1a6283 7186->7188 7187->7157 7189 1a628a SetEnvironmentVariableW 7188->7189 7190 1a62c7 7188->7190 7189->7185 7191 1a62ad 7189->7191 7192 1a4a36 ___std_exception_copy 11 API calls 7190->7192 7193 1a4ae2 __dosmaperr 20 API calls 7191->7193 7194 1a62d1 7192->7194 7193->7185 7196 1a62e8 7195->7196 7197 1a62e1 7195->7197 7198 1a47ff _abort 20 API calls 7196->7198 7197->7156 7200 1a630a 7198->7200 7199 1a637e 7201 1a47bc _abort 38 API calls 7199->7201 7200->7199 7203 1a6383 7200->7203 7206 1a47ff _abort 20 API calls 7200->7206 7207 1a46da ___vcrt_freefls@4 20 API calls 7200->7207 7208 1a3077 26 API calls 7200->7208 7209 1a636c 7200->7209 7201->7203 7202 1a46da ___vcrt_freefls@4 20 API calls 7202->7197 7204 1a4a36 ___std_exception_copy 11 API calls 7203->7204 7205 1a638f 7204->7205 7206->7200 7207->7200 7208->7200 7209->7202 7211 1a619c 7210->7211 7213 1a63a5 7210->7213 7211->7164 7211->7170 7213->7211 7214 1a8877 7213->7214 7215 1a892e 7214->7215 7216 1a888c 7214->7216 7227 1a8947 7215->7227 7217 1a8893 7216->7217 7220 1a88b4 7216->7220 7219 1a4ae2 __dosmaperr 20 API calls 7217->7219 7221 1a8898 7219->7221 7223 1a4ae2 __dosmaperr 20 API calls 7220->7223 7226 1a88a3 7220->7226 7222 1a4a26 ___std_exception_copy 26 API calls 7221->7222 7222->7226 7224 1a88c5 7223->7224 7225 1a4a26 ___std_exception_copy 26 API calls 7224->7225 7225->7226 7226->7213 7228 1a895e 7227->7228 7249 1a8957 7227->7249 7229 1a897e 7228->7229 7230 1a8964 7228->7230 7232 1a89a0 7229->7232 7233 1a8986 7229->7233 7231 1a4ae2 __dosmaperr 20 API calls 7230->7231 7236 1a8969 7231->7236 7234 1a89aa 7232->7234 7235 1a89bf 7232->7235 7237 1a4ae2 __dosmaperr 20 API calls 7233->7237 7238 1a4ae2 __dosmaperr 20 API calls 7234->7238 7239 1a3150 __fassign 38 API calls 7235->7239 7240 1a4a26 ___std_exception_copy 26 API calls 7236->7240 7241 1a898b 7237->7241 7242 1a89af 7238->7242 7243 1a89ca 7239->7243 7240->7249 7244 1a4a26 ___std_exception_copy 26 API calls 7241->7244 7245 1a4a26 ___std_exception_copy 26 API calls 7242->7245 7243->7249 7250 1a9031 7243->7250 7244->7249 7245->7249 7248 1a4ae2 __dosmaperr 20 API calls 7248->7249 7249->7226 7251 1a903e 7250->7251 7253 1a8a44 7251->7253 7254 1a65c3 7251->7254 7253->7248 7253->7249 7262 1a6492 7254->7262 7257 1a687c 10 API calls 7258 1a661f CompareStringW 7257->7258 7259 1a65df 7258->7259 7260 1a16ee _ValidateLocalCookies 5 API calls 7259->7260 7261 1a6631 7260->7261 7261->7253 7263 1a64ac _abort 5 API calls 7262->7263 7264 1a64a8 7263->7264 7264->7257 7264->7259 6571 1a190b 6572 1a1f5a _abort GetModuleHandleW 6571->6572 6573 1a1913 6572->6573 6574 1a3ec9 _abort 28 API calls 6573->6574 6575 1a191f 6573->6575 6574->6575 6577 1a192a ___scrt_is_nonwritable_in_current_image 6575->6577 6578 1a3eab 6575->6578 6579 1a3cd8 _abort 28 API calls 6578->6579 6580 1a3eb6 6579->6580 6580->6577 6581 1a170d 6582 1a1715 6581->6582 6599 1a3f2d 6582->6599 6584 1a1720 6606 1a1b6e 6584->6606 6586 1a17a9 6587 1a1e3f ___scrt_fastfail 4 API calls 6586->6587 6589 1a17b0 ___scrt_initialize_default_local_stdio_options 6587->6589 6588 1a1735 __RTC_Initialize 6588->6586 6611 1a1d0f 6588->6611 6591 1a174e 6591->6586 6592 1a175f 6591->6592 6614 1a1dcd InitializeSListHead 6592->6614 6594 1a1764 __except_handler4 6615 1a1ddc 6594->6615 6596 1a1787 6621 1a3fec 6596->6621 6598 1a1792 6600 1a3f5f 6599->6600 6601 1a3f3c 6599->6601 6600->6584 6601->6600 6602 1a4ae2 __dosmaperr 20 API calls 6601->6602 6603 1a3f4f 6602->6603 6604 1a4a26 ___std_exception_copy 26 API calls 6603->6604 6605 1a3f5a 6604->6605 6605->6584 6607 1a1b7c 6606->6607 6610 1a1b81 ___scrt_initialize_onexit_tables ___scrt_release_startup_lock 6606->6610 6608 1a1e3f ___scrt_fastfail 4 API calls 6607->6608 6607->6610 6609 1a1c04 6608->6609 6610->6588 6628 1a1cd4 6611->6628 6614->6594 6694 1a463f 6615->6694 6617 1a1df4 6617->6596 6618 1a1ded 6618->6617 6619 1a1e3f ___scrt_fastfail 4 API calls 6618->6619 6620 1a1dfc 6619->6620 6622 1a505c _abort 38 API calls 6621->6622 6624 1a3ff7 6622->6624 6623 1a402f 6623->6598 6624->6623 6625 1a4ae2 __dosmaperr 20 API calls 6624->6625 6626 1a4024 6625->6626 6627 1a4a26 ___std_exception_copy 26 API calls 6626->6627 6627->6623 6629 1a1cf8 6628->6629 6630 1a1cf1 6628->6630 6637 1a4506 6629->6637 6634 1a4496 6630->6634 6633 1a1cf6 6633->6591 6635 1a4506 __onexit 29 API calls 6634->6635 6636 1a44a8 6635->6636 6636->6633 6640 1a420d 6637->6640 6643 1a4143 6640->6643 6642 1a4231 6642->6633 6644 1a414f ___scrt_is_nonwritable_in_current_image 6643->6644 6651 1a6433 EnterCriticalSection 6644->6651 6646 1a415d 6652 1a4355 6646->6652 6648 1a416a 6662 1a4188 6648->6662 6650 1a417b ___scrt_is_nonwritable_in_current_image 6650->6642 6651->6646 6653 1a436b __onexit __crt_fast_encode_pointer 6652->6653 6654 1a4373 6652->6654 6653->6648 6654->6653 6655 1a43cc 6654->6655 6665 1a75d1 6654->6665 6655->6653 6656 1a75d1 __onexit 29 API calls 6655->6656 6658 1a43e2 6656->6658 6661 1a46da ___vcrt_freefls@4 20 API calls 6658->6661 6659 1a43c2 6660 1a46da ___vcrt_freefls@4 20 API calls 6659->6660 6660->6655 6661->6653 6693 1a647b LeaveCriticalSection 6662->6693 6664 1a4192 6664->6650 6666 1a75dc 6665->6666 6667 1a7604 6666->6667 6668 1a75f5 6666->6668 6669 1a7613 6667->6669 6674 1a8b5c 6667->6674 6670 1a4ae2 __dosmaperr 20 API calls 6668->6670 6681 1a8b8f 6669->6681 6673 1a75fa ___scrt_fastfail 6670->6673 6673->6659 6675 1a8b7c HeapSize 6674->6675 6676 1a8b67 6674->6676 6675->6669 6677 1a4ae2 __dosmaperr 20 API calls 6676->6677 6678 1a8b6c 6677->6678 6679 1a4a26 ___std_exception_copy 26 API calls 6678->6679 6680 1a8b77 6679->6680 6680->6669 6682 1a8b9c 6681->6682 6683 1a8ba7 6681->6683 6685 1a4714 __onexit 21 API calls 6682->6685 6684 1a8baf 6683->6684 6692 1a8bb8 _abort 6683->6692 6686 1a46da ___vcrt_freefls@4 20 API calls 6684->6686 6689 1a8ba4 6685->6689 6686->6689 6687 1a8bbd 6690 1a4ae2 __dosmaperr 20 API calls 6687->6690 6688 1a8be2 HeapReAlloc 6688->6689 6688->6692 6689->6673 6690->6689 6691 1a40a2 _abort 7 API calls 6691->6692 6692->6687 6692->6688 6692->6691 6693->6664 6695 1a465d 6694->6695 6697 1a467d 6694->6697 6696 1a4ae2 __dosmaperr 20 API calls 6695->6696 6698 1a4673 6696->6698 6697->6618 6699 1a4a26 ___std_exception_copy 26 API calls 6698->6699 6699->6697 6700 1a8003 6701 1a8010 6700->6701 6702 1a47ff _abort 20 API calls 6701->6702 6703 1a802a 6702->6703 6704 1a46da ___vcrt_freefls@4 20 API calls 6703->6704 6705 1a8036 6704->6705 6706 1a47ff _abort 20 API calls 6705->6706 6710 1a805c 6705->6710 6708 1a8050 6706->6708 6709 1a46da ___vcrt_freefls@4 20 API calls 6708->6709 6709->6710 6711 1a8068 6710->6711 6712 1a6792 6710->6712 6713 1a64ac _abort 5 API calls 6712->6713 6714 1a67b9 6713->6714 6715 1a67d7 InitializeCriticalSectionAndSpinCount 6714->6715 6717 1a67c2 6714->6717 6715->6717 6716 1a16ee _ValidateLocalCookies 5 API calls 6718 1a67ee 6716->6718 6717->6716 6718->6710 7265 1aac83 7266 1aac99 7265->7266 7267 1aac8d 7265->7267 7267->7266 7268 1aac92 CloseHandle 7267->7268 7268->7266 6719 1a8600 6722 1a5cdc 6719->6722 6723 1a5ce5 6722->6723 6725 1a5cee 6722->6725 6726 1a5bdb 6723->6726 6727 1a505c _abort 38 API calls 6726->6727 6728 1a5be8 6727->6728 6729 1a5cfa __fassign 38 API calls 6728->6729 6730 1a5bf0 6729->6730 6746 1a596f 6730->6746 6733 1a4714 __onexit 21 API calls 6734 1a5c18 6733->6734 6745 1a5c4a 6734->6745 6753 1a5d9c 6734->6753 6737 1a46da ___vcrt_freefls@4 20 API calls 6739 1a5c07 6737->6739 6738 1a5c45 6740 1a4ae2 __dosmaperr 20 API calls 6738->6740 6739->6725 6740->6745 6741 1a5c8e 6741->6745 6763 1a5845 6741->6763 6742 1a5c62 6742->6741 6743 1a46da ___vcrt_freefls@4 20 API calls 6742->6743 6743->6741 6745->6737 6747 1a3150 __fassign 38 API calls 6746->6747 6748 1a5981 6747->6748 6749 1a59a2 6748->6749 6750 1a5990 GetOEMCP 6748->6750 6751 1a59a7 GetACP 6749->6751 6752 1a59b9 6749->6752 6750->6752 6751->6752 6752->6733 6752->6739 6754 1a596f 40 API calls 6753->6754 6756 1a5dbb 6754->6756 6755 1a5dc2 6757 1a16ee _ValidateLocalCookies 5 API calls 6755->6757 6756->6755 6758 1a5e0c IsValidCodePage 6756->6758 6762 1a5e31 ___scrt_fastfail 6756->6762 6759 1a5c3d 6757->6759 6758->6755 6760 1a5e1e GetCPInfo 6758->6760 6759->6738 6759->6742 6760->6755 6760->6762 6766 1a5a47 GetCPInfo 6762->6766 6822 1a5802 6763->6822 6765 1a5869 6765->6745 6771 1a5a81 6766->6771 6775 1a5b2b 6766->6775 6768 1a16ee _ValidateLocalCookies 5 API calls 6770 1a5bd7 6768->6770 6770->6755 6776 1a7123 6771->6776 6774 1a882c 43 API calls 6774->6775 6775->6768 6777 1a3150 __fassign 38 API calls 6776->6777 6778 1a7143 MultiByteToWideChar 6777->6778 6780 1a7181 6778->6780 6786 1a7219 6778->6786 6782 1a4714 __onexit 21 API calls 6780->6782 6787 1a71a2 __alloca_probe_16 ___scrt_fastfail 6780->6787 6781 1a16ee _ValidateLocalCookies 5 API calls 6783 1a5ae2 6781->6783 6782->6787 6790 1a882c 6783->6790 6784 1a7213 6785 1a335c __freea 20 API calls 6784->6785 6785->6786 6786->6781 6787->6784 6788 1a71e7 MultiByteToWideChar 6787->6788 6788->6784 6789 1a7203 GetStringTypeW 6788->6789 6789->6784 6791 1a3150 __fassign 38 API calls 6790->6791 6792 1a883f 6791->6792 6795 1a860f 6792->6795 6797 1a862a 6795->6797 6796 1a8650 MultiByteToWideChar 6798 1a867a 6796->6798 6799 1a8804 6796->6799 6797->6796 6802 1a4714 __onexit 21 API calls 6798->6802 6805 1a869b __alloca_probe_16 6798->6805 6800 1a16ee _ValidateLocalCookies 5 API calls 6799->6800 6801 1a5b03 6800->6801 6801->6774 6802->6805 6803 1a8750 6808 1a335c __freea 20 API calls 6803->6808 6804 1a86e4 MultiByteToWideChar 6804->6803 6806 1a86fd 6804->6806 6805->6803 6805->6804 6807 1a67f4 11 API calls 6806->6807 6809 1a8714 6807->6809 6808->6799 6809->6803 6810 1a875f 6809->6810 6811 1a8727 6809->6811 6814 1a4714 __onexit 21 API calls 6810->6814 6817 1a8780 __alloca_probe_16 6810->6817 6811->6803 6812 1a67f4 11 API calls 6811->6812 6812->6803 6813 1a87f5 6816 1a335c __freea 20 API calls 6813->6816 6814->6817 6815 1a67f4 11 API calls 6818 1a87d4 6815->6818 6816->6803 6817->6813 6817->6815 6818->6813 6819 1a87e3 WideCharToMultiByte 6818->6819 6819->6813 6820 1a8823 6819->6820 6821 1a335c __freea 20 API calls 6820->6821 6821->6803 6823 1a580e ___scrt_is_nonwritable_in_current_image 6822->6823 6830 1a6433 EnterCriticalSection 6823->6830 6825 1a5818 6831 1a586d 6825->6831 6829 1a5831 ___scrt_is_nonwritable_in_current_image 6829->6765 6830->6825 6843 1a5f8d 6831->6843 6833 1a58bb 6834 1a5f8d 26 API calls 6833->6834 6835 1a58d7 6834->6835 6836 1a5f8d 26 API calls 6835->6836 6837 1a58f5 6836->6837 6838 1a5825 6837->6838 6839 1a46da ___vcrt_freefls@4 20 API calls 6837->6839 6840 1a5839 6838->6840 6839->6838 6857 1a647b LeaveCriticalSection 6840->6857 6842 1a5843 6842->6829 6844 1a5f9e 6843->6844 6848 1a5f9a 6843->6848 6845 1a5fa5 6844->6845 6849 1a5fb8 ___scrt_fastfail 6844->6849 6846 1a4ae2 __dosmaperr 20 API calls 6845->6846 6847 1a5faa 6846->6847 6850 1a4a26 ___std_exception_copy 26 API calls 6847->6850 6848->6833 6849->6848 6851 1a5fe6 6849->6851 6853 1a5fef 6849->6853 6850->6848 6852 1a4ae2 __dosmaperr 20 API calls 6851->6852 6854 1a5feb 6852->6854 6853->6848 6855 1a4ae2 __dosmaperr 20 API calls 6853->6855 6856 1a4a26 ___std_exception_copy 26 API calls 6854->6856 6855->6854 6856->6848 6857->6842 6858 1a5205 6862 1a5216 6858->6862 6859 1a521a 6860 1a521f 6859->6860 6861 1a4ae2 __dosmaperr 20 API calls 6859->6861 6863 1a524a 6861->6863 6862->6859 6862->6860 6865 1a525b 6862->6865 6864 1a4a26 ___std_exception_copy 26 API calls 6863->6864 6864->6860 6865->6860 6866 1a4ae2 __dosmaperr 20 API calls 6865->6866 6866->6863 6867 1a6e05 6868 1a6e0a 6867->6868 6870 1a6e2d 6868->6870 6871 1a6a35 6868->6871 6872 1a6a42 6871->6872 6873 1a6a64 6871->6873 6874 1a6a5e 6872->6874 6875 1a6a50 DeleteCriticalSection 6872->6875 6873->6868 6876 1a46da ___vcrt_freefls@4 20 API calls 6874->6876 6875->6874 6875->6875 6876->6873 7269 1a6985 7270 1a69b6 7269->7270 7271 1a6990 7269->7271 7271->7270 7272 1a69a0 FreeLibrary 7271->7272 7272->7271 7273 1aa685 7274 1aa6ad 7273->7274 7275 1aa6de 7274->7275 7276 1aa6d7 7274->7276 7277 1aa6e5 7274->7277 7282 1aa740 7275->7282 7278 1aa757 21 API calls 7276->7278 7280 1aa6dc 7278->7280 7283 1aa760 7282->7283 7284 1aae2f __startOneArgErrorHandling 21 API calls 7283->7284 7285 1aa6e3 7284->7285 6877 1a193a 6880 1a1d24 6877->6880 6879 1a193f 6879->6879 6881 1a1d47 6880->6881 6882 1a1d54 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6880->6882 6881->6882 6883 1a1d4b 6881->6883 6882->6883 6883->6879 6884 1a573b 6889 1a5770 6884->6889 6887 1a46da ___vcrt_freefls@4 20 API calls 6888 1a5757 6887->6888 6890 1a5782 6889->6890 6891 1a5749 6889->6891 6892 1a57b2 6890->6892 6893 1a5787 6890->6893 6891->6887 6891->6888 6892->6891 6895 1a75d1 __onexit 29 API calls 6892->6895 6894 1a47ff _abort 20 API calls 6893->6894 6896 1a5790 6894->6896 6898 1a57cd 6895->6898 6897 1a46da ___vcrt_freefls@4 20 API calls 6896->6897 6897->6891 6899 1a46da ___vcrt_freefls@4 20 API calls 6898->6899 6899->6891 7286 1a17b9 7291 1a1f9e SetUnhandledExceptionFilter 7286->7291 7288 1a17be 7292 1a4054 7288->7292 7290 1a17c9 7291->7288 7293 1a407a 7292->7293 7294 1a4060 7292->7294 7293->7290 7294->7293 7295 1a4ae2 __dosmaperr 20 API calls 7294->7295 7296 1a406a 7295->7296 7297 1a4a26 ___std_exception_copy 26 API calls 7296->7297 7298 1a4075 7297->7298 7298->7290 7299 1a2bbe 7300 1a2bc8 7299->7300 7301 1a2bd5 7299->7301 7300->7301 7302 1a46da ___vcrt_freefls@4 20 API calls 7300->7302 7302->7301 7303 1a1faa 7304 1a1fdf 7303->7304 7305 1a1fba 7303->7305 7305->7304 7308 1a469e 7305->7308 7309 1a46aa _abort 7308->7309 7310 1a505c _abort 38 API calls 7309->7310 7313 1a46af 7310->7313 7311 1a47bc _abort 38 API calls 7312 1a46d9 7311->7312 7313->7311 7314 1a20ab 7317 1a2111 7314->7317 7320 1a296a 7317->7320 7319 1a20b9 7321 1a29a4 ___std_exception_copy 7320->7321 7322 1a2977 7320->7322 7321->7319 7322->7321 7323 1a4138 ___std_exception_copy 21 API calls 7322->7323 7324 1a2994 7323->7324 7324->7321 7326 1a4762 7324->7326 7327 1a476f 7326->7327 7328 1a477d 7326->7328 7327->7328 7330 1a4794 7327->7330 7329 1a4ae2 __dosmaperr 20 API calls 7328->7329 7334 1a4785 7329->7334 7332 1a478f 7330->7332 7333 1a4ae2 __dosmaperr 20 API calls 7330->7333 7331 1a4a26 ___std_exception_copy 26 API calls 7331->7332 7332->7321 7333->7334 7334->7331 7335 1aa9ab 7336 1aa9c4 __startOneArgErrorHandling 7335->7336 7337 1aa9ed __startOneArgErrorHandling 7336->7337 7339 1aaf84 7336->7339 7340 1aafbd __startOneArgErrorHandling 7339->7340 7341 1ab255 __raise_exc RaiseException 7340->7341 7342 1aafe4 __startOneArgErrorHandling 7340->7342 7341->7342 7343 1ab027 7342->7343 7344 1ab002 7342->7344 7345 1ab546 __startOneArgErrorHandling 20 API calls 7343->7345 7350 1ab575 7344->7350 7347 1ab022 __startOneArgErrorHandling 7345->7347 7348 1a16ee _ValidateLocalCookies 5 API calls 7347->7348 7349 1ab04b 7348->7349 7349->7337 7351 1ab584 7350->7351 7352 1ab5a3 __startOneArgErrorHandling 7351->7352 7353 1ab5f8 __startOneArgErrorHandling 7351->7353 7355 1a3581 __startOneArgErrorHandling 5 API calls 7352->7355 7354 1ab546 __startOneArgErrorHandling 20 API calls 7353->7354 7358 1ab5f1 7354->7358 7356 1ab5e4 7355->7356 7357 1ab546 __startOneArgErrorHandling 20 API calls 7356->7357 7356->7358 7357->7358 7358->7347 7359 1a6daf 7360 1a6dbb ___scrt_is_nonwritable_in_current_image 7359->7360 7371 1a6433 EnterCriticalSection 7360->7371 7362 1a6dc2 7372 1a6a6a 7362->7372 7364 1a6dd1 7370 1a6de0 7364->7370 7385 1a6c43 GetStartupInfoW 7364->7385 7367 1a6df1 ___scrt_is_nonwritable_in_current_image 7369 1a6cf9 2 API calls 7369->7370 7391 1a6dfc 7370->7391 7371->7362 7373 1a6a76 ___scrt_is_nonwritable_in_current_image 7372->7373 7374 1a6a9a 7373->7374 7375 1a6a83 7373->7375 7394 1a6433 EnterCriticalSection 7374->7394 7376 1a4ae2 __dosmaperr 20 API calls 7375->7376 7378 1a6a88 7376->7378 7379 1a4a26 ___std_exception_copy 26 API calls 7378->7379 7382 1a6a92 ___scrt_is_nonwritable_in_current_image 7379->7382 7380 1a6ad2 7402 1a6af9 7380->7402 7382->7364 7384 1a6aa6 7384->7380 7395 1a69bb 7384->7395 7386 1a6c60 7385->7386 7387 1a6cf2 7385->7387 7386->7387 7388 1a6a6a 27 API calls 7386->7388 7387->7369 7389 1a6c89 7388->7389 7389->7387 7390 1a6cb7 GetFileType 7389->7390 7390->7389 7406 1a647b LeaveCriticalSection 7391->7406 7393 1a6e03 7393->7367 7394->7384 7396 1a47ff _abort 20 API calls 7395->7396 7398 1a69cd 7396->7398 7397 1a69da 7399 1a46da ___vcrt_freefls@4 20 API calls 7397->7399 7398->7397 7400 1a6792 11 API calls 7398->7400 7401 1a6a2c 7399->7401 7400->7398 7401->7384 7405 1a647b LeaveCriticalSection 7402->7405 7404 1a6b00 7404->7382 7405->7404 7406->7393 6900 1a8220 6901 1a8259 6900->6901 6902 1a825d 6901->6902 6913 1a8285 6901->6913 6903 1a4ae2 __dosmaperr 20 API calls 6902->6903 6904 1a8262 6903->6904 6906 1a4a26 ___std_exception_copy 26 API calls 6904->6906 6905 1a85a9 6907 1a16ee _ValidateLocalCookies 5 API calls 6905->6907 6908 1a826d 6906->6908 6909 1a85b6 6907->6909 6910 1a16ee _ValidateLocalCookies 5 API calls 6908->6910 6911 1a8279 6910->6911 6913->6905 6914 1a8140 6913->6914 6915 1a815b 6914->6915 6916 1a16ee _ValidateLocalCookies 5 API calls 6915->6916 6917 1a81d2 6916->6917 6917->6913 6918 1a9f20 6921 1a9f3e 6918->6921 6920 1a9f36 6922 1a9f43 6921->6922 6924 1a9fd8 6922->6924 6926 1aa793 6922->6926 6924->6920 6927 1aa7b0 DecodePointer 6926->6927 6928 1aa7c0 6926->6928 6927->6928 6929 1aa84d 6928->6929 6932 1aa842 6928->6932 6934 1aa7f7 6928->6934 6929->6932 6933 1a4ae2 __dosmaperr 20 API calls 6929->6933 6930 1a16ee _ValidateLocalCookies 5 API calls 6931 1aa16f 6930->6931 6931->6920 6932->6930 6933->6932 6934->6932 6935 1a4ae2 __dosmaperr 20 API calls 6934->6935 6935->6932 7407 1a9ba1 7409 1a9bc5 7407->7409 7408 1a9ca1 __startOneArgErrorHandling 7413 1aaf84 21 API calls 7408->7413 7414 1aa9ed __startOneArgErrorHandling 7408->7414 7409->7408 7410 1a9c16 7409->7410 7411 1a9c28 7410->7411 7412 1aa793 21 API calls 7410->7412 7412->7411 7413->7414 7415 1a45a4 7416 1a45c7 7415->7416 7417 1a45b3 7415->7417 7418 1a46da ___vcrt_freefls@4 20 API calls 7416->7418 7417->7416 7419 1a46da ___vcrt_freefls@4 20 API calls 7417->7419 7420 1a45d9 7418->7420 7419->7416 7421 1a46da ___vcrt_freefls@4 20 API calls 7420->7421 7422 1a45ec 7421->7422 7423 1a46da ___vcrt_freefls@4 20 API calls 7422->7423 7424 1a45fd 7423->7424 7425 1a46da ___vcrt_freefls@4 20 API calls 7424->7425 7426 1a460e 7425->7426 6936 1a765b 6939 1a7681 6936->6939 6940 1a767d 6936->6940 6937 1a16ee _ValidateLocalCookies 5 API calls 6938 1a76e3 6937->6938 6939->6940 6941 1a6cf9 2 API calls 6939->6941 6940->6937 6941->6939 7427 1a20de 7428 1a2111 std::exception::exception 27 API calls 7427->7428 7429 1a20ec 7428->7429 7430 1a35df 7431 1a360a GetModuleFileNameW 7430->7431 7432 1a35ee 7430->7432 7436 1a3630 7431->7436 7432->7431 7433 1a35f4 7432->7433 7434 1a4ae2 __dosmaperr 20 API calls 7433->7434 7435 1a35f9 7434->7435 7437 1a4a26 ___std_exception_copy 26 API calls 7435->7437 7447 1a3884 7436->7447 7439 1a3603 7437->7439 7441 1a3663 7442 1a4ae2 __dosmaperr 20 API calls 7441->7442 7446 1a3668 7442->7446 7443 1a46da ___vcrt_freefls@4 20 API calls 7443->7439 7444 1a366f 7444->7444 7445 1a46da ___vcrt_freefls@4 20 API calls 7444->7445 7444->7446 7445->7446 7446->7443 7448 1a3899 7447->7448 7449 1a365a 7447->7449 7448->7449 7450 1a47ff _abort 20 API calls 7448->7450 7449->7441 7449->7444 7451 1a38c7 7450->7451 7452 1a46da ___vcrt_freefls@4 20 API calls 7451->7452 7452->7449 7453 1a5cdd 7454 1a5cee 7453->7454 7455 1a5bdb 51 API calls 7453->7455 7455->7454 6942 1a4556 6945 1a3bb5 6942->6945 6954 1a3b09 6945->6954 6948 1a3b09 5 API calls 6949 1a3bd3 6948->6949 6950 1a3a61 20 API calls 6949->6950 6951 1a3bde 6950->6951 6952 1a3a61 20 API calls 6951->6952 6953 1a3be9 6952->6953 6955 1a3b22 6954->6955 6956 1a16ee _ValidateLocalCookies 5 API calls 6955->6956 6957 1a3b43 6956->6957 6957->6948 7456 1a3dd7 7457 1a469e 38 API calls 7456->7457 7458 1a3ddf 7457->7458 7459 1a46ca 7460 1a46cd 7459->7460 7461 1a47bc _abort 38 API calls 7460->7461 7462 1a46d9 7461->7462 5846 1a17cb 5847 1a17d7 ___scrt_is_nonwritable_in_current_image 5846->5847 5870 1a1b35 5847->5870 5849 1a17de 5851 1a1807 5849->5851 5898 1a1e3f IsProcessorFeaturePresent 5849->5898 5856 1a1846 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 5851->5856 5902 1a3c61 5851->5902 5855 1a1826 ___scrt_is_nonwritable_in_current_image 5857 1a18a6 5856->5857 5910 1a3edf 5856->5910 5881 1a3bec 5857->5881 5862 1a18c4 5893 1a1f5a GetModuleHandleW 5862->5893 5865 1a18d8 5867 1a18e1 5865->5867 5916 1a3eba 5865->5916 5919 1a1cac 5867->5919 5871 1a1b3e 5870->5871 5925 1a21c2 IsProcessorFeaturePresent 5871->5925 5875 1a1b53 5875->5849 5876 1a1b4f 5876->5875 5936 1a461b 5876->5936 5879 1a1b6a 5879->5849 5882 1a3bf5 5881->5882 5884 1a18ba 5881->5884 6025 1a38e4 5882->6025 5885 1a16b0 5884->5885 5886 1a16bc 5885->5886 5887 1a16e0 5885->5887 5886->5887 5888 1a16cf 5886->5888 6227 1a1100 5887->6227 5890 1a1100 61 API calls 5888->5890 5892 1a16d9 5890->5892 5891 1a16ea 5891->5862 5892->5862 5894 1a18ce 5893->5894 5894->5865 5895 1a3f17 5894->5895 5896 1a3cd8 _abort 28 API calls 5895->5896 5897 1a3f28 5896->5897 5897->5865 5899 1a1e55 ___scrt_fastfail 5898->5899 5900 1a1efd IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5899->5900 5901 1a1f47 5900->5901 5901->5849 5905 1a3c78 5902->5905 5903 1a16ee _ValidateLocalCookies 5 API calls 5904 1a1820 5903->5904 5904->5855 5906 1a3c05 5904->5906 5905->5903 5908 1a3c34 5906->5908 5907 1a16ee _ValidateLocalCookies 5 API calls 5909 1a3c5d 5907->5909 5908->5907 5909->5856 5911 1a3f07 _abort __onexit 5910->5911 5911->5857 5912 1a505c _abort 38 API calls 5911->5912 5915 1a46af 5912->5915 5913 1a47bc _abort 38 API calls 5914 1a46d9 5913->5914 5915->5913 5917 1a3cd8 _abort 28 API calls 5916->5917 5918 1a3ec5 5917->5918 5918->5867 5920 1a1cb8 5919->5920 5921 1a1cce 5920->5921 6564 1a462d 5920->6564 5921->5855 5924 1a27ef ___vcrt_uninitialize 8 API calls 5924->5921 5926 1a1b4a 5925->5926 5927 1a27c6 5926->5927 5928 1a27cb ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 5927->5928 5947 1a2c28 5928->5947 5930 1a27d9 5930->5876 5933 1a27e1 5934 1a27ec 5933->5934 5961 1a2c64 5933->5961 5934->5876 6002 1a7664 5936->6002 5939 1a27ef 5940 1a2809 5939->5940 5941 1a27f8 5939->5941 5940->5875 5942 1a2c0d ___vcrt_uninitialize_ptd 6 API calls 5941->5942 5943 1a27fd 5942->5943 5944 1a2c64 ___vcrt_uninitialize_locks DeleteCriticalSection 5943->5944 5945 1a2802 5944->5945 6021 1a2ee5 5945->6021 5949 1a2c31 5947->5949 5950 1a2c5a 5949->5950 5951 1a27d5 5949->5951 5965 1a2e65 5949->5965 5952 1a2c64 ___vcrt_uninitialize_locks DeleteCriticalSection 5950->5952 5951->5930 5953 1a2bda 5951->5953 5952->5951 5983 1a2db4 5953->5983 5955 1a2be4 5956 1a2bef 5955->5956 5988 1a2e28 5955->5988 5956->5933 5958 1a2bfd 5959 1a2c0a 5958->5959 5993 1a2c0d 5958->5993 5959->5933 5962 1a2c8e 5961->5962 5963 1a2c6f 5961->5963 5962->5930 5964 1a2c79 DeleteCriticalSection 5963->5964 5964->5962 5964->5964 5970 1a2c93 5965->5970 5967 1a2e7f 5968 1a2e9c InitializeCriticalSectionAndSpinCount 5967->5968 5969 1a2e88 5967->5969 5968->5969 5969->5949 5971 1a2cc7 __crt_fast_encode_pointer 5970->5971 5973 1a2cc3 5970->5973 5971->5967 5972 1a2ce7 5972->5971 5975 1a2cf3 GetProcAddress 5972->5975 5973->5971 5973->5972 5976 1a2d33 5973->5976 5975->5971 5977 1a2d5b LoadLibraryExW 5976->5977 5978 1a2d50 5976->5978 5979 1a2d77 GetLastError 5977->5979 5982 1a2d8f 5977->5982 5978->5973 5980 1a2d82 LoadLibraryExW 5979->5980 5979->5982 5980->5982 5981 1a2da6 FreeLibrary 5981->5978 5982->5978 5982->5981 5984 1a2c93 try_get_function 5 API calls 5983->5984 5985 1a2dce 5984->5985 5986 1a2de6 TlsAlloc 5985->5986 5987 1a2dd7 5985->5987 5987->5955 5989 1a2c93 try_get_function 5 API calls 5988->5989 5990 1a2e42 5989->5990 5991 1a2e5c TlsSetValue 5990->5991 5992 1a2e51 5990->5992 5991->5992 5992->5958 5994 1a2c17 5993->5994 5995 1a2c1d 5993->5995 5997 1a2dee 5994->5997 5995->5956 5998 1a2c93 try_get_function 5 API calls 5997->5998 5999 1a2e08 5998->5999 6000 1a2e1f TlsFree 5999->6000 6001 1a2e14 5999->6001 6000->6001 6001->5995 6005 1a7681 6002->6005 6006 1a767d 6002->6006 6004 1a1b5c 6004->5879 6004->5939 6005->6006 6008 1a6cf9 6005->6008 6013 1a16ee 6006->6013 6009 1a6d00 6008->6009 6010 1a6d43 GetStdHandle 6009->6010 6011 1a6dab 6009->6011 6012 1a6d56 GetFileType 6009->6012 6010->6009 6011->6005 6012->6009 6014 1a16f9 IsProcessorFeaturePresent 6013->6014 6015 1a16f7 6013->6015 6017 1a1980 6014->6017 6015->6004 6020 1a1944 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6017->6020 6019 1a1a63 6019->6004 6020->6019 6022 1a2f14 6021->6022 6023 1a2eee 6021->6023 6022->5940 6023->6022 6024 1a2efe FreeLibrary 6023->6024 6024->6023 6026 1a38ed 6025->6026 6027 1a3906 6025->6027 6028 1a38f5 6026->6028 6032 1a3913 6026->6032 6027->5884 6028->5884 6030 1a38fd 6030->6028 6043 1a3a90 6030->6043 6033 1a391f 6032->6033 6034 1a391c 6032->6034 6053 1a6045 GetEnvironmentStringsW 6033->6053 6034->6030 6037 1a392c 6039 1a46da ___vcrt_freefls@4 20 API calls 6037->6039 6040 1a3961 6039->6040 6040->6030 6041 1a3937 6077 1a46da 6041->6077 6044 1a3a9d 6043->6044 6049 1a3aa2 6043->6049 6044->6027 6045 1a3aa8 MultiByteToWideChar 6045->6049 6051 1a3af7 6045->6051 6046 1a47ff _abort 20 API calls 6046->6049 6047 1a3acc MultiByteToWideChar 6048 1a3afd 6047->6048 6047->6049 6050 1a46da ___vcrt_freefls@4 20 API calls 6048->6050 6049->6045 6049->6046 6049->6047 6049->6048 6049->6051 6052 1a46da ___vcrt_freefls@4 20 API calls 6049->6052 6050->6051 6051->6027 6052->6049 6054 1a6059 6053->6054 6055 1a3926 6053->6055 6083 1a4714 6054->6083 6055->6037 6060 1a3967 6055->6060 6057 1a606d 6058 1a46da ___vcrt_freefls@4 20 API calls 6057->6058 6059 1a6087 FreeEnvironmentStringsW 6058->6059 6059->6055 6061 1a3985 6060->6061 6062 1a47ff _abort 20 API calls 6061->6062 6066 1a39bf 6062->6066 6063 1a46da ___vcrt_freefls@4 20 API calls 6065 1a3a4a 6063->6065 6064 1a3a30 6064->6063 6065->6041 6066->6064 6067 1a47ff _abort 20 API calls 6066->6067 6068 1a3a32 6066->6068 6072 1a3a54 6066->6072 6075 1a46da ___vcrt_freefls@4 20 API calls 6066->6075 6188 1a3077 6066->6188 6067->6066 6197 1a3a61 6068->6197 6203 1a4a36 IsProcessorFeaturePresent 6072->6203 6073 1a46da ___vcrt_freefls@4 20 API calls 6073->6064 6075->6066 6076 1a3a60 6078 1a470e __dosmaperr 6077->6078 6079 1a46e5 HeapFree 6077->6079 6078->6037 6079->6078 6080 1a46fa 6079->6080 6081 1a4ae2 __dosmaperr 18 API calls 6080->6081 6082 1a4700 GetLastError 6081->6082 6082->6078 6084 1a4752 6083->6084 6088 1a4722 _abort 6083->6088 6095 1a4ae2 6084->6095 6086 1a473d HeapAlloc 6087 1a4750 6086->6087 6086->6088 6087->6057 6088->6084 6088->6086 6090 1a40a2 6088->6090 6098 1a40e6 6090->6098 6092 1a16ee _ValidateLocalCookies 5 API calls 6093 1a40e2 6092->6093 6093->6088 6094 1a40b8 6094->6092 6109 1a50e0 GetLastError 6095->6109 6099 1a40f2 ___scrt_is_nonwritable_in_current_image 6098->6099 6104 1a6433 EnterCriticalSection 6099->6104 6101 1a40fd 6105 1a412f 6101->6105 6103 1a4124 ___scrt_is_nonwritable_in_current_image 6103->6094 6104->6101 6108 1a647b LeaveCriticalSection 6105->6108 6107 1a4136 6107->6103 6108->6107 6110 1a50f9 6109->6110 6111 1a50ff 6109->6111 6128 1a66e3 6110->6128 6115 1a5156 SetLastError 6111->6115 6135 1a47ff 6111->6135 6116 1a4ae7 6115->6116 6116->6087 6117 1a5119 6119 1a46da ___vcrt_freefls@4 17 API calls 6117->6119 6121 1a511f 6119->6121 6123 1a514d SetLastError 6121->6123 6122 1a5135 6149 1a4ece 6122->6149 6123->6116 6126 1a46da ___vcrt_freefls@4 17 API calls 6127 1a5146 6126->6127 6127->6115 6127->6123 6154 1a64ac 6128->6154 6131 1a6722 TlsGetValue 6132 1a6716 6131->6132 6133 1a16ee _ValidateLocalCookies 5 API calls 6132->6133 6134 1a6733 6133->6134 6134->6111 6140 1a480c _abort 6135->6140 6136 1a484c 6139 1a4ae2 __dosmaperr 19 API calls 6136->6139 6137 1a4837 HeapAlloc 6138 1a484a 6137->6138 6137->6140 6138->6117 6142 1a6739 6138->6142 6139->6138 6140->6136 6140->6137 6141 1a40a2 _abort 7 API calls 6140->6141 6141->6140 6143 1a64ac _abort 5 API calls 6142->6143 6144 1a6760 6143->6144 6145 1a677b TlsSetValue 6144->6145 6146 1a676f 6144->6146 6145->6146 6147 1a16ee _ValidateLocalCookies 5 API calls 6146->6147 6148 1a512e 6147->6148 6148->6117 6148->6122 6168 1a4ea6 6149->6168 6155 1a64dc 6154->6155 6158 1a64d8 6154->6158 6155->6131 6155->6132 6156 1a64fc 6156->6155 6159 1a6508 GetProcAddress 6156->6159 6158->6155 6158->6156 6161 1a6548 6158->6161 6160 1a6518 __crt_fast_encode_pointer 6159->6160 6160->6155 6162 1a6569 LoadLibraryExW 6161->6162 6163 1a655e 6161->6163 6164 1a6586 GetLastError 6162->6164 6167 1a659e 6162->6167 6163->6158 6165 1a6591 LoadLibraryExW 6164->6165 6164->6167 6165->6167 6166 1a65b5 FreeLibrary 6166->6163 6167->6163 6167->6166 6174 1a4de6 6168->6174 6170 1a4eca 6171 1a4e56 6170->6171 6180 1a4cea 6171->6180 6173 1a4e7a 6173->6126 6175 1a4df2 ___scrt_is_nonwritable_in_current_image 6174->6175 6176 1a6433 _abort EnterCriticalSection 6175->6176 6177 1a4dfc 6176->6177 6178 1a4e22 _abort LeaveCriticalSection 6177->6178 6179 1a4e1a ___scrt_is_nonwritable_in_current_image 6178->6179 6179->6170 6181 1a4cf6 ___scrt_is_nonwritable_in_current_image 6180->6181 6182 1a6433 _abort EnterCriticalSection 6181->6182 6183 1a4d00 6182->6183 6184 1a5011 _abort 20 API calls 6183->6184 6185 1a4d18 6184->6185 6186 1a4d2e _abort LeaveCriticalSection 6185->6186 6187 1a4d26 ___scrt_is_nonwritable_in_current_image 6186->6187 6187->6173 6189 1a3092 6188->6189 6190 1a3084 6188->6190 6191 1a4ae2 __dosmaperr 20 API calls 6189->6191 6190->6189 6195 1a30ab 6190->6195 6192 1a309c 6191->6192 6207 1a4a26 6192->6207 6194 1a30a6 6194->6066 6195->6194 6196 1a4ae2 __dosmaperr 20 API calls 6195->6196 6196->6192 6198 1a3a6e 6197->6198 6199 1a3a38 6197->6199 6200 1a3a85 6198->6200 6201 1a46da ___vcrt_freefls@4 20 API calls 6198->6201 6199->6073 6202 1a46da ___vcrt_freefls@4 20 API calls 6200->6202 6201->6198 6202->6199 6204 1a4a41 6203->6204 6221 1a485c 6204->6221 6210 1a49ab 6207->6210 6209 1a4a32 6209->6194 6211 1a50e0 __dosmaperr 20 API calls 6210->6211 6212 1a49c1 6211->6212 6213 1a49cf 6212->6213 6214 1a4a20 6212->6214 6219 1a16ee _ValidateLocalCookies 5 API calls 6213->6219 6215 1a4a36 ___std_exception_copy 11 API calls 6214->6215 6216 1a4a25 6215->6216 6217 1a49ab ___std_exception_copy 26 API calls 6216->6217 6218 1a4a32 6217->6218 6218->6209 6220 1a49f6 6219->6220 6220->6209 6222 1a4878 _abort ___scrt_fastfail 6221->6222 6223 1a48a4 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6222->6223 6224 1a4975 _abort 6223->6224 6225 1a16ee _ValidateLocalCookies 5 API calls 6224->6225 6226 1a4993 GetCurrentProcess TerminateProcess 6225->6226 6226->6076 6273 1a2810 6227->6273 6230 1a115a 6275 1a30db 6230->6275 6233 1a119a 6236 1a30db 26 API calls 6233->6236 6234 1a11b1 6235 1a30db 26 API calls 6234->6235 6237 1a11cb PathFileExistsW 6235->6237 6236->6234 6238 1a11fb RegOpenKeyExW 6237->6238 6239 1a11e2 6237->6239 6241 1a164b 6238->6241 6242 1a1277 RegQueryValueExW 6238->6242 6240 1a16ee _ValidateLocalCookies 5 API calls 6239->6240 6243 1a11f7 6240->6243 6246 1a16ee _ValidateLocalCookies 5 API calls 6241->6246 6244 1a12cd RegCloseKey 6242->6244 6245 1a1295 6242->6245 6243->5891 6244->6241 6248 1a12df PathFileExistsW 6244->6248 6284 1a1704 6245->6284 6249 1a1660 6246->6249 6251 1a12ea 6248->6251 6252 1a1642 6248->6252 6249->5891 6253 1a1704 22 API calls 6251->6253 6252->6241 6254 1a12f4 GetCurrentDirectoryW SetCurrentDirectoryW 6253->6254 6255 1a133d ___scrt_fastfail 6254->6255 6257 1a140f 6255->6257 6291 1a1000 FindFirstFileW 6255->6291 6258 1a1704 22 API calls 6257->6258 6259 1a142b 6258->6259 6260 1a1459 6259->6260 6262 1a1704 22 API calls 6259->6262 6261 1a1000 43 API calls 6260->6261 6263 1a1492 6260->6263 6261->6260 6262->6259 6264 1a1704 22 API calls 6263->6264 6267 1a14cf ___scrt_fastfail 6264->6267 6265 1a15d8 SetCurrentDirectoryW 6268 1a15e9 6265->6268 6266 1a30db 26 API calls 6266->6267 6267->6265 6267->6266 6269 1a30db 26 API calls 6267->6269 6270 1a16ee _ValidateLocalCookies 5 API calls 6268->6270 6271 1a1572 CreateProcessW WaitForSingleObject CloseHandle CloseHandle 6269->6271 6272 1a163e 6270->6272 6271->6265 6271->6267 6272->5891 6274 1a1134 GetEnvironmentVariableW 6273->6274 6274->6230 6276 1a30f8 6275->6276 6278 1a30ea 6275->6278 6277 1a4ae2 __dosmaperr 20 API calls 6276->6277 6283 1a3102 6277->6283 6278->6276 6281 1a3128 6278->6281 6279 1a4a26 ___std_exception_copy 26 API calls 6280 1a117e GetCurrentProcess IsWow64Process 6279->6280 6280->6233 6280->6234 6281->6280 6282 1a4ae2 __dosmaperr 20 API calls 6281->6282 6282->6283 6283->6279 6290 1a1a6c 6284->6290 6286 1a12ab RegQueryValueExW 6286->6244 6287 1a40a2 _abort 7 API calls 6287->6290 6290->6286 6290->6287 6302 1a2198 6290->6302 6306 1a217b 6290->6306 6310 1a4138 6290->6310 6292 1a102d 6291->6292 6300 1a1043 _wcsstr ___scrt_fastfail 6291->6300 6293 1a16ee _ValidateLocalCookies 5 API calls 6292->6293 6294 1a103f 6293->6294 6294->6255 6295 1a10c6 FindNextFileW 6296 1a10d8 FindClose 6295->6296 6295->6300 6297 1a16ee _ValidateLocalCookies 5 API calls 6296->6297 6298 1a10ee 6297->6298 6298->6255 6300->6295 6301 1a3077 26 API calls 6300->6301 6320 1a337c 6300->6320 6301->6300 6303 1a21a6 6302->6303 6317 1a29ec 6303->6317 6305 1a21b4 6305->6290 6307 1a2189 Concurrency::cancel_current_task 6306->6307 6308 1a29ec __CxxThrowException@8 RaiseException 6307->6308 6309 1a2197 6308->6309 6315 1a4714 _abort 6310->6315 6311 1a4752 6312 1a4ae2 __dosmaperr 20 API calls 6311->6312 6314 1a4750 6312->6314 6313 1a473d HeapAlloc 6313->6314 6313->6315 6314->6290 6315->6311 6315->6313 6316 1a40a2 _abort 7 API calls 6315->6316 6316->6315 6318 1a2a0c 6317->6318 6319 1a2a3e RaiseException 6318->6319 6319->6305 6323 1a3393 6320->6323 6328 1a3150 6323->6328 6329 1a316d 6328->6329 6330 1a3163 6328->6330 6329->6330 6371 1a505c GetLastError 6329->6371 6336 1a31d3 6330->6336 6332 1a318e 6391 1a51ab 6332->6391 6337 1a31ed 6336->6337 6338 1a3203 6336->6338 6339 1a4ae2 __dosmaperr 20 API calls 6337->6339 6338->6337 6341 1a321a 6338->6341 6340 1a31f2 6339->6340 6342 1a4a26 ___std_exception_copy 26 API calls 6340->6342 6343 1a31fc 6341->6343 6543 1a4cac 6341->6543 6342->6343 6346 1a16ee _ValidateLocalCookies 5 API calls 6343->6346 6352 1a3358 6346->6352 6347 1a327e 6350 1a3283 6347->6350 6351 1a3294 6347->6351 6348 1a3245 6349 1a4ae2 __dosmaperr 20 API calls 6348->6349 6353 1a324a 6349->6353 6354 1a4ae2 __dosmaperr 20 API calls 6350->6354 6359 1a32b5 __alloca_probe_16 6351->6359 6360 1a4714 __onexit 21 API calls 6351->6360 6352->6300 6355 1a4ae2 __dosmaperr 20 API calls 6353->6355 6354->6340 6355->6343 6356 1a32ee 6361 1a4ae2 __dosmaperr 20 API calls 6356->6361 6357 1a3302 6358 1a4cac 11 API calls 6357->6358 6362 1a331e 6358->6362 6359->6356 6359->6357 6360->6359 6363 1a32f3 6361->6363 6364 1a3336 6362->6364 6365 1a3325 6362->6365 6366 1a4ae2 __dosmaperr 20 API calls 6363->6366 6368 1a4ae2 __dosmaperr 20 API calls 6364->6368 6367 1a3077 26 API calls 6365->6367 6369 1a32fe 6366->6369 6367->6369 6368->6369 6547 1a335c 6369->6547 6372 1a5078 6371->6372 6373 1a5072 6371->6373 6375 1a47ff _abort 20 API calls 6372->6375 6377 1a50c7 SetLastError 6372->6377 6374 1a66e3 _abort 11 API calls 6373->6374 6374->6372 6376 1a508a 6375->6376 6378 1a5092 6376->6378 6379 1a6739 _abort 11 API calls 6376->6379 6377->6332 6381 1a46da ___vcrt_freefls@4 20 API calls 6378->6381 6380 1a50a7 6379->6380 6380->6378 6382 1a50ae 6380->6382 6383 1a5098 6381->6383 6384 1a4ece _abort 20 API calls 6382->6384 6385 1a50d3 SetLastError 6383->6385 6386 1a50b9 6384->6386 6399 1a47bc 6385->6399 6388 1a46da ___vcrt_freefls@4 20 API calls 6386->6388 6390 1a50c0 6388->6390 6390->6377 6390->6385 6392 1a51be 6391->6392 6393 1a31a7 6391->6393 6392->6393 6480 1a750a 6392->6480 6395 1a51d8 6393->6395 6396 1a51eb 6395->6396 6397 1a5200 6395->6397 6396->6397 6529 1a5cfa 6396->6529 6397->6330 6410 1a7820 6399->6410 6402 1a47cc 6404 1a47d6 IsProcessorFeaturePresent 6402->6404 6405 1a47f4 6402->6405 6407 1a47e1 6404->6407 6440 1a3ec9 6405->6440 6408 1a485c _abort 8 API calls 6407->6408 6408->6405 6443 1a778e 6410->6443 6413 1a787b 6414 1a7887 _abort 6413->6414 6415 1a50e0 __dosmaperr 20 API calls 6414->6415 6417 1a78ae _abort 6414->6417 6420 1a78b4 _abort 6414->6420 6415->6417 6416 1a7900 6418 1a4ae2 __dosmaperr 20 API calls 6416->6418 6417->6416 6417->6420 6439 1a78e3 6417->6439 6419 1a7905 6418->6419 6421 1a4a26 ___std_exception_copy 26 API calls 6419->6421 6425 1a792c 6420->6425 6446 1a6433 EnterCriticalSection 6420->6446 6421->6439 6427 1a798b 6425->6427 6429 1a7983 6425->6429 6436 1a79b6 6425->6436 6447 1a647b LeaveCriticalSection 6425->6447 6427->6436 6448 1a7872 6427->6448 6431 1a3ec9 _abort 28 API calls 6429->6431 6431->6427 6433 1a505c _abort 38 API calls 6437 1a7a19 6433->6437 6435 1a7872 _abort 38 API calls 6435->6436 6451 1a7a3b 6436->6451 6438 1a505c _abort 38 API calls 6437->6438 6437->6439 6438->6439 6455 1aba99 6439->6455 6458 1a3cd8 6440->6458 6442 1a3eda 6444 1a7734 _abort EnterCriticalSection LeaveCriticalSection 6443->6444 6445 1a47c1 6444->6445 6445->6402 6445->6413 6446->6425 6447->6429 6449 1a505c _abort 38 API calls 6448->6449 6450 1a7877 6449->6450 6450->6435 6452 1a7a41 6451->6452 6454 1a7a0a 6451->6454 6453 1a647b _abort LeaveCriticalSection 6452->6453 6453->6454 6454->6433 6454->6437 6454->6439 6456 1a16ee _ValidateLocalCookies 5 API calls 6455->6456 6457 1abaa4 6456->6457 6457->6457 6459 1a3ce4 _abort 6458->6459 6460 1a3cfc 6459->6460 6462 1a1f5a _abort GetModuleHandleW 6459->6462 6461 1a6433 _abort EnterCriticalSection 6460->6461 6467 1a3d04 6461->6467 6463 1a3cf0 6462->6463 6463->6460 6464 1a3e32 _abort 8 API calls 6463->6464 6464->6460 6465 1a3de2 _abort LeaveCriticalSection 6466 1a3dbb 6465->6466 6468 1a3deb 6466->6468 6469 1a3dbf 6466->6469 6470 1a44ac _abort 20 API calls 6467->6470 6475 1a3d79 6467->6475 6478 1a3da2 6467->6478 6471 1aba99 _abort 5 API calls 6468->6471 6474 1a3df1 _abort 17 API calls 6469->6474 6470->6475 6476 1a3df0 6471->6476 6472 1a3c05 _abort 5 API calls 6477 1a3d91 6472->6477 6473 1a3c05 _abort 5 API calls 6473->6478 6479 1a3dc7 _abort 6474->6479 6475->6472 6475->6477 6476->6442 6477->6473 6478->6465 6479->6442 6481 1a7516 ___scrt_is_nonwritable_in_current_image 6480->6481 6482 1a505c _abort 38 API calls 6481->6482 6483 1a751f 6482->6483 6485 1a756d ___scrt_is_nonwritable_in_current_image 6483->6485 6492 1a6433 EnterCriticalSection 6483->6492 6485->6393 6486 1a753d 6493 1a7581 6486->6493 6491 1a47bc _abort 38 API calls 6491->6485 6492->6486 6494 1a7551 6493->6494 6495 1a758f __fassign 6493->6495 6497 1a7570 6494->6497 6495->6494 6500 1a72bd 6495->6500 6528 1a647b LeaveCriticalSection 6497->6528 6499 1a7564 6499->6485 6499->6491 6501 1a72d3 6500->6501 6502 1a733d 6500->6502 6501->6502 6508 1a7306 6501->6508 6511 1a46da ___vcrt_freefls@4 20 API calls 6501->6511 6504 1a46da ___vcrt_freefls@4 20 API calls 6502->6504 6527 1a738b 6502->6527 6503 1a7430 __fassign 20 API calls 6522 1a7399 6503->6522 6505 1a735f 6504->6505 6506 1a46da ___vcrt_freefls@4 20 API calls 6505->6506 6509 1a7372 6506->6509 6507 1a7328 6510 1a46da ___vcrt_freefls@4 20 API calls 6507->6510 6508->6507 6513 1a46da ___vcrt_freefls@4 20 API calls 6508->6513 6512 1a46da ___vcrt_freefls@4 20 API calls 6509->6512 6514 1a7332 6510->6514 6516 1a72fb 6511->6516 6518 1a7380 6512->6518 6519 1a731d 6513->6519 6520 1a46da ___vcrt_freefls@4 20 API calls 6514->6520 6515 1a73f9 6521 1a46da ___vcrt_freefls@4 20 API calls 6515->6521 6517 1a6e57 ___free_lconv_mon 20 API calls 6516->6517 6517->6508 6523 1a46da ___vcrt_freefls@4 20 API calls 6518->6523 6524 1a6f55 __fassign 20 API calls 6519->6524 6520->6502 6526 1a73ff 6521->6526 6522->6515 6525 1a46da 20 API calls ___vcrt_freefls@4 6522->6525 6523->6527 6524->6507 6525->6522 6526->6494 6527->6503 6528->6499 6530 1a5d06 ___scrt_is_nonwritable_in_current_image 6529->6530 6531 1a505c _abort 38 API calls 6530->6531 6536 1a5d10 6531->6536 6533 1a5d94 ___scrt_is_nonwritable_in_current_image 6533->6397 6534 1a47bc _abort 38 API calls 6534->6536 6536->6533 6536->6534 6537 1a46da ___vcrt_freefls@4 20 API calls 6536->6537 6538 1a6433 EnterCriticalSection 6536->6538 6539 1a5d8b 6536->6539 6537->6536 6538->6536 6542 1a647b LeaveCriticalSection 6539->6542 6541 1a5d92 6541->6536 6542->6541 6546 1a4cb9 6543->6546 6551 1a67f4 6546->6551 6548 1a3379 6547->6548 6549 1a3368 6547->6549 6548->6343 6549->6548 6550 1a46da ___vcrt_freefls@4 20 API calls 6549->6550 6550->6548 6552 1a64ac _abort 5 API calls 6551->6552 6553 1a681b 6552->6553 6556 1a6824 6553->6556 6559 1a687c 6553->6559 6557 1a16ee _ValidateLocalCookies 5 API calls 6556->6557 6558 1a323b 6557->6558 6558->6347 6558->6348 6560 1a64ac _abort 5 API calls 6559->6560 6561 1a68a3 6560->6561 6562 1a16ee _ValidateLocalCookies 5 API calls 6561->6562 6563 1a6864 LCMapStringW 6562->6563 6563->6556 6567 1a76e7 6564->6567 6569 1a7700 6567->6569 6568 1a16ee _ValidateLocalCookies 5 API calls 6570 1a1cc6 6568->6570 6569->6568 6570->5924 7463 1a80cb 7473 1a8cfb 7463->7473 7467 1a80d8 7486 1a8fd7 7467->7486 7470 1a8102 7471 1a46da ___vcrt_freefls@4 20 API calls 7470->7471 7472 1a810d 7471->7472 7490 1a8d04 7473->7490 7475 1a80d3 7476 1a8f37 7475->7476 7477 1a8f43 ___scrt_is_nonwritable_in_current_image 7476->7477 7510 1a6433 EnterCriticalSection 7477->7510 7479 1a8fb9 7524 1a8fce 7479->7524 7481 1a8f8d DeleteCriticalSection 7484 1a46da ___vcrt_freefls@4 20 API calls 7481->7484 7482 1a8fc5 ___scrt_is_nonwritable_in_current_image 7482->7467 7485 1a8f4e 7484->7485 7485->7479 7485->7481 7511 1a9dcc 7485->7511 7487 1a8fed 7486->7487 7488 1a80e7 DeleteCriticalSection 7486->7488 7487->7488 7489 1a46da ___vcrt_freefls@4 20 API calls 7487->7489 7488->7467 7488->7470 7489->7488 7491 1a8d10 ___scrt_is_nonwritable_in_current_image 7490->7491 7500 1a6433 EnterCriticalSection 7491->7500 7493 1a8db3 7505 1a8dd3 7493->7505 7496 1a8d1f 7496->7493 7499 1a8cb4 66 API calls 7496->7499 7501 1a8117 EnterCriticalSection 7496->7501 7502 1a8da9 7496->7502 7497 1a8dbf ___scrt_is_nonwritable_in_current_image 7497->7475 7499->7496 7500->7496 7501->7496 7508 1a812b LeaveCriticalSection 7502->7508 7504 1a8db1 7504->7496 7509 1a647b LeaveCriticalSection 7505->7509 7507 1a8dda 7507->7497 7508->7504 7509->7507 7510->7485 7512 1a9dd8 ___scrt_is_nonwritable_in_current_image 7511->7512 7513 1a9de9 7512->7513 7514 1a9dfe 7512->7514 7515 1a4ae2 __dosmaperr 20 API calls 7513->7515 7523 1a9df9 ___scrt_is_nonwritable_in_current_image 7514->7523 7527 1a8117 EnterCriticalSection 7514->7527 7517 1a9dee 7515->7517 7518 1a4a26 ___std_exception_copy 26 API calls 7517->7518 7518->7523 7519 1a9e1a 7528 1a9d56 7519->7528 7521 1a9e25 7544 1a9e42 7521->7544 7523->7485 7792 1a647b LeaveCriticalSection 7524->7792 7526 1a8fd5 7526->7482 7527->7519 7529 1a9d78 7528->7529 7530 1a9d63 7528->7530 7536 1a9d73 7529->7536 7547 1a8c4e 7529->7547 7531 1a4ae2 __dosmaperr 20 API calls 7530->7531 7532 1a9d68 7531->7532 7534 1a4a26 ___std_exception_copy 26 API calls 7532->7534 7534->7536 7536->7521 7537 1a8fd7 20 API calls 7538 1a9d94 7537->7538 7553 1a7fdd 7538->7553 7540 1a9d9a 7560 1aab0e 7540->7560 7543 1a46da ___vcrt_freefls@4 20 API calls 7543->7536 7791 1a812b LeaveCriticalSection 7544->7791 7546 1a9e4a 7546->7523 7548 1a8c66 7547->7548 7552 1a8c62 7547->7552 7549 1a7fdd 26 API calls 7548->7549 7548->7552 7550 1a8c86 7549->7550 7575 1a9758 7550->7575 7552->7537 7554 1a7fe9 7553->7554 7555 1a7ffe 7553->7555 7556 1a4ae2 __dosmaperr 20 API calls 7554->7556 7555->7540 7557 1a7fee 7556->7557 7558 1a4a26 ___std_exception_copy 26 API calls 7557->7558 7559 1a7ff9 7558->7559 7559->7540 7561 1aab1d 7560->7561 7562 1aab32 7560->7562 7563 1a4acf __dosmaperr 20 API calls 7561->7563 7564 1aab6d 7562->7564 7569 1aab59 7562->7569 7566 1aab22 7563->7566 7565 1a4acf __dosmaperr 20 API calls 7564->7565 7567 1aab72 7565->7567 7568 1a4ae2 __dosmaperr 20 API calls 7566->7568 7570 1a4ae2 __dosmaperr 20 API calls 7567->7570 7573 1a9da0 7568->7573 7748 1aaae6 7569->7748 7572 1aab7a 7570->7572 7574 1a4a26 ___std_exception_copy 26 API calls 7572->7574 7573->7536 7573->7543 7574->7573 7576 1a9764 ___scrt_is_nonwritable_in_current_image 7575->7576 7577 1a976c 7576->7577 7578 1a9784 7576->7578 7600 1a4acf 7577->7600 7579 1a9822 7578->7579 7584 1a97b9 7578->7584 7582 1a4acf __dosmaperr 20 API calls 7579->7582 7585 1a9827 7582->7585 7583 1a4ae2 __dosmaperr 20 API calls 7593 1a9779 ___scrt_is_nonwritable_in_current_image 7583->7593 7603 1a6b02 EnterCriticalSection 7584->7603 7587 1a4ae2 __dosmaperr 20 API calls 7585->7587 7589 1a982f 7587->7589 7588 1a97bf 7590 1a97db 7588->7590 7591 1a97f0 7588->7591 7592 1a4a26 ___std_exception_copy 26 API calls 7589->7592 7594 1a4ae2 __dosmaperr 20 API calls 7590->7594 7604 1a9843 7591->7604 7592->7593 7593->7552 7597 1a97e0 7594->7597 7596 1a97eb 7655 1a981a 7596->7655 7598 1a4acf __dosmaperr 20 API calls 7597->7598 7598->7596 7601 1a50e0 __dosmaperr 20 API calls 7600->7601 7602 1a4ad4 7601->7602 7602->7583 7603->7588 7605 1a9871 7604->7605 7643 1a986a 7604->7643 7606 1a9894 7605->7606 7607 1a9875 7605->7607 7610 1a98e5 7606->7610 7611 1a98c8 7606->7611 7609 1a4acf __dosmaperr 20 API calls 7607->7609 7608 1a16ee _ValidateLocalCookies 5 API calls 7612 1a9a4b 7608->7612 7613 1a987a 7609->7613 7615 1a98fb 7610->7615 7658 1a9d3b 7610->7658 7614 1a4acf __dosmaperr 20 API calls 7611->7614 7612->7596 7616 1a4ae2 __dosmaperr 20 API calls 7613->7616 7617 1a98cd 7614->7617 7661 1a93e8 7615->7661 7619 1a9881 7616->7619 7622 1a4ae2 __dosmaperr 20 API calls 7617->7622 7623 1a4a26 ___std_exception_copy 26 API calls 7619->7623 7626 1a98d5 7622->7626 7623->7643 7624 1a9909 7627 1a992f 7624->7627 7628 1a990d 7624->7628 7625 1a9942 7630 1a999c WriteFile 7625->7630 7631 1a9956 7625->7631 7629 1a4a26 ___std_exception_copy 26 API calls 7626->7629 7673 1a91c8 GetConsoleCP 7627->7673 7632 1a9a03 7628->7632 7668 1a937b 7628->7668 7629->7643 7634 1a99bf GetLastError 7630->7634 7639 1a9925 7630->7639 7635 1a995e 7631->7635 7636 1a998c 7631->7636 7632->7643 7644 1a4ae2 __dosmaperr 20 API calls 7632->7644 7634->7639 7640 1a997c 7635->7640 7641 1a9963 7635->7641 7699 1a945e 7636->7699 7639->7632 7639->7643 7646 1a99df 7639->7646 7691 1a962b 7640->7691 7641->7632 7684 1a953d 7641->7684 7643->7608 7645 1a9a28 7644->7645 7648 1a4acf __dosmaperr 20 API calls 7645->7648 7649 1a99fa 7646->7649 7650 1a99e6 7646->7650 7648->7643 7706 1a4aac 7649->7706 7652 1a4ae2 __dosmaperr 20 API calls 7650->7652 7653 1a99eb 7652->7653 7654 1a4acf __dosmaperr 20 API calls 7653->7654 7654->7643 7747 1a6b25 LeaveCriticalSection 7655->7747 7657 1a9820 7657->7593 7711 1a9cbd 7658->7711 7733 1a8bf8 7661->7733 7663 1a93f8 7664 1a93fd 7663->7664 7665 1a505c _abort 38 API calls 7663->7665 7664->7624 7664->7625 7666 1a9420 7665->7666 7666->7664 7667 1a943e GetConsoleMode 7666->7667 7667->7664 7669 1a93a0 7668->7669 7672 1a93d5 7668->7672 7670 1a9eb1 WriteConsoleW CreateFileW 7669->7670 7671 1a93d7 GetLastError 7669->7671 7669->7672 7670->7669 7671->7672 7672->7639 7674 1a933d 7673->7674 7678 1a922b 7673->7678 7675 1a16ee _ValidateLocalCookies 5 API calls 7674->7675 7677 1a9377 7675->7677 7677->7639 7678->7674 7679 1a92b1 WideCharToMultiByte 7678->7679 7680 1a7fc3 40 API calls __fassign 7678->7680 7683 1a9308 WriteFile 7678->7683 7742 1a6e31 7678->7742 7679->7674 7681 1a92d7 WriteFile 7679->7681 7680->7678 7681->7678 7682 1a9360 GetLastError 7681->7682 7682->7674 7683->7678 7683->7682 7686 1a954c 7684->7686 7685 1a960e 7687 1a16ee _ValidateLocalCookies 5 API calls 7685->7687 7686->7685 7688 1a95ca WriteFile 7686->7688 7689 1a9627 7687->7689 7688->7686 7690 1a9610 GetLastError 7688->7690 7689->7639 7690->7685 7692 1a963a 7691->7692 7693 1a9745 7692->7693 7696 1a96bc WideCharToMultiByte 7692->7696 7698 1a96f1 WriteFile 7692->7698 7694 1a16ee _ValidateLocalCookies 5 API calls 7693->7694 7695 1a9754 7694->7695 7695->7639 7697 1a973d GetLastError 7696->7697 7696->7698 7697->7693 7698->7692 7698->7697 7701 1a946d 7699->7701 7700 1a9520 7702 1a16ee _ValidateLocalCookies 5 API calls 7700->7702 7701->7700 7703 1a94df WriteFile 7701->7703 7704 1a9539 7702->7704 7703->7701 7705 1a9522 GetLastError 7703->7705 7704->7639 7705->7700 7707 1a4acf __dosmaperr 20 API calls 7706->7707 7708 1a4ab7 __dosmaperr 7707->7708 7709 1a4ae2 __dosmaperr 20 API calls 7708->7709 7710 1a4aca 7709->7710 7710->7643 7720 1a6bd9 7711->7720 7713 1a9ccf 7714 1a9ce8 SetFilePointerEx 7713->7714 7715 1a9cd7 7713->7715 7716 1a9cdc 7714->7716 7717 1a9d00 GetLastError 7714->7717 7718 1a4ae2 __dosmaperr 20 API calls 7715->7718 7716->7615 7719 1a4aac __dosmaperr 20 API calls 7717->7719 7718->7716 7719->7716 7721 1a6bfb 7720->7721 7722 1a6be6 7720->7722 7725 1a4acf __dosmaperr 20 API calls 7721->7725 7727 1a6c20 7721->7727 7723 1a4acf __dosmaperr 20 API calls 7722->7723 7724 1a6beb 7723->7724 7726 1a4ae2 __dosmaperr 20 API calls 7724->7726 7728 1a6c2b 7725->7728 7730 1a6bf3 7726->7730 7727->7713 7729 1a4ae2 __dosmaperr 20 API calls 7728->7729 7731 1a6c33 7729->7731 7730->7713 7732 1a4a26 ___std_exception_copy 26 API calls 7731->7732 7732->7730 7734 1a8c12 7733->7734 7735 1a8c05 7733->7735 7738 1a8c1e 7734->7738 7739 1a4ae2 __dosmaperr 20 API calls 7734->7739 7736 1a4ae2 __dosmaperr 20 API calls 7735->7736 7737 1a8c0a 7736->7737 7737->7663 7738->7663 7740 1a8c3f 7739->7740 7741 1a4a26 ___std_exception_copy 26 API calls 7740->7741 7741->7737 7743 1a505c _abort 38 API calls 7742->7743 7744 1a6e3c 7743->7744 7745 1a51ab __fassign 38 API calls 7744->7745 7746 1a6e4c 7745->7746 7746->7678 7747->7657 7751 1aaa64 7748->7751 7750 1aab0a 7750->7573 7752 1aaa70 ___scrt_is_nonwritable_in_current_image 7751->7752 7762 1a6b02 EnterCriticalSection 7752->7762 7754 1aaa7e 7755 1aaab0 7754->7755 7756 1aaaa5 7754->7756 7758 1a4ae2 __dosmaperr 20 API calls 7755->7758 7763 1aab8d 7756->7763 7759 1aaaab 7758->7759 7778 1aaada 7759->7778 7761 1aaacd ___scrt_is_nonwritable_in_current_image 7761->7750 7762->7754 7764 1a6bd9 26 API calls 7763->7764 7767 1aab9d 7764->7767 7765 1aaba3 7781 1a6b48 7765->7781 7767->7765 7769 1a6bd9 26 API calls 7767->7769 7777 1aabd5 7767->7777 7772 1aabcc 7769->7772 7770 1a6bd9 26 API calls 7771 1aabe1 CloseHandle 7770->7771 7771->7765 7773 1aabed GetLastError 7771->7773 7775 1a6bd9 26 API calls 7772->7775 7773->7765 7774 1a4aac __dosmaperr 20 API calls 7776 1aac1d 7774->7776 7775->7777 7776->7759 7777->7765 7777->7770 7790 1a6b25 LeaveCriticalSection 7778->7790 7780 1aaae4 7780->7761 7782 1a6bbe 7781->7782 7783 1a6b57 7781->7783 7784 1a4ae2 __dosmaperr 20 API calls 7782->7784 7783->7782 7789 1a6b81 7783->7789 7785 1a6bc3 7784->7785 7786 1a4acf __dosmaperr 20 API calls 7785->7786 7787 1a6bae 7786->7787 7787->7774 7787->7776 7788 1a6ba8 SetStdHandle 7788->7787 7789->7787 7789->7788 7790->7780 7791->7546 7792->7526 6958 1a7649 GetProcessHeap 6959 1a3b49 6960 1a3b5b 6959->6960 6962 1a3b61 6959->6962 6961 1a3a61 20 API calls 6960->6961 6961->6962 6963 1a2f40 RtlUnwind 7793 1a7ec1 7794 1a7ec9 7793->7794 7795 1a3150 __fassign 38 API calls 7794->7795 7801 1a7ee6 7794->7801 7796 1a7f06 7795->7796 7796->7801 7805 1a8efe 7796->7805 7799 1a7f7a MultiByteToWideChar 7799->7801 7802 1a7f6a 7799->7802 7800 1a7f3a 7800->7802 7803 1a7f48 MultiByteToWideChar 7800->7803 7802->7801 7804 1a4ae2 __dosmaperr 20 API calls 7802->7804 7803->7801 7803->7802 7804->7801 7806 1a3150 __fassign 38 API calls 7805->7806 7807 1a7f34 7806->7807 7807->7799 7807->7800 6964 1a4f47 6965 1a4f52 6964->6965 6966 1a4f62 6964->6966 6970 1a4f68 6965->6970 6969 1a46da ___vcrt_freefls@4 20 API calls 6969->6966 6971 1a4f7b 6970->6971 6972 1a4f81 6970->6972 6973 1a46da ___vcrt_freefls@4 20 API calls 6971->6973 6974 1a46da ___vcrt_freefls@4 20 API calls 6972->6974 6973->6972 6975 1a4f8d 6974->6975 6976 1a46da ___vcrt_freefls@4 20 API calls 6975->6976 6977 1a4f98 6976->6977 6978 1a46da ___vcrt_freefls@4 20 API calls 6977->6978 6979 1a4fa3 6978->6979 6980 1a46da ___vcrt_freefls@4 20 API calls 6979->6980 6981 1a4fae 6980->6981 6982 1a46da ___vcrt_freefls@4 20 API calls 6981->6982 6983 1a4fb9 6982->6983 6984 1a46da ___vcrt_freefls@4 20 API calls 6983->6984 6985 1a4fc4 6984->6985 6986 1a46da ___vcrt_freefls@4 20 API calls 6985->6986 6987 1a4fcf 6986->6987 6988 1a46da ___vcrt_freefls@4 20 API calls 6987->6988 6989 1a4fda 6988->6989 6990 1a46da ___vcrt_freefls@4 20 API calls 6989->6990 6991 1a4fe8 6990->6991 6996 1a4e2e 6991->6996 7002 1a4d3a 6996->7002 6998 1a4e52 6999 1a4e7e 6998->6999 7015 1a4d9b 6999->7015 7001 1a4ea2 7001->6969 7003 1a4d46 ___scrt_is_nonwritable_in_current_image 7002->7003 7010 1a6433 EnterCriticalSection 7003->7010 7005 1a4d50 7008 1a46da ___vcrt_freefls@4 20 API calls 7005->7008 7009 1a4d7a 7005->7009 7007 1a4d87 ___scrt_is_nonwritable_in_current_image 7007->6998 7008->7009 7011 1a4d8f 7009->7011 7010->7005 7014 1a647b LeaveCriticalSection 7011->7014 7013 1a4d99 7013->7007 7014->7013 7016 1a4da7 ___scrt_is_nonwritable_in_current_image 7015->7016 7023 1a6433 EnterCriticalSection 7016->7023 7018 1a4db1 7024 1a5011 7018->7024 7020 1a4dc4 7028 1a4dda 7020->7028 7022 1a4dd2 ___scrt_is_nonwritable_in_current_image 7022->7001 7023->7018 7025 1a5020 __fassign 7024->7025 7027 1a5047 __fassign 7024->7027 7026 1a72bd __fassign 20 API calls 7025->7026 7025->7027 7026->7027 7027->7020 7031 1a647b LeaveCriticalSection 7028->7031 7030 1a4de4 7030->7022 7031->7030 7808 1a63f2 7809 1a63fd 7808->7809 7810 1a6792 11 API calls 7809->7810 7811 1a6426 7809->7811 7812 1a6422 7809->7812 7810->7809 7814 1a644a 7811->7814 7815 1a6457 7814->7815 7817 1a6476 7814->7817 7816 1a6461 DeleteCriticalSection 7815->7816 7816->7816 7816->7817 7817->7812 7032 1a1670 7033 1a1100 61 API calls 7032->7033 7034 1a167a 7033->7034 7818 1a2af0 7819 1a2b02 7818->7819 7821 1a2b10 @_EH4_CallFilterFunc@8 7818->7821 7820 1a16ee _ValidateLocalCookies 5 API calls 7819->7820 7820->7821 7822 1a9ef6 IsProcessorFeaturePresent 7823 1a18f7 7826 1a33cc 7823->7826 7827 1a50e0 __dosmaperr 20 API calls 7826->7827 7830 1a33e3 7827->7830 7828 1a16ee _ValidateLocalCookies 5 API calls 7829 1a1908 7828->7829 7830->7828 7831 1a52f5 7832 1a5315 7831->7832 7841 1a532b 7831->7841 7833 1a4ae2 __dosmaperr 20 API calls 7832->7833 7834 1a531a 7833->7834 7835 1a4a26 ___std_exception_copy 26 API calls 7834->7835 7838 1a5324 7835->7838 7836 1a53a0 7837 1a3884 20 API calls 7836->7837 7847 1a540e 7837->7847 7842 1a16ee _ValidateLocalCookies 5 API calls 7838->7842 7840 1a5417 7843 1a46da ___vcrt_freefls@4 20 API calls 7840->7843 7841->7836 7845 1a5499 7841->7845 7851 1a54c2 7841->7851 7844 1a54b1 7842->7844 7843->7845 7860 1a5716 7845->7860 7847->7840 7848 1a54b5 7847->7848 7849 1a4a36 ___std_exception_copy 11 API calls 7848->7849 7850 1a54c1 7849->7850 7852 1a54d2 7851->7852 7852->7852 7853 1a47ff _abort 20 API calls 7852->7853 7854 1a5504 7853->7854 7855 1a4a36 ___std_exception_copy 11 API calls 7854->7855 7856 1a555f ___scrt_fastfail 7855->7856 7857 1a5621 FindFirstFileExW 7856->7857 7858 1a5670 7857->7858 7859 1a54c2 26 API calls 7858->7859 7861 1a5720 7860->7861 7862 1a5730 7861->7862 7863 1a46da ___vcrt_freefls@4 20 API calls 7861->7863 7864 1a46da ___vcrt_freefls@4 20 API calls 7862->7864 7863->7861 7865 1a5737 7864->7865 7865->7838 7035 1a3f6a GetCommandLineA GetCommandLineW 7036 1a2660 7047 1a2620 7036->7047 7048 1a263f 7047->7048 7049 1a2632 7047->7049 7050 1a16ee _ValidateLocalCookies 5 API calls 7049->7050 7050->7048 7059 1a5165 7067 1a6637 7059->7067 7062 1a5179 7063 1a50e0 __dosmaperr 20 API calls 7064 1a5181 7063->7064 7065 1a518e 7064->7065 7074 1a5191 7064->7074 7068 1a64ac _abort 5 API calls 7067->7068 7069 1a665e 7068->7069 7070 1a6676 TlsAlloc 7069->7070 7071 1a6667 7069->7071 7070->7071 7072 1a16ee _ValidateLocalCookies 5 API calls 7071->7072 7073 1a516f 7072->7073 7073->7062 7073->7063 7075 1a519b 7074->7075 7076 1a51a1 7074->7076 7078 1a668d 7075->7078 7076->7062 7079 1a64ac _abort 5 API calls 7078->7079 7080 1a66b4 7079->7080 7081 1a66cc TlsFree 7080->7081 7082 1a66c0 7080->7082 7081->7082 7083 1a16ee _ValidateLocalCookies 5 API calls 7082->7083 7084 1a66dd 7083->7084 7084->7076

    Control-flow Graph

    APIs
    • GetEnvironmentVariableW.KERNEL32(WINDIR,?,00000200), ref: 001A1149
    • GetCurrentProcess.KERNEL32(?), ref: 001A1186
    • IsWow64Process.KERNEL32(00000000), ref: 001A118D
    • PathFileExistsW.KERNELBASE(?), ref: 001A11DC
    • RegOpenKeyExW.ADVAPI32(80000002,?), ref: 001A1269
    • RegQueryValueExW.ADVAPI32(?,Install Directory,00000000,00000000,00000000,?), ref: 001A1288
    • RegQueryValueExW.ADVAPI32(?,Install Directory,00000000,00000000,00000000,?,?), ref: 001A12C7
    • RegCloseKey.ADVAPI32(?), ref: 001A12D1
    • PathFileExistsW.SHLWAPI(00000000), ref: 001A12E0
    • GetCurrentDirectoryW.KERNEL32(00000002,00000000,?), ref: 001A12FE
    • SetCurrentDirectoryW.KERNEL32(00000000), ref: 001A1305
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,?,?), ref: 001A158E
    • WaitForSingleObject.KERNEL32(?,000493E0), ref: 001A159F
    • CloseHandle.KERNEL32(?), ref: 001A15B3
    • CloseHandle.KERNEL32(?), ref: 001A15BD
    • SetCurrentDirectoryW.KERNEL32(?,?,00000000,00000044), ref: 001A15DD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: Current$CloseDirectoryProcess$ExistsFileHandlePathQueryValue$CreateEnvironmentObjectOpenSingleVariableWaitWow64
    • String ID: *.exe$D$Install Directory$Rigaku.Plugins.*.dll$Rigaku.Services.*.dll$SOFTWARE\Rigaku\SmartLabStudioII\$WINDIR$\$\Microsoft.NET\Framework$\v4.0.30319\ngen.exe
    • API String ID: 3366988239-3307221270
    • Opcode ID: 3c1229cc4d411c8fc72967979e535662ad1eb3c70ffed9c5b20b2f6454f13030
    • Instruction ID: 9b383380512b36b0d78f4a01a2ce3769e1be161b242cd0dc8ad53cd9d96e41ea
    • Opcode Fuzzy Hash: 3c1229cc4d411c8fc72967979e535662ad1eb3c70ffed9c5b20b2f6454f13030
    • Instruction Fuzzy Hash: 42D14776904340ABD720DF24DD16BDFB7E8FF99740F004A2DF98996191FB70A6858B82

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 101 1a3df1-1a3dfd call 1a68fe 104 1a3e1f-1a3e2b call 1a3e32 ExitProcess 101->104 105 1a3dff-1a3e0d GetPEB 101->105 105->104 106 1a3e0f-1a3e19 GetCurrentProcess TerminateProcess 105->106 106->104
    APIs
    • GetCurrentProcess.KERNEL32(00000003,?,001A3DC7,00000003,001B2248,0000000C,001A3EDA,00000003,00000002,00000000,?,001A47FE,00000003), ref: 001A3E12
    • TerminateProcess.KERNEL32(00000000,?,001A3DC7,00000003,001B2248,0000000C,001A3EDA,00000003,00000002,00000000,?,001A47FE,00000003), ref: 001A3E19
    • ExitProcess.KERNEL32 ref: 001A3E2B
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: Process$CurrentExitTerminate
    • String ID:
    • API String ID: 1703294689-0
    • Opcode ID: 14745758ba9d5447e6702a8d7151afcdda9281f3ce2dcc3493eba53e91ce2209
    • Instruction ID: 6edc27ccc43a8888c3efcf7814753644626251def8ee108e0da664f65c1a0b4c
    • Opcode Fuzzy Hash: 14745758ba9d5447e6702a8d7151afcdda9281f3ce2dcc3493eba53e91ce2209
    • Instruction Fuzzy Hash: DBE0B635000748ABCF11AF64EE09A993B69EB56741F044414FA568B922CB39EE93DA90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 88 1a6548-1a655c 89 1a6569-1a6584 LoadLibraryExW 88->89 90 1a655e-1a6567 88->90 92 1a65ad-1a65b3 89->92 93 1a6586-1a658f GetLastError 89->93 91 1a65c0-1a65c2 90->91 96 1a65bc 92->96 97 1a65b5-1a65b6 FreeLibrary 92->97 94 1a659e 93->94 95 1a6591-1a659c LoadLibraryExW 93->95 98 1a65a0-1a65a2 94->98 95->98 99 1a65be-1a65bf 96->99 97->96 98->92 100 1a65a4-1a65ab 98->100 99->91 100->99
    APIs
    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,001A64EF,?,00000000,00000000,00000000,?,001A6760,00000006,FlsSetValue), ref: 001A657A
    • GetLastError.KERNEL32(?,001A64EF,?,00000000,00000000,00000000,?,001A6760,00000006,FlsSetValue,001AE718,001AE720,00000000,00000364,?,001A512E), ref: 001A6586
    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,001A64EF,?,00000000,00000000,00000000,?,001A6760,00000006,FlsSetValue,001AE718,001AE720,00000000), ref: 001A6594
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: LibraryLoad$ErrorLast
    • String ID:
    • API String ID: 3177248105-0
    • Opcode ID: d20b8602577dfcd0a7e13cd6b6ca05af4cba44af6efcf697cc4cbeeb56a37ed0
    • Instruction ID: 83b6e1f7a207464897f81fa13ea1f9024b621d2dfebd41fda9f7f3053d41e5f8
    • Opcode Fuzzy Hash: d20b8602577dfcd0a7e13cd6b6ca05af4cba44af6efcf697cc4cbeeb56a37ed0
    • Instruction Fuzzy Hash: 47012B3AA116329FCB215F79AC44A567798AF07BE1F2A0325F916D7544D730DC01CAE0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 109 1a6cf9-1a6cfe 110 1a6d00-1a6d18 109->110 111 1a6d1a-1a6d1e 110->111 112 1a6d26-1a6d2f 110->112 111->112 115 1a6d20-1a6d24 111->115 113 1a6d41 112->113 114 1a6d31-1a6d34 112->114 118 1a6d43-1a6d50 GetStdHandle 113->118 116 1a6d3d-1a6d3f 114->116 117 1a6d36-1a6d3b 114->117 119 1a6da1-1a6da5 115->119 116->118 117->118 121 1a6d5f 118->121 122 1a6d52-1a6d54 118->122 119->110 120 1a6dab-1a6dae 119->120 124 1a6d61-1a6d63 121->124 122->121 123 1a6d56-1a6d5d GetFileType 122->123 123->124 125 1a6d83-1a6d95 124->125 126 1a6d65-1a6d70 124->126 125->119 129 1a6d97-1a6d9a 125->129 127 1a6d78-1a6d7b 126->127 128 1a6d72-1a6d76 126->128 127->119 130 1a6d7d-1a6d81 127->130 128->119 129->119 130->119
    APIs
    • GetStdHandle.KERNEL32(000000F6), ref: 001A6D45
    • GetFileType.KERNELBASE(00000000), ref: 001A6D57
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: FileHandleType
    • String ID:
    • API String ID: 3000768030-0
    • Opcode ID: 64c31b37874678f058e01da53768be98a7cc022f8bbaf038bff738435592637e
    • Instruction ID: 8d6ff4607eb0348c06c4559877878eae923a70f632c10edee2fe356660f81bce
    • Opcode Fuzzy Hash: 64c31b37874678f058e01da53768be98a7cc022f8bbaf038bff738435592637e
    • Instruction Fuzzy Hash: 5C11D339308B414ACB344EBE9C88626BA95AB673B0F3D071ED0F7C69F2C734D9859641

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 131 1a64ac-1a64d6 132 1a64d8-1a64da 131->132 133 1a6541 131->133 134 1a64dc-1a64de 132->134 135 1a64e0-1a64e6 132->135 136 1a6543-1a6547 133->136 134->136 137 1a64e8-1a64ea call 1a6548 135->137 138 1a6502 135->138 141 1a64ef-1a64f2 137->141 140 1a6504-1a6506 138->140 142 1a6508-1a6516 GetProcAddress 140->142 143 1a6531-1a653f 140->143 144 1a6523-1a6529 141->144 145 1a64f4-1a64fa 141->145 146 1a652b 142->146 147 1a6518-1a6521 call 1a1a9f 142->147 143->133 144->140 145->137 148 1a64fc 145->148 146->143 147->134 148->138
    APIs
    • GetProcAddress.KERNEL32(00000000,?), ref: 001A650C
    • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 001A6519
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: AddressProc__crt_fast_encode_pointer
    • String ID:
    • API String ID: 2279764990-0
    • Opcode ID: 3922cfae273efd1d347048e08400c8c14af0fcbe36549139f6ee766b8cd7d1b7
    • Instruction ID: 2d007d1e0b673eeb02648a47acda04c15ff99fcd878f7f37fdfa002473561994
    • Opcode Fuzzy Hash: 3922cfae273efd1d347048e08400c8c14af0fcbe36549139f6ee766b8cd7d1b7
    • Instruction Fuzzy Hash: 0311CA3BE005259F9F25AE28EC405AAB7959F8A7A071A4260FD25AB258D730DD4186D0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 400 1a1000-1a102b FindFirstFileW 401 1a102d-1a1042 call 1a16ee 400->401 402 1a1043-1a105a call 1a2810 400->402 407 1a1060-1a1067 402->407 408 1a1069-1a10a8 call 1a3077 call 1a337c call 1a2399 407->408 409 1a10c6-1a10d6 FindNextFileW 407->409 408->409 419 1a10aa-1a10ac 408->419 409->407 410 1a10d8-1a10f1 FindClose call 1a16ee 409->410 420 1a10ae-1a10c2 call 1a3077 419->420 421 1a10c5 419->421 420->421 421->409
    APIs
    • FindFirstFileW.KERNEL32(?,?,00000000,?), ref: 001A1020
    • _wcsstr.LIBVCRUNTIME ref: 001A109E
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 001A10CE
    • FindClose.KERNEL32(00000000), ref: 001A10D9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: Find$File$CloseFirstNext_wcsstr
    • String ID: .INTERFACE.V
    • API String ID: 2060593500-2538022656
    • Opcode ID: f5d3d1a82646d6f85af0888130b2aa4beac26234f73ae91bf87241c35b498233
    • Instruction ID: 32b7107b9410aa84ae2b14ea3a8ac66d1ff44168452d192ce590b8fe978ece97
    • Opcode Fuzzy Hash: f5d3d1a82646d6f85af0888130b2aa4beac26234f73ae91bf87241c35b498233
    • Instruction Fuzzy Hash: 1621B6B5A4031C7BCB20EB64AD45FFAB3ACEF56310F0005A5FA19D3181EB719F848A50
    APIs
    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 001A4954
    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 001A495E
    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 001A496B
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$DebuggerPresent
    • String ID:
    • API String ID: 3906539128-0
    • Opcode ID: a894ffa7f52650a9b0aa8199c6fbeaa37c3cb8d3725b2e000cd2ecfc1962e604
    • Instruction ID: 1ac1e8a1a74f82a9473269cb886ff5ee7b6f6798fee49d6d9663aabb4bbd76c4
    • Opcode Fuzzy Hash: a894ffa7f52650a9b0aa8199c6fbeaa37c3cb8d3725b2e000cd2ecfc1962e604
    • Instruction Fuzzy Hash: 4C31F574901218ABCB21DF68DD88B8DBBB8AF19310F1042EAE40CA7290E7749B858F44
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID:
    • String ID: /
    • API String ID: 0-2043925204
    • Opcode ID: d3d3a7548d4b1990f9c6f116421b232139e597751e4ec2047e65a4d1976ed57b
    • Instruction ID: fafdd561b6f16df8cee082caf7060e7e2baad66498a23b914f131448d95c91cc
    • Opcode Fuzzy Hash: d3d3a7548d4b1990f9c6f116421b232139e597751e4ec2047e65a4d1976ed57b
    • Instruction Fuzzy Hash: 7541297A9046196FCB24DFB9DC49EAB77BAEB86310F604169F905C7180F7709E81CB50
    APIs
    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,001AB250,?,?,00000008,?,?,001AAEF0,00000000), ref: 001AB482
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: ExceptionRaise
    • String ID:
    • API String ID: 3997070919-0
    • Opcode ID: 5545f04f84920e1629f0cc39018941a8a7dfd7de1ed0479bf7d3b58868ad3daa
    • Instruction ID: 751307cbb986c79c5362d764ead64f1a3c270e7b1d127aae2e398b89c5824ee7
    • Opcode Fuzzy Hash: 5545f04f84920e1629f0cc39018941a8a7dfd7de1ed0479bf7d3b58868ad3daa
    • Instruction Fuzzy Hash: D0B16E39514648DFDB19CF28C4CAB647BE0FF46364F258658E89ACF2A2C335E991CB40
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00001FAA,001A17BE), ref: 001A1FA3
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: d7cbc20bfd91f27d4caaa6aa83abf79cd08e4ce2260f06907143036e71f3e2b2
    • Instruction ID: f44c2e9d0e5d43e9cad7e6beb029a127de7a3b9f36c3ae3bbb212fa28a243c2a
    • Opcode Fuzzy Hash: d7cbc20bfd91f27d4caaa6aa83abf79cd08e4ce2260f06907143036e71f3e2b2
    • Instruction Fuzzy Hash:
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: HeapProcess
    • String ID:
    • API String ID: 54951025-0
    • Opcode ID: 4eed4626f519dae5c7b7f9a1148e8a3d397548b27311f4836eb48519dfaea3be
    • Instruction ID: d3fe034026cef18441f003f147f647fa79c02e1b9aa6fe8b8d8fb4d29660a756
    • Opcode Fuzzy Hash: 4eed4626f519dae5c7b7f9a1148e8a3d397548b27311f4836eb48519dfaea3be
    • Instruction Fuzzy Hash: DCA002705416118B57408F757A0530D359577455917058599B415C5961D72444905605

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 306 1a860f-1a8628 307 1a862a-1a863a call 1a9015 306->307 308 1a863e-1a8643 306->308 307->308 316 1a863c 307->316 310 1a8650-1a8674 MultiByteToWideChar 308->310 311 1a8645-1a864d 308->311 313 1a867a-1a8686 310->313 314 1a8807-1a881a call 1a16ee 310->314 311->310 317 1a86da 313->317 318 1a8688-1a8699 313->318 316->308 320 1a86dc-1a86de 317->320 321 1a869b-1a86aa call 1aba20 318->321 322 1a86b8-1a86be 318->322 325 1a87fc 320->325 326 1a86e4-1a86f7 MultiByteToWideChar 320->326 321->325 331 1a86b0-1a86b6 321->331 324 1a86bf call 1a4714 322->324 328 1a86c4-1a86c9 324->328 330 1a87fe-1a8805 call 1a335c 325->330 326->325 329 1a86fd-1a8718 call 1a67f4 326->329 328->325 332 1a86cf 328->332 329->325 338 1a871e-1a8725 329->338 330->314 335 1a86d5-1a86d8 331->335 332->335 335->320 339 1a875f-1a876b 338->339 340 1a8727-1a872c 338->340 342 1a876d-1a877e 339->342 343 1a87b7 339->343 340->330 341 1a8732-1a8734 340->341 341->325 344 1a873a-1a8754 call 1a67f4 341->344 346 1a8799-1a879f 342->346 347 1a8780-1a878f call 1aba20 342->347 345 1a87b9-1a87bb 343->345 344->330 358 1a875a 344->358 349 1a87bd-1a87d6 call 1a67f4 345->349 350 1a87f5-1a87fb call 1a335c 345->350 352 1a87a0 call 1a4714 346->352 347->350 361 1a8791-1a8797 347->361 349->350 363 1a87d8-1a87df 349->363 350->325 357 1a87a5-1a87aa 352->357 357->350 362 1a87ac 357->362 358->325 364 1a87b2-1a87b5 361->364 362->364 365 1a881b-1a8821 363->365 366 1a87e1-1a87e2 363->366 364->345 367 1a87e3-1a87f3 WideCharToMultiByte 365->367 366->367 367->350 368 1a8823-1a882a call 1a335c 367->368 368->330
    APIs
    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,?,00000000,?,?,?,001A8860,?,?,00000000), ref: 001A8669
    • __alloca_probe_16.LIBCMT ref: 001A86A1
    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,001A8860,?,?,00000000,?,?,?), ref: 001A86EF
    • __alloca_probe_16.LIBCMT ref: 001A8786
    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 001A87E9
    • __freea.LIBCMT ref: 001A87F6
      • Part of subcall function 001A4714: HeapAlloc.KERNEL32(00000000,00020119,00000000,?,001A1A98,00020119,?,001A12F4,00000208), ref: 001A4746
    • __freea.LIBCMT ref: 001A87FF
    • __freea.LIBCMT ref: 001A8824
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocHeap
    • String ID:
    • API String ID: 2597970681-0
    • Opcode ID: c4f6f90b0701e5fcf7de9cd76e568405b70c71938c01703381fb2f59c2afd5a0
    • Instruction ID: 82c5c0ac3b08eee6e940f58c44564e23d72ed82f7b30f9696f1b826a4dc50670
    • Opcode Fuzzy Hash: c4f6f90b0701e5fcf7de9cd76e568405b70c71938c01703381fb2f59c2afd5a0
    • Instruction Fuzzy Hash: A651E27A600216AFEB259FA4CC41EBB77AAEF46750F254628FC08D7190EF34DC40C660

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 371 1a91c8-1a9225 GetConsoleCP 372 1a922b-1a9247 371->372 373 1a9368-1a937a call 1a16ee 371->373 375 1a9249-1a9260 372->375 376 1a9262-1a9273 call 1a6e31 372->376 377 1a929c-1a92ab call 1a7fc3 375->377 382 1a9299-1a929b 376->382 383 1a9275-1a9278 376->383 377->373 387 1a92b1-1a92d1 WideCharToMultiByte 377->387 382->377 385 1a927e-1a9290 call 1a7fc3 383->385 386 1a933f-1a935e 383->386 385->373 393 1a9296-1a9297 385->393 386->373 387->373 389 1a92d7-1a92ed WriteFile 387->389 391 1a92ef-1a9300 389->391 392 1a9360-1a9366 GetLastError 389->392 391->373 394 1a9302-1a9306 391->394 392->373 393->387 395 1a9308-1a9326 WriteFile 394->395 396 1a9334-1a9337 394->396 395->392 397 1a9328-1a932c 395->397 396->372 398 1a933d 396->398 397->373 399 1a932e-1a9331 397->399 398->373 399->396
    APIs
    • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,001A993D,?,00000000,?,00000000,00000000), ref: 001A920A
    • __fassign.LIBCMT ref: 001A9285
    • __fassign.LIBCMT ref: 001A92A0
    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 001A92C6
    • WriteFile.KERNEL32(?,?,00000000,001A993D,00000000,?,?,?,?,?,?,?,?,?,001A993D,?), ref: 001A92E5
    • WriteFile.KERNEL32(?,?,00000001,001A993D,00000000,?,?,?,?,?,?,?,?,?,001A993D,?), ref: 001A931E
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
    • String ID:
    • API String ID: 1324828854-0
    • Opcode ID: fc049fe4df9d7616530f6d0ec8e7c16bdab4acc11e4392a000e529173dd6f6b2
    • Instruction ID: fffe59bc454f37265e52963161979a0f3f7a28b74a24b80302cd930f400d2935
    • Opcode Fuzzy Hash: fc049fe4df9d7616530f6d0ec8e7c16bdab4acc11e4392a000e529173dd6f6b2
    • Instruction Fuzzy Hash: 5251B675A00249AFDF10CFA8DC45AEEBBF8FF0A310F14411AE955E7291D7709981CBA1
    APIs
    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,001A3E27,00000003,?,001A3DC7,00000003,001B2248,0000000C,001A3EDA,00000003,00000002), ref: 001A3E52
    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 001A3E65
    • FreeLibrary.KERNEL32(00000000,?,?,?,001A3E27,00000003,?,001A3DC7,00000003,001B2248,0000000C,001A3EDA,00000003,00000002,00000000), ref: 001A3E88
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: AddressFreeHandleLibraryModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 4061214504-1276376045
    • Opcode ID: d72396d778ab477a4f61ada2d51944fe0c7f8f1b8b8eb68e08a33bd76c60b01a
    • Instruction ID: 58194a9cdea2f3ef61ac2993946f2760cc8e04817637439043ad0a3c107c45ab
    • Opcode Fuzzy Hash: d72396d778ab477a4f61ada2d51944fe0c7f8f1b8b8eb68e08a33bd76c60b01a
    • Instruction Fuzzy Hash: FEF06834A0060CBBCB119F91ED09BDEBFB5DF46711F000154F80AA2960CF704E81DA51
    APIs
    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,?,00000100,?,00000000,?,?,00000000), ref: 001A7170
    • __alloca_probe_16.LIBCMT ref: 001A71A8
    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 001A71F9
    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 001A720B
    • __freea.LIBCMT ref: 001A7214
      • Part of subcall function 001A4714: HeapAlloc.KERNEL32(00000000,00020119,00000000,?,001A1A98,00020119,?,001A12F4,00000208), ref: 001A4746
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: ByteCharMultiWide$AllocHeapStringType__alloca_probe_16__freea
    • String ID:
    • API String ID: 1857427562-0
    • Opcode ID: 4196404319f64f45a09cc28afc5514eb472742986fe666de276a81b3187c70e7
    • Instruction ID: e404291c949b2c2f8b2e1bec2773ad1863aaa5bc71d63506481e7b30c46216f6
    • Opcode Fuzzy Hash: 4196404319f64f45a09cc28afc5514eb472742986fe666de276a81b3187c70e7
    • Instruction Fuzzy Hash: 7F31D036A0020AABDF249F64EC81EAE7BA6EF42310F054129FC05D7291E735CE50CBA0
    APIs
    • ___scrt_initialize_onexit_tables.LIBCMT ref: 001A1730
    • __RTC_Initialize.LIBCMT ref: 001A173F
      • Part of subcall function 001A1D0F: __onexit.LIBCMT ref: 001A1D15
      • Part of subcall function 001A1DCD: InitializeSListHead.KERNEL32(001B3B28,001A1764), ref: 001A1DD2
    • ___scrt_fastfail.LIBCMT ref: 001A17AB
    • ___scrt_initialize_default_local_stdio_options.LIBCMT ref: 001A17B1
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: Initialize$HeadList___scrt_fastfail___scrt_initialize_default_local_stdio_options___scrt_initialize_onexit_tables__onexit
    • String ID:
    • API String ID: 3692885319-0
    • Opcode ID: e33e70795811d21c1f3ff3cbae2848eecd5531fb5c86768a029c925a4238c3bc
    • Instruction ID: 154514eb0006d544669bc646c233ac59b74b7b02619323957d733c4ec6d43ea4
    • Opcode Fuzzy Hash: e33e70795811d21c1f3ff3cbae2848eecd5531fb5c86768a029c925a4238c3bc
    • Instruction Fuzzy Hash: A4F0179DE5570235DA1433F5190FB6E22894F737A5F240C15F8A0AA0C3EFA6C64481B2
    APIs
    • GetLastError.KERNEL32(00000104,00000000,001A318E,00000000,00000000,?,001A33A6,00000104,00000104,?,00000103,?), ref: 001A5060
    • SetLastError.KERNEL32(00000000,?,001A33A6,00000104,00000104,?,00000103,?), ref: 001A50C8
    • SetLastError.KERNEL32(00000000,?,001A33A6,00000104,00000104,?,00000103,?), ref: 001A50D4
    • _abort.LIBCMT ref: 001A50DA
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: ErrorLast$_abort
    • String ID:
    • API String ID: 88804580-0
    • Opcode ID: 3d2e12df9ff44576c2e341b07015a43bb583a38e630e72b8f17c2d7604218a65
    • Instruction ID: 8c5fcf4ef40bbd1ccfd37853a2e976e610cfee3eeb2613e88341153e1ffb3438
    • Opcode Fuzzy Hash: 3d2e12df9ff44576c2e341b07015a43bb583a38e630e72b8f17c2d7604218a65
    • Instruction Fuzzy Hash: 98F0A43E108E00A7C3227774BE0AA6F252B9FD3760F350118F529D2991EFA4C94241A0
    APIs
    • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 001A27C6
    • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 001A27CB
    • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 001A27D0
      • Part of subcall function 001A2C28: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 001A2C39
    • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 001A27E5
    Memory Dump Source
    • Source File: 00000000.00000002.1669327277.00000000001A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001A0000, based on PE: true
    • Associated: 00000000.00000002.1669295555.00000000001A0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669342783.00000000001AD000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669356710.00000000001B3000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1669370026.00000000001B5000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1a0000_NgenTool.jbxd
    Similarity
    • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
    • String ID:
    • API String ID: 1761009282-0
    • Opcode ID: 9d642d21bf565df718a84f259e5d4d5067247cae24688ba3bef7e1a3f1c206bb
    • Instruction ID: bcb87c0548ec7de1ab7ce61373d335c5a9197a64498d1a5856cd276b042813ea
    • Opcode Fuzzy Hash: 9d642d21bf565df718a84f259e5d4d5067247cae24688ba3bef7e1a3f1c206bb
    • Instruction Fuzzy Hash: 00C0482D000301981C383AFD22422AE23401C73396BE125C9F8491B807AF361A8F6A33