Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.dll

Overview

General Information

Sample name:file.dll
renamed because original name is a hash value
Original sample name:file.exe
Analysis ID:1524403
MD5:69d883f1a13a13d5f198b45a5df0ba97
SHA1:940678df6cc3814046d7acac5bd0ab1b8664249d
SHA256:5749acfc3cb027699aa197427c06334c69fb7d36add21f32105cd4033f3a191b
Tags:dllexesignedx64user-jstrosch
Infos:

Detection

Score:9
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches the installation path of Mozilla Firefox
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6236 cmdline: loaddll64.exe "C:\Users\user\Desktop\file.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 5956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 828 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 2192 cmdline: rundll32.exe "C:\Users\user\Desktop\file.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • regsvr32.exe (PID: 2896 cmdline: regsvr32.exe /s C:\Users\user\Desktop\file.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • rundll32.exe (PID: 7044 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,CheckMozJavaPlugins MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6496 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,DllCanUnloadNow MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6664 cmdline: rundll32.exe C:\Users\user\Desktop\file.dll,DllGetClassObject MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 3756 cmdline: C:\Windows\system32\WerFault.exe -u -p 6664 -s 348 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: file.dllStatic PE information: certificate valid
Source: file.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: c:\jenkins\workspace\8-2-build-windows-x64-cygwin\jdk8u361\3183\build\windows-x64\deploy\tmp\jp2ssv\obj64\jp2ssv.pdb source: rundll32.exe, 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmp, file.dll
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF977C0 FindFirstFileA,FindNextFileA,FindClose,8_2_00007FFD9DF977C0
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF994A8 FindFirstFileA,_local_unwind,FindNextFileA,DeleteFileA,FindClose,8_2_00007FFD9DF994A8
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB81B4 FindFirstFileExW,8_2_00007FFD9DFB81B4
Source: unknownDNS traffic detected: query: 15.164.165.52.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: file.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: file.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: file.dllString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0A
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0C
Source: file.dllString found in binary or memory: http://ocsp.digicert.com0X
Source: Amcache.hve.11.drString found in binary or memory: http://upx.sf.net
Source: file.dllString found in binary or memory: http://www.digicert.com/CPS0
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF9D7408_2_00007FFD9DF9D740
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF91F648_2_00007FFD9DF91F64
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF915208_2_00007FFD9DF91520
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB26608_2_00007FFD9DFB2660
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB66908_2_00007FFD9DFB6690
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF9DE908_2_00007FFD9DF9DE90
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF9475C8_2_00007FFD9DF9475C
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB7FA88_2_00007FFD9DFB7FA8
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF957E08_2_00007FFD9DF957E0
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF990108_2_00007FFD9DF99010
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFA58588_2_00007FFD9DFA5858
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF9DCA88_2_00007FFD9DF9DCA8
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF957E08_2_00007FFD9DF957E0
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFBA4F48_2_00007FFD9DFBA4F4
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB45888_2_00007FFD9DFB4588
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB1DC88_2_00007FFD9DFB1DC8
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFBD5E48_2_00007FFD9DFBD5E4
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFA8E148_2_00007FFD9DFA8E14
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFA5ADC8_2_00007FFD9DFA5ADC
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFAE2EC8_2_00007FFD9DFAE2EC
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF92BCC8_2_00007FFD9DF92BCC
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFC0BF88_2_00007FFD9DFC0BF8
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF953F08_2_00007FFD9DF953F0
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFAAC508_2_00007FFD9DFAAC50
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFAF87C8_2_00007FFD9DFAF87C
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB60748_2_00007FFD9DFB6074
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB45888_2_00007FFD9DFB4588
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFAE8C08_2_00007FFD9DFAE8C0
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFA89088_2_00007FFD9DFA8908
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF979888_2_00007FFD9DF97988
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB81B48_2_00007FFD9DFB81B4
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFAB2048_2_00007FFD9DFAB204
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFBCA2C8_2_00007FFD9DFBCA2C
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFD9DF9A2D8 appears 34 times
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6664 -s 348
Source: file.dllBinary or memory string: OriginalFilenamejp2ssv.dllX vs file.dll
Source: C:\Windows\System32\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox\118.0.1 (x64 en-US)\Main Install DirectoryJump to behavior
Source: classification engineClassification label: clean9.winDLL@15/5@1/0
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF937D4 CoCreateInstance,8_2_00007FFD9DF937D4
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF94418 WideCharToMultiByte,LoadLibraryExA,LoadLibraryExA,FindResourceA,LoadResource,SizeofResource,FreeLibrary,8_2_00007FFD9DF94418
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5956:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6664
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\419624aa-c12d-47e2-aac6-301164bdc823Jump to behavior
Source: file.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,CheckMozJavaPlugins
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\file.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\file.dll
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,CheckMozJavaPlugins
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,DllCanUnloadNow
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,DllGetClassObject
Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6664 -s 348
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\file.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,CheckMozJavaPluginsJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,DllCanUnloadNowJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\file.dll,DllGetClassObjectJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: file.dllStatic PE information: certificate valid
Source: file.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: file.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\jenkins\workspace\8-2-build-windows-x64-cygwin\jdk8u361\3183\build\windows-x64\deploy\tmp\jp2ssv\obj64\jp2ssv.pdb source: rundll32.exe, 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmp, file.dll
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF96D4C _snwprintf_s,LoadLibraryA,_snwprintf_s,LoadLibraryA,_snwprintf_s,LoadLibraryA,GetProcAddress,_Wcsftime,FreeLibrary,8_2_00007FFD9DF96D4C
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\file.dll
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeAPI coverage: 2.8 %
Source: C:\Windows\System32\loaddll64.exe TID: 1612Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF977C0 FindFirstFileA,FindNextFileA,FindClose,8_2_00007FFD9DF977C0
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF994A8 FindFirstFileA,_local_unwind,FindNextFileA,DeleteFileA,FindClose,8_2_00007FFD9DF994A8
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB81B4 FindFirstFileExW,8_2_00007FFD9DFB81B4
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFA42A8 VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,8_2_00007FFD9DFA42A8
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.11.drBinary or memory string: VMware
Source: Amcache.hve.11.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.11.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.11.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.11.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.11.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.11.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.11.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.11.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.11.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.11.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.11.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.11.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.11.drBinary or memory string: vmci.sys
Source: Amcache.hve.11.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.11.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.11.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.11.drBinary or memory string: VMware20,1
Source: Amcache.hve.11.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.11.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.11.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.11.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.11.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.11.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.11.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.11.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.11.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.11.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.11.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFA3E7C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FFD9DFA3E7C
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF9F3F4 GetLastError,IsDebuggerPresent,OutputDebugStringW,8_2_00007FFD9DF9F3F4
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF96D4C _snwprintf_s,LoadLibraryA,_snwprintf_s,LoadLibraryA,_snwprintf_s,LoadLibraryA,GetProcAddress,_Wcsftime,FreeLibrary,8_2_00007FFD9DF96D4C
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB93A4 GetProcessHeap,8_2_00007FFD9DFB93A4
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFA3E7C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FFD9DFA3E7C
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFA0398 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FFD9DFA0398
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF9F94C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00007FFD9DF9F94C
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\file.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFC0910 cpuid 8_2_00007FFD9DFC0910
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFA06A8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,8_2_00007FFD9DFA06A8
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DFB627C _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,8_2_00007FFD9DFB627C
Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00007FFD9DF9A744 GetVersionExA,8_2_00007FFD9DF9A744
Source: Amcache.hve.11.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.11.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
21
Virtualization/Sandbox Evasion
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory51
Security Software Discovery
Remote Desktop Protocol1
Browser Session Hijacking
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager21
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Regsvr32
LSA Secrets14
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Rundll32
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524403 Sample: file.dll Startdate: 02/10/2024 Architecture: WINDOWS Score: 9 21 15.164.165.52.in-addr.arpa 2->21 7 loaddll64.exe 1 2->7         started        process3 process4 9 rundll32.exe 7->9         started        11 cmd.exe 1 7->11         started        13 rundll32.exe 7->13         started        15 3 other processes 7->15 process5 17 WerFault.exe 23 16 9->17         started        19 rundll32.exe 11->19         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
15.164.165.52.in-addr.arpa
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.11.drfalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1524403
    Start date and time:2024-10-02 19:00:54 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 25s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:19
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:file.dll
    renamed because original name is a hash value
    Original Sample Name:file.exe
    Detection:CLEAN
    Classification:clean9.winDLL@15/5@1/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 20
    • Number of non-executed functions: 118
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.42.73.29
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: file.dll
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\System32\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.7653006153516252
    Encrypted:false
    SSDEEP:192:s1jFiIy2o0x0Iv34jxMfzuiFbZ24lO8V:qhiF2mIv34jCzuiFbY4lO8V
    MD5:E37FE8F90B620436904234E816306935
    SHA1:04571A1955AA5D9BE5736A5893BC251687A3023C
    SHA-256:8FC80780378733A37306B8F9FE5E53DA968ECC26F85C123F5785EE74261E5398
    SHA-512:C70FEA52FA86116323B4B3B2F22C43406C8F60C7DDE4B409F6E8503B6F5B7D28A92AF8EA96DCEB6B0671D4E50A0872D7A481F069FC82666833AFF36EED326211
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.6.2.1.1.2.5.5.6.7.2.2.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.6.2.1.1.3.4.4.7.3.4.7.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.6.8.2.0.7.2.1.-.d.0.8.e.-.4.8.f.8.-.b.5.1.0.-.4.4.8.c.0.c.a.6.7.0.1.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.c.e.4.5.3.5.6.-.5.7.2.4.-.4.a.6.7.-.8.2.c.8.-.1.7.b.9.1.1.c.c.6.d.6.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.f.i.l.e...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.0.8.-.0.0.0.1.-.0.0.1.5.-.8.5.4.1.-.b.a.c.6.e.c.1.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.2.2.!.r.u.n.
    Process:C:\Windows\System32\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Oct 2 17:01:53 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):71122
    Entropy (8bit):1.2752295280738657
    Encrypted:false
    SSDEEP:192:wqb8QUhg/yOMxqMbb37Sge34eKMLdBSVwRYkf:DwfhWBMbb3w75BSVw+
    MD5:C205B2E97C00A7B11EA9FE9EC7409253
    SHA1:1B324FB9932AE169272D96274EDB5FE3CEE13638
    SHA-256:842BB7B001B1174D410C8725735B61A8D48536F7F6F72DDE9D19AAABC795AE39
    SHA-512:846DAA70B4C99326129184FB1F16C7C0D7DB24E1AC3B751DD057734AA2C056AAECBA4548A4857BD3707D88BDFC448801AE82C8487C0C1018BFB07A1560B4A49B
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........|.f.........................................)..........T.......8...........T........... ...............T...........@...............................................................................eJ..............Lw......................T............|.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8494
    Entropy (8bit):3.6952404666897354
    Encrypted:false
    SSDEEP:192:R6l7wVeJPELPNROj6YoYogmfiL0p0prp89b0eGfWcm:R6lXJ8rzq6YfogmfGOH0Hfk
    MD5:6346FF80190BCB261640AD3DF6AE29EF
    SHA1:F47CA672DEF24040C9CB995500A4C558995B5536
    SHA-256:9AF3FE91DA32A6445B8C17AB38341830AD866A953FC95C74C29C472E777A76FE
    SHA-512:2F40AEBC96FF3C3BF1630CDB0BD55FE43527865FD35C6E26AD4A22926F608E62BFD27F70F23B6AFE523AC606633057F6C0F851223939D956FCBA363247371208
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.6.4.<./.P.i.
    Process:C:\Windows\System32\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4729
    Entropy (8bit):4.465403787700911
    Encrypted:false
    SSDEEP:48:cvIwWl8zs3Jg771I96//WpW8VYy0Ym8M4JCFCthaWEF4/Wyq85m1OWEkzptSTSxd:uIjfZI7f/u7VNJ3aWDWXOW1poOxd
    MD5:CB146CEFD0C9096599337FF486440D08
    SHA1:7524ECD5B9ACF434260CC20654264529D782DCE6
    SHA-256:0FD909FF2E0DAB64881208F605B4D21180AF25587B4ECE84C0B51F4146279751
    SHA-512:89EFA0927F6CC72B19A396CE11C73B7FDF9E85BE27804A96F74DBDDAD43984B452BB19F1278223C97BA9D71A662EAD91D6A20DAB6414EE7C787F681EC344C23F
    Malicious:false
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="526084" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\System32\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.469520090410337
    Encrypted:false
    SSDEEP:6144:RzZfpi6ceLPx9skLmb0fYZWSP3aJG8nAgeiJRMMhA2zX4WABluuNMjDH5S:JZHtYZWOKnMM6bFpaj4
    MD5:4663AE42DD9F11C4B79207B031368373
    SHA1:3B797D99246C4CCAFD2E7C393DCD04DCE0660BA3
    SHA-256:0C7CEFDF14C49816CA6FA71771BB3C5A79EB814AFD50471E27CC0610FA46ACFD
    SHA-512:6D592F13E9A0AE15DD0372450F27A54D3E36EEE662759FF38A85EF3400BABB8DF020D5B5446E2030C0F67104FABCA8DC79276F6D322B18AB305D578746B57405
    Malicious:false
    Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..#.................................................................................................................................................................................................................................................................................................................................................Xi5.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Entropy (8bit):6.121355444788685
    TrID:
    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
    • Win64 Executable (generic) (12005/4) 10.17%
    • Generic Win/DOS Executable (2004/3) 1.70%
    • DOS Executable Generic (2002/1) 1.70%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
    File name:file.dll
    File size:351'392 bytes
    MD5:69d883f1a13a13d5f198b45a5df0ba97
    SHA1:940678df6cc3814046d7acac5bd0ab1b8664249d
    SHA256:5749acfc3cb027699aa197427c06334c69fb7d36add21f32105cd4033f3a191b
    SHA512:e06613bef2add30c0f5f0c4b5249461c19d813499ace04d94fa42bab237b22efb34a4c1e23565d72593c2bfbd6ad055cf5208968f8ea2b528b66ba6b0140e675
    SSDEEP:6144:j2BK+kd25HU2gcv/Wa83jAqN1RiZNby0N:d+kKH9mT1N1RiL2C
    TLSH:54744B5473E418B8F477DA3988A28502DA76BC511B61DE9F6394024A2F37BE1C63DF32
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........t...'...'...'...&...'...&...'..3'...'...&...'...&...'...&...'...&...'...'\..'...&...'=..&...'=..&...'=..'...'=..&...'Rich...
    Icon Hash:7ae282899bbab082
    Entrypoint:0x1800101c4
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x180000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x63BBD69B [Mon Jan 9 08:55:55 2023 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:313483b5898aa91865cd36a9f29acb2e
    Signature Valid:true
    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 19/08/2021 02:00:00 20/08/2023 01:59:59
    Subject Chain
    • CN="Oracle America, Inc.", OU=Software Engineering, O="Oracle America, Inc.", L=Redwood City, S=California, C=US
    Version:3
    Thumbprint MD5:2876C1BECB51837D0E3DE50903D025B6
    Thumbprint SHA-1:940D69C0A34A1B4CFD8048488BA86F4CED60481A
    Thumbprint SHA-256:EE46613A38B4F486164BCE7FB23178667715617F511B364594311A1548B08EB1
    Serial:068BE2F53452C882F18ED41A5DD4E7A3
    Instruction
    dec eax
    mov dword ptr [esp+08h], ebx
    dec eax
    mov dword ptr [esp+10h], esi
    push edi
    dec eax
    sub esp, 20h
    dec ecx
    mov edi, eax
    mov ebx, edx
    dec eax
    mov esi, ecx
    cmp edx, 01h
    jne 00007F225CB7EFE7h
    call 00007F225CB7F4A8h
    dec esp
    mov eax, edi
    mov edx, ebx
    dec eax
    mov ecx, esi
    dec eax
    mov ebx, dword ptr [esp+30h]
    dec eax
    mov esi, dword ptr [esp+38h]
    dec eax
    add esp, 20h
    pop edi
    jmp 00007F225CB7EE74h
    int3
    int3
    int3
    retn 0000h
    int3
    dec eax
    mov dword ptr [esp+10h], ebx
    dec eax
    mov dword ptr [esp+18h], esi
    push edi
    dec eax
    sub esp, 10h
    xor eax, eax
    mov dword ptr [0003FE31h], 00000002h
    xor ecx, ecx
    mov dword ptr [0003FE21h], 00000001h
    cpuid
    inc esp
    mov eax, ecx
    xor edi, edi
    inc esp
    mov ecx, ebx
    inc ecx
    xor eax, 6C65746Eh
    inc ecx
    xor ecx, 756E6547h
    inc esp
    mov edx, edx
    mov esi, eax
    xor ecx, ecx
    lea eax, dword ptr [edi+01h]
    inc ebp
    or ecx, eax
    cpuid
    inc ecx
    xor edx, 49656E69h
    mov dword ptr [esp], eax
    inc ebp
    or ecx, edx
    mov dword ptr [esp+04h], ebx
    inc esp
    mov ebx, ecx
    mov dword ptr [esp+08h], ecx
    mov dword ptr [esp+0Ch], edx
    jne 00007F225CB7F032h
    dec eax
    or dword ptr [0003FDDCh], FFFFFFFFh
    and eax, 0FFF3FF0h
    cmp eax, 000106C0h
    je 00007F225CB7F00Ah
    cmp eax, 00020660h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x4e5700x194.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x4e7040x64.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x560000xb80.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x530000x2730.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x534000x28a0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x570000x74c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x4a0500x54.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x49f500x100.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x330000x4e0.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x4e1100x80.rdata
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x31aae0x31c009d052583f25e65ed28a8bdc48d5c964cFalse0.5521454930904522data6.456251822305383IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x330000x1c72a0x1c8005bbea155b354be5c20dd7fd564ee20c7False0.2625925164473684data4.377975050235937IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x500000x23d40x100061115e6cb33832668f270ea02c86a3c4False0.1748046875data2.5568170519688955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x530000x27300x2800d2b3d8772cf7fd699c092ee71934ce58False0.4873046875data5.4732851134488545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x560000xb800xc00f92da0697814ff37131ef7f68d89bf7eFalse0.3017578125data4.274647443366615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x570000x74c0x800904ea74ba1a3d5338d75d70249523b89False0.57666015625data5.224582899824992IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    REGISTRY0x561b00x16dASCII textEnglishUnited States0.5123287671232877
    REGISTRY0x563200x16dASCII textEnglishUnited States0.5095890410958904
    REGISTRY0x564900x103ASCII textEnglishUnited States0.4942084942084942
    REGISTRY0x565980x103ASCII textEnglishUnited States0.4942084942084942
    REGISTRY0x566a00x107ASCII textEnglishUnited States0.7072243346007605
    REGISTRY0x567a80x98ASCII textEnglishUnited States0.8026315789473685
    RT_VERSION0x568400x340dataEnglishUnited States0.4651442307692308
    DLLImport
    KERNEL32.dllDecodePointer, RaiseException, GetLastError, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, EncodePointer, CloseHandle, EnterCriticalSection, LeaveCriticalSection, ReleaseMutex, WaitForSingleObject, CreateMutexA, DisableThreadLibraryCalls, FreeLibrary, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, LoadLibraryExA, LoadResource, SizeofResource, lstrcmpiA, OpenMutexA, FindResourceA, MultiByteToWideChar, WideCharToMultiByte, IsDBCSLeadByte, DeleteFileA, FindClose, FindFirstFileA, FindNextFileA, LoadLibraryA, VerSetConditionMask, GetEnvironmentVariableA, CreateFileA, GetLongPathNameA, GetTempPathA, GetCurrentProcess, CreateProcessA, OpenProcess, GlobalMemoryStatusEx, GetLocalTime, GetSystemDirectoryA, GetWindowsDirectoryA, GetVersionExA, GetNativeSystemInfo, GlobalAlloc, GlobalFree, LocalAlloc, LocalFree, GetShortPathNameA, FormatMessageA, lstrlenA, VerifyVersionInfoA, WTSGetActiveConsoleSessionId, GetFileAttributesA, GetSystemWindowsDirectoryA, OutputDebugStringA, GetCurrentProcessId, GetCurrentThreadId, IsDebuggerPresent, OutputDebugStringW, WriteConsoleW, SetEndOfFile, ReadConsoleW, ReadFile, GetConsoleMode, GetConsoleCP, FlushFileBuffers, WriteFile, SetFilePointerEx, GetFileSizeEx, GetStringTypeW, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, GetStartupInfoW, GetModuleHandleW, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwindEx, RtlPcToFileHeader, RtlUnwind, InterlockedFlushSList, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, GetSystemInfo, VirtualAlloc, VirtualProtect, VirtualQuery, CreateFileW, GetDriveTypeW, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, GetTimeZoneInformation, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, HeapFree, HeapAlloc, HeapSize, HeapReAlloc, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetStdHandle, GetCurrentDirectoryW, GetFullPathNameW, SetStdHandle, SetEnvironmentVariableW
    USER32.dllGetWindowThreadProcessId, GetShellWindow, CloseDesktop, OpenInputDesktop, CharNextA, wsprintfA
    ole32.dllCoTaskMemRealloc, CoTaskMemFree, CoUninitialize, CoInitialize, StringFromCLSID, CoCreateInstance, CoTaskMemAlloc
    OLEAUT32.dllSysAllocStringByteLen, SysStringLen, SysAllocString, VarUI4FromStr, SysFreeString, VariantClear
    NameOrdinalAddress
    CheckMozJavaPlugins10x18000a028
    DllCanUnloadNow20x180001c74
    DllGetClassObject30x180001520
    DllRegisterServer40x180001c88
    DllUnregisterServer50x180001c94
    RedirectAllStaticVersionKeys60x180006504
    RedirectSelectedStaticVersionKeys70x1800065c4
    RegKeyBranchNeedsUpdating80x180006478
    RemoveAllMozillaJavaPlugins90x180007284
    RunBrokerProcess100x180007310
    UpdateTreatAsKey110x180006684
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Oct 2, 2024 19:02:05.770172119 CEST53603741.1.1.1192.168.2.6
    Oct 2, 2024 19:02:19.362873077 CEST5355826162.159.36.2192.168.2.6
    Oct 2, 2024 19:02:19.862385988 CEST6281953192.168.2.61.1.1.1
    Oct 2, 2024 19:02:19.871315002 CEST53628191.1.1.1192.168.2.6
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Oct 2, 2024 19:02:19.862385988 CEST192.168.2.61.1.1.10xc5feStandard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Oct 2, 2024 19:02:19.871315002 CEST1.1.1.1192.168.2.60xc5feName error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:13:01:45
    Start date:02/10/2024
    Path:C:\Windows\System32\loaddll64.exe
    Wow64 process (32bit):false
    Commandline:loaddll64.exe "C:\Users\user\Desktop\file.dll"
    Imagebase:0x7ff74add0000
    File size:165'888 bytes
    MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:13:01:45
    Start date:02/10/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff66e660000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:13:01:45
    Start date:02/10/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\file.dll",#1
    Imagebase:0x7ff6fe110000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:13:01:45
    Start date:02/10/2024
    Path:C:\Windows\System32\regsvr32.exe
    Wow64 process (32bit):false
    Commandline:regsvr32.exe /s C:\Users\user\Desktop\file.dll
    Imagebase:0x7ff67fef0000
    File size:25'088 bytes
    MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:13:01:45
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,CheckMozJavaPlugins
    Imagebase:0x7ff746a50000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:6
    Start time:13:01:45
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\file.dll",#1
    Imagebase:0x7ff746a50000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:13:01:48
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,DllCanUnloadNow
    Imagebase:0x7ff746a50000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:13:01:51
    Start date:02/10/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\file.dll,DllGetClassObject
    Imagebase:0x7ff746a50000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:11
    Start time:13:01:52
    Start date:02/10/2024
    Path:C:\Windows\System32\WerFault.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\WerFault.exe -u -p 6664 -s 348
    Imagebase:0x7ff75fbc0000
    File size:570'736 bytes
    MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:1.9%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:16%
      Total number of Nodes:2000
      Total number of Limit Nodes:18
      execution_graph 22852 7ffd9df91068 22857 7ffd9df9f3f4 22852->22857 22856 7ffd9df9f935 22858 7ffd9df9f40f memcpy_s 22857->22858 22859 7ffd9df9f455 GetLastError 22858->22859 22860 7ffd9df91078 22858->22860 22859->22860 22861 7ffd9df9f46d IsDebuggerPresent 22859->22861 22863 7ffd9df9f8dc 22860->22863 22861->22860 22862 7ffd9df9f477 OutputDebugStringW 22861->22862 22862->22860 22864 7ffd9df9f90b 22863->22864 22866 7ffd9df9f901 _onexit 22863->22866 22867 7ffd9dfafbb8 22864->22867 22866->22856 22870 7ffd9dfaf804 22867->22870 22877 7ffd9dfb4518 EnterCriticalSection 22870->22877 22878 7ffd9df9fc6c 22880 7ffd9df9fca4 __GSHandlerCheckCommon 22878->22880 22879 7ffd9df9fcd0 22880->22879 22882 7ffd9dfa13fc 22880->22882 22891 7ffd9dfa2228 22882->22891 22885 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 22886 7ffd9dfa142b 22885->22886 22887 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 22886->22887 22888 7ffd9dfa1438 22887->22888 22897 7ffd9dfa2ffc 22888->22897 22890 7ffd9dfa1469 22890->22879 22922 7ffd9dfa2244 22891->22922 22894 7ffd9dfa141e 22894->22885 22895 7ffd9dfaffb8 __FrameHandler3::FrameUnwindToState 26 API calls 22896 7ffd9dfa2240 22895->22896 22898 7ffd9dfa3029 __except_validate_context_record 22897->22898 22899 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 22898->22899 22900 7ffd9dfa302e 22899->22900 22901 7ffd9dfa308c 22900->22901 22905 7ffd9dfa311b 22900->22905 22917 7ffd9dfa30e1 22900->22917 22904 7ffd9dfa3108 22901->22904 22908 7ffd9dfa30e6 22901->22908 22909 7ffd9dfa30af 22901->22909 22901->22917 22902 7ffd9dfa318e 22902->22917 22987 7ffd9dfa2824 22902->22987 22972 7ffd9dfa0f64 22904->22972 22906 7ffd9dfa313a 22905->22906 22981 7ffd9dfa13a4 22905->22981 22906->22902 22906->22917 22984 7ffd9dfa13b8 22906->22984 22908->22904 22911 7ffd9dfa30be 22908->22911 22948 7ffd9dfa242c 22909->22948 22913 7ffd9dfa323c 22911->22913 22916 7ffd9dfa30d0 22911->22916 23037 7ffd9dfaea5c 22913->23037 22953 7ffd9dfa3518 22916->22953 22917->22890 22918 7ffd9dfa3241 22920 7ffd9dfa20ac __std_exception_copy 23 API calls 22918->22920 22921 7ffd9dfa3270 22920->22921 22921->22890 22923 7ffd9dfa2231 22922->22923 22924 7ffd9dfa2263 GetLastError 22922->22924 22923->22894 22923->22895 22934 7ffd9dfa3c34 22924->22934 22938 7ffd9dfa39cc 22934->22938 22939 7ffd9dfa3a2d TlsGetValue 22938->22939 22946 7ffd9dfa3a28 try_get_function 22938->22946 22940 7ffd9dfa3b10 22940->22939 22943 7ffd9dfa3b1e GetProcAddress 22940->22943 22941 7ffd9dfa3a5c LoadLibraryExW 22942 7ffd9dfa3a7d GetLastError 22941->22942 22941->22946 22942->22946 22944 7ffd9dfa3b2f 22943->22944 22944->22939 22945 7ffd9dfa3af5 FreeLibrary 22945->22946 22946->22939 22946->22940 22946->22941 22946->22945 22947 7ffd9dfa3ab7 LoadLibraryExW 22946->22947 22947->22946 22949 7ffd9dfa243a 22948->22949 22950 7ffd9dfaea5c __FrameHandler3::FrameUnwindToState 26 API calls 22949->22950 22952 7ffd9dfa244b 22949->22952 22951 7ffd9dfa2491 22950->22951 22952->22911 22954 7ffd9dfa13a4 TypeMatchHelper 35 API calls 22953->22954 22955 7ffd9dfa3547 22954->22955 23045 7ffd9dfa2388 22955->23045 22958 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 22970 7ffd9dfa3564 __FrameHandler3::FrameUnwindToState 22958->22970 22959 7ffd9dfa3664 22960 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 22959->22960 22962 7ffd9dfa3669 22960->22962 22961 7ffd9dfa369f 22963 7ffd9dfaea5c __FrameHandler3::FrameUnwindToState 26 API calls 22961->22963 22964 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 22962->22964 22966 7ffd9dfa3674 22962->22966 22963->22966 22964->22966 22965 7ffd9dfa3681 __FrameHandler3::FrameUnwindToState 22965->22917 22966->22965 22967 7ffd9dfaea5c __FrameHandler3::FrameUnwindToState 26 API calls 22966->22967 22968 7ffd9dfa36aa 22967->22968 22969 7ffd9dfa13a4 35 API calls TypeMatchHelper 22969->22970 22970->22959 22970->22961 22970->22969 23049 7ffd9dfa13cc 22970->23049 23052 7ffd9dfa0fc8 22972->23052 22979 7ffd9dfa3518 __FrameHandler3::FrameUnwindToState 35 API calls 22980 7ffd9dfa0fb8 22979->22980 22980->22917 22982 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 22981->22982 22983 7ffd9dfa13ad 22982->22983 22983->22906 22985 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 22984->22985 22986 7ffd9dfa13c1 22985->22986 22986->22902 23066 7ffd9dfa36ac 22987->23066 22989 7ffd9dfaea5c __FrameHandler3::FrameUnwindToState 26 API calls 22990 7ffd9dfa2c84 22989->22990 22991 7ffd9dfa2bfd 23024 7ffd9dfa2bfb 22991->23024 23034 7ffd9dfa2950 22991->23034 23130 7ffd9dfa2c88 22991->23130 22992 7ffd9dfa2955 22992->22991 22994 7ffd9dfa2988 22992->22994 22993 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 22993->23034 22999 7ffd9dfa2b1a 22994->22999 23094 7ffd9dfa1094 22994->23094 22997 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23001 7ffd9dfa28be 22997->23001 22998 7ffd9dfa2c40 22998->22917 23002 7ffd9dfa13a4 TypeMatchHelper 35 API calls 22999->23002 23006 7ffd9dfa2b47 22999->23006 22999->23024 23001->22998 23003 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23001->23003 23002->23006 23004 7ffd9dfa28ce 23003->23004 23005 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23004->23005 23008 7ffd9dfa28d7 23005->23008 23010 7ffd9dfa2b71 23006->23010 23006->23024 23123 7ffd9dfa0f38 23006->23123 23078 7ffd9dfa13e4 23008->23078 23009 7ffd9dfa2b92 23014 7ffd9dfa3744 IsInExceptionSpec 35 API calls 23009->23014 23010->23009 23012 7ffd9dfa13a4 TypeMatchHelper 35 API calls 23010->23012 23010->23024 23010->23034 23012->23009 23015 7ffd9dfa2ba9 23014->23015 23018 7ffd9dfa0fc8 _GetEstablisherFrame 27 API calls 23015->23018 23015->23024 23016 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23017 7ffd9dfa2917 23016->23017 23017->22992 23021 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23017->23021 23019 7ffd9dfa2bc3 23018->23019 23128 7ffd9dfa11f0 RtlUnwindEx 23019->23128 23020 7ffd9dfa13b8 35 API calls TypeMatchHelper 23029 7ffd9dfa29a9 23020->23029 23023 7ffd9dfa2923 23021->23023 23026 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23023->23026 23024->22993 23027 7ffd9dfa292c 23026->23027 23081 7ffd9dfa3744 23027->23081 23029->22999 23029->23020 23100 7ffd9dfa2eb8 23029->23100 23114 7ffd9dfa2754 23029->23114 23032 7ffd9dfa2940 23090 7ffd9dfa381c 23032->23090 23034->22989 23034->22998 23035 7ffd9dfa2948 std::bad_alloc::bad_alloc FindHandler 23035->23034 23036 7ffd9dfa1640 _CxxThrowException 2 API calls 23035->23036 23036->23034 23038 7ffd9dfb0440 __FrameHandler3::FrameUnwindToState 26 API calls 23037->23038 23039 7ffd9dfaea65 23038->23039 23040 7ffd9dfaffb8 __FrameHandler3::FrameUnwindToState 26 API calls 23039->23040 23042 7ffd9dfaea7b 23040->23042 23041 7ffd9dfaea85 23041->22918 23042->23041 23043 7ffd9dfb05bc _invalid_parameter_noinfo_noreturn 14 API calls 23042->23043 23044 7ffd9dfaeaae 23043->23044 23044->22918 23046 7ffd9dfa23aa 23045->23046 23047 7ffd9dfa239f 23045->23047 23046->22958 23048 7ffd9dfa242c __GetCurrentState 26 API calls 23047->23048 23048->23046 23050 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23049->23050 23051 7ffd9dfa13da 23050->23051 23051->22970 23053 7ffd9dfa2424 pair 26 API calls 23052->23053 23054 7ffd9dfa0ff6 23053->23054 23055 7ffd9dfa101f RtlLookupFunctionEntry 23054->23055 23056 7ffd9dfa0f83 23054->23056 23055->23054 23057 7ffd9dfa2424 23056->23057 23058 7ffd9dfa242c 23057->23058 23059 7ffd9dfaea5c __FrameHandler3::FrameUnwindToState 26 API calls 23058->23059 23061 7ffd9dfa0f91 23058->23061 23060 7ffd9dfa2491 23059->23060 23062 7ffd9dfa0ee0 23061->23062 23063 7ffd9dfa0ef7 23062->23063 23064 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23063->23064 23065 7ffd9dfa0f1f 23063->23065 23064->23063 23065->22979 23067 7ffd9dfa2424 pair 26 API calls 23066->23067 23068 7ffd9dfa36d1 23067->23068 23069 7ffd9dfa0fc8 _GetEstablisherFrame 27 API calls 23068->23069 23070 7ffd9dfa36e6 23069->23070 23148 7ffd9dfa23b0 23070->23148 23073 7ffd9dfa36f8 __FrameHandler3::FrameUnwindToState 23151 7ffd9dfa23e8 23073->23151 23074 7ffd9dfa371b 23075 7ffd9dfa23b0 __GetUnwindTryBlock 27 API calls 23074->23075 23077 7ffd9dfa2872 23075->23077 23077->22992 23077->22997 23077->23034 23079 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23078->23079 23080 7ffd9dfa13f2 23079->23080 23080->23016 23080->23034 23082 7ffd9dfa3814 23081->23082 23087 7ffd9dfa376f 23081->23087 23083 7ffd9dfaea5c __FrameHandler3::FrameUnwindToState 26 API calls 23082->23083 23085 7ffd9dfa3819 23083->23085 23084 7ffd9dfa293c 23084->22992 23084->23032 23086 7ffd9dfa13b8 35 API calls TypeMatchHelper 23086->23087 23087->23084 23087->23086 23088 7ffd9dfa13a4 TypeMatchHelper 35 API calls 23087->23088 23089 7ffd9dfa2eb8 TypeMatchHelper 35 API calls 23087->23089 23088->23087 23089->23087 23092 7ffd9dfa3839 Is_bad_exception_allowed 23090->23092 23093 7ffd9dfa3892 23090->23093 23091 7ffd9dfa13a4 35 API calls TypeMatchHelper 23091->23092 23092->23091 23092->23093 23093->23035 23095 7ffd9dfa2424 pair 26 API calls 23094->23095 23096 7ffd9dfa10d2 23095->23096 23097 7ffd9dfaea5c __FrameHandler3::FrameUnwindToState 26 API calls 23096->23097 23099 7ffd9dfa10de 23096->23099 23098 7ffd9dfa11ec 23097->23098 23099->23029 23101 7ffd9dfa2ee1 23100->23101 23103 7ffd9dfa2eea 23100->23103 23102 7ffd9dfa13a4 TypeMatchHelper 35 API calls 23101->23102 23102->23103 23104 7ffd9dfa13a4 TypeMatchHelper 35 API calls 23103->23104 23105 7ffd9dfa2f0b 23103->23105 23112 7ffd9dfa2f78 23103->23112 23104->23105 23106 7ffd9dfa2f37 23105->23106 23107 7ffd9dfa13a4 TypeMatchHelper 35 API calls 23105->23107 23105->23112 23108 7ffd9dfa13b8 TypeMatchHelper 35 API calls 23106->23108 23107->23106 23109 7ffd9dfa2f4b 23108->23109 23110 7ffd9dfa2f64 23109->23110 23111 7ffd9dfa13a4 TypeMatchHelper 35 API calls 23109->23111 23109->23112 23113 7ffd9dfa13b8 TypeMatchHelper 35 API calls 23110->23113 23111->23110 23112->23029 23113->23112 23115 7ffd9dfa0fc8 _GetEstablisherFrame 27 API calls 23114->23115 23117 7ffd9dfa2791 23115->23117 23116 7ffd9dfa27b7 23119 7ffd9dfa13a4 TypeMatchHelper 35 API calls 23116->23119 23117->23116 23154 7ffd9dfa2694 23117->23154 23120 7ffd9dfa27bc 23119->23120 23121 7ffd9dfa11f0 __FrameHandler3::UnwindNestedFrames RtlUnwindEx 23120->23121 23122 7ffd9dfa2808 23121->23122 23122->23029 23124 7ffd9dfa2424 pair 26 API calls 23123->23124 23125 7ffd9dfa0f4c 23124->23125 23126 7ffd9dfa0ee0 __FrameHandler3::CatchTryBlock 35 API calls 23125->23126 23127 7ffd9dfa0f56 23126->23127 23127->23010 23129 7ffd9dfa1308 _handle_error 23128->23129 23129->23024 23131 7ffd9dfa2e95 23130->23131 23132 7ffd9dfa2cc1 23130->23132 23131->23024 23133 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23132->23133 23134 7ffd9dfa2cc6 23133->23134 23135 7ffd9dfa2cdd EncodePointer 23134->23135 23136 7ffd9dfa2d2b 23134->23136 23137 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23135->23137 23136->23131 23138 7ffd9dfa2d47 23136->23138 23139 7ffd9dfa2eb0 23136->23139 23143 7ffd9dfa2ced 23137->23143 23141 7ffd9dfa1094 pair 26 API calls 23138->23141 23140 7ffd9dfaea5c __FrameHandler3::FrameUnwindToState 26 API calls 23139->23140 23142 7ffd9dfa2eb5 23140->23142 23147 7ffd9dfa2d67 23141->23147 23143->23136 23156 7ffd9dfa0e8c 23143->23156 23145 7ffd9dfa13a4 35 API calls TypeMatchHelper 23145->23147 23146 7ffd9dfa2754 FindHandler 38 API calls 23146->23147 23147->23131 23147->23145 23147->23146 23149 7ffd9dfa0fc8 _GetEstablisherFrame 27 API calls 23148->23149 23150 7ffd9dfa23c3 23149->23150 23150->23073 23150->23074 23152 7ffd9dfa0fc8 _GetEstablisherFrame 27 API calls 23151->23152 23153 7ffd9dfa2402 23152->23153 23153->23077 23155 7ffd9dfa26bb BuildCatchObjectHelperInternal 23154->23155 23157 7ffd9dfa2228 __FrameHandler3::FrameUnwindToState 35 API calls 23156->23157 23158 7ffd9dfa0eb8 23157->23158 23158->23136 23527 7ffd9dfada7c 23545 7ffd9dfb4518 EnterCriticalSection 23527->23545 23546 7ffd9dfb027c 23547 7ffd9dfb0281 23546->23547 23551 7ffd9dfb0296 23546->23551 23552 7ffd9dfb029c 23547->23552 23553 7ffd9dfb02e6 23552->23553 23554 7ffd9dfb02de 23552->23554 23556 7ffd9dfb0044 __free_lconv_mon 14 API calls 23553->23556 23555 7ffd9dfb0044 __free_lconv_mon 14 API calls 23554->23555 23555->23553 23557 7ffd9dfb02f3 23556->23557 23558 7ffd9dfb0044 __free_lconv_mon 14 API calls 23557->23558 23559 7ffd9dfb0300 23558->23559 23560 7ffd9dfb0044 __free_lconv_mon 14 API calls 23559->23560 23561 7ffd9dfb030d 23560->23561 23562 7ffd9dfb0044 __free_lconv_mon 14 API calls 23561->23562 23563 7ffd9dfb031a 23562->23563 23564 7ffd9dfb0044 __free_lconv_mon 14 API calls 23563->23564 23565 7ffd9dfb0327 23564->23565 23566 7ffd9dfb0044 __free_lconv_mon 14 API calls 23565->23566 23567 7ffd9dfb0334 23566->23567 23568 7ffd9dfb0044 __free_lconv_mon 14 API calls 23567->23568 23569 7ffd9dfb0341 23568->23569 23570 7ffd9dfb0044 __free_lconv_mon 14 API calls 23569->23570 23571 7ffd9dfb0351 23570->23571 23572 7ffd9dfb0044 __free_lconv_mon 14 API calls 23571->23572 23573 7ffd9dfb0361 23572->23573 23578 7ffd9dfb014c 23573->23578 23592 7ffd9dfb4518 EnterCriticalSection 23578->23592 24665 7ffd9dfb4588 24666 7ffd9dfb45ac 24665->24666 24669 7ffd9dfb45c0 strchr 24665->24669 24667 7ffd9dfa41e0 memcpy_s 14 API calls 24666->24667 24668 7ffd9dfb45b1 24667->24668 24670 7ffd9dfb485a 24669->24670 24672 7ffd9dfb4603 24669->24672 24765 7ffd9dfb4bcc 24669->24765 24671 7ffd9dfa41e0 memcpy_s 14 API calls 24670->24671 24677 7ffd9dfb468f 24671->24677 24674 7ffd9dfb465f 24672->24674 24676 7ffd9dfb4629 24672->24676 24684 7ffd9dfb4653 24672->24684 24674->24677 24679 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24674->24679 24675 7ffd9dfb470d 24682 7ffd9dfb477c 24675->24682 24686 7ffd9dfb472a 24675->24686 24780 7ffd9dfaf74c 24676->24780 24688 7ffd9dfb0044 __free_lconv_mon 14 API calls 24677->24688 24681 7ffd9dfb4675 24679->24681 24685 7ffd9dfb0044 __free_lconv_mon 14 API calls 24681->24685 24682->24677 24693 7ffd9dfa4210 _onexit 26 API calls 24682->24693 24684->24675 24684->24677 24786 7ffd9dfb43b8 24684->24786 24692 7ffd9dfb4683 24685->24692 24689 7ffd9dfb0044 __free_lconv_mon 14 API calls 24686->24689 24687 7ffd9dfb4637 24687->24684 24690 7ffd9dfb4bcc 26 API calls 24687->24690 24688->24668 24691 7ffd9dfb4733 24689->24691 24690->24684 24701 7ffd9dfb4738 24691->24701 24822 7ffd9dfa4210 24691->24822 24692->24677 24692->24684 24695 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24692->24695 24694 7ffd9dfb47b7 24693->24694 24696 7ffd9dfb0044 __free_lconv_mon 14 API calls 24694->24696 24698 7ffd9dfb46ae 24695->24698 24696->24701 24700 7ffd9dfb0044 __free_lconv_mon 14 API calls 24698->24700 24699 7ffd9dfb4764 24702 7ffd9dfb0044 __free_lconv_mon 14 API calls 24699->24702 24700->24684 24701->24677 24701->24701 24703 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24701->24703 24702->24701 24704 7ffd9dfb4801 24703->24704 24705 7ffd9dfb4848 24704->24705 24707 7ffd9dfabf58 __std_exception_copy 23 API calls 24704->24707 24706 7ffd9dfb0044 __free_lconv_mon 14 API calls 24705->24706 24706->24677 24708 7ffd9dfb4818 24707->24708 24709 7ffd9dfb481c 24708->24709 24710 7ffd9dfb4893 24708->24710 24831 7ffd9dfbc7d0 24709->24831 24711 7ffd9dfa40e0 _invalid_parameter_noinfo_noreturn 9 API calls 24710->24711 24714 7ffd9dfb48a7 24711->24714 24715 7ffd9dfb48d0 24714->24715 24720 7ffd9dfb48e4 wcschr 24714->24720 24717 7ffd9dfa41e0 memcpy_s 14 API calls 24715->24717 24716 7ffd9dfa41e0 memcpy_s 14 API calls 24716->24705 24718 7ffd9dfb48d5 24717->24718 24719 7ffd9dfb4b77 24721 7ffd9dfa41e0 memcpy_s 14 API calls 24719->24721 24720->24719 24722 7ffd9dfb4923 24720->24722 24850 7ffd9dfb4cb4 24720->24850 24758 7ffd9dfb49ae 24721->24758 24724 7ffd9dfb497d 24722->24724 24725 7ffd9dfb494b 24722->24725 24733 7ffd9dfb4971 24722->24733 24728 7ffd9dfb49a5 24724->24728 24732 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24724->24732 24724->24758 24865 7ffd9dfaf788 24725->24865 24726 7ffd9dfb4a2c 24735 7ffd9dfb4a49 24726->24735 24742 7ffd9dfb4a9c 24726->24742 24730 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24728->24730 24728->24733 24728->24758 24736 7ffd9dfb49d0 24730->24736 24738 7ffd9dfb4997 24732->24738 24733->24726 24733->24758 24871 7ffd9dfb4278 24733->24871 24734 7ffd9dfb0044 __free_lconv_mon 14 API calls 24734->24718 24739 7ffd9dfb0044 __free_lconv_mon 14 API calls 24735->24739 24740 7ffd9dfb0044 __free_lconv_mon 14 API calls 24736->24740 24737 7ffd9dfb4959 24737->24733 24744 7ffd9dfb4cb4 26 API calls 24737->24744 24741 7ffd9dfb0044 __free_lconv_mon 14 API calls 24738->24741 24743 7ffd9dfb4a52 24739->24743 24740->24733 24741->24728 24745 7ffd9dfa4210 _onexit 26 API calls 24742->24745 24742->24758 24748 7ffd9dfa4210 _onexit 26 API calls 24743->24748 24750 7ffd9dfb4a58 24743->24750 24744->24733 24746 7ffd9dfb4ad8 24745->24746 24747 7ffd9dfb0044 __free_lconv_mon 14 API calls 24746->24747 24747->24750 24749 7ffd9dfb4a84 24748->24749 24751 7ffd9dfb0044 __free_lconv_mon 14 API calls 24749->24751 24750->24750 24752 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24750->24752 24750->24758 24751->24750 24753 7ffd9dfb4b23 24752->24753 24754 7ffd9dfb4b65 24753->24754 24895 7ffd9dfb4210 24753->24895 24756 7ffd9dfb0044 __free_lconv_mon 14 API calls 24754->24756 24756->24758 24758->24734 24759 7ffd9dfb4bb5 24762 7ffd9dfa40e0 _invalid_parameter_noinfo_noreturn 9 API calls 24759->24762 24760 7ffd9dfb4b3d SetEnvironmentVariableW 24760->24754 24761 7ffd9dfb4b60 24760->24761 24763 7ffd9dfa41e0 memcpy_s 14 API calls 24761->24763 24764 7ffd9dfb4bc9 24762->24764 24763->24754 24766 7ffd9dfb4be9 24765->24766 24767 7ffd9dfb4c01 24765->24767 24766->24672 24768 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24767->24768 24773 7ffd9dfb4c25 24768->24773 24769 7ffd9dfb4c86 24772 7ffd9dfb0044 __free_lconv_mon 14 API calls 24769->24772 24770 7ffd9dfaffb8 __FrameHandler3::FrameUnwindToState 26 API calls 24771 7ffd9dfb4cb0 24770->24771 24772->24766 24773->24769 24774 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24773->24774 24775 7ffd9dfb0044 __free_lconv_mon 14 API calls 24773->24775 24776 7ffd9dfabf58 __std_exception_copy 23 API calls 24773->24776 24777 7ffd9dfb4c95 24773->24777 24779 7ffd9dfb4caa 24773->24779 24774->24773 24775->24773 24776->24773 24778 7ffd9dfa40e0 _invalid_parameter_noinfo_noreturn 9 API calls 24777->24778 24778->24779 24779->24770 24781 7ffd9dfaf75c 24780->24781 24782 7ffd9dfaf765 24780->24782 24781->24782 24904 7ffd9dfaf258 24781->24904 24782->24670 24782->24687 24787 7ffd9dfb43c5 24786->24787 24788 7ffd9dfbc2e4 24786->24788 24790 7ffd9dfa43d4 wcsftime 26 API calls 24787->24790 24789 7ffd9dfbc2f1 24788->24789 24796 7ffd9dfbc327 24788->24796 24793 7ffd9dfa41e0 memcpy_s 14 API calls 24789->24793 24801 7ffd9dfbc298 24789->24801 24792 7ffd9dfb43f9 24790->24792 24791 7ffd9dfbc351 24794 7ffd9dfa41e0 memcpy_s 14 API calls 24791->24794 24798 7ffd9dfb440f 24792->24798 24802 7ffd9dfb43fe 24792->24802 24804 7ffd9dfb4426 24792->24804 24795 7ffd9dfbc2fb 24793->24795 24797 7ffd9dfbc356 24794->24797 24799 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 24795->24799 24796->24791 24800 7ffd9dfbc376 24796->24800 24803 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 24797->24803 24805 7ffd9dfa41e0 memcpy_s 14 API calls 24798->24805 24806 7ffd9dfbc306 24799->24806 24809 7ffd9dfa43d4 wcsftime 26 API calls 24800->24809 24812 7ffd9dfbc361 24800->24812 24801->24684 24802->24684 24803->24812 24807 7ffd9dfb4430 24804->24807 24808 7ffd9dfb4442 24804->24808 24810 7ffd9dfb4414 24805->24810 24806->24684 24811 7ffd9dfa41e0 memcpy_s 14 API calls 24807->24811 24813 7ffd9dfb446a 24808->24813 24814 7ffd9dfb4453 24808->24814 24809->24812 24815 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 24810->24815 24816 7ffd9dfb4435 24811->24816 24812->24684 25124 7ffd9dfbc744 24813->25124 25115 7ffd9dfbc334 24814->25115 24815->24802 24819 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 24816->24819 24819->24802 24821 7ffd9dfa41e0 memcpy_s 14 API calls 24821->24802 24823 7ffd9dfa424f 24822->24823 24824 7ffd9dfa4232 24822->24824 24826 7ffd9dfa4259 24823->24826 25157 7ffd9dfb0748 24823->25157 24824->24823 24825 7ffd9dfa4240 24824->24825 24827 7ffd9dfa41e0 memcpy_s 14 API calls 24825->24827 25164 7ffd9dfb0784 24826->25164 24830 7ffd9dfa4245 memcpy_s 24827->24830 24830->24699 24832 7ffd9dfa43d4 wcsftime 26 API calls 24831->24832 24833 7ffd9dfbc836 24832->24833 24834 7ffd9dfbc844 24833->24834 24835 7ffd9dfb0a28 5 API calls 24833->24835 24836 7ffd9dfacb58 wcsftime 17 API calls 24834->24836 24835->24834 24837 7ffd9dfbc89c 24836->24837 24838 7ffd9dfbc928 24837->24838 24839 7ffd9dfa43d4 wcsftime 26 API calls 24837->24839 24840 7ffd9dfbc939 24838->24840 24842 7ffd9dfb0044 __free_lconv_mon 14 API calls 24838->24842 24841 7ffd9dfbc8af 24839->24841 24843 7ffd9dfb483f 24840->24843 24845 7ffd9dfb0044 __free_lconv_mon 14 API calls 24840->24845 24844 7ffd9dfb0a28 5 API calls 24841->24844 24846 7ffd9dfbc8b8 24841->24846 24842->24840 24843->24705 24843->24716 24844->24846 24845->24843 24847 7ffd9dfacb58 wcsftime 17 API calls 24846->24847 24848 7ffd9dfbc90f 24847->24848 24848->24838 24849 7ffd9dfbc917 SetEnvironmentVariableW 24848->24849 24849->24838 24851 7ffd9dfb4cd7 24850->24851 24852 7ffd9dfb4cf4 24850->24852 24851->24722 24853 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24852->24853 24860 7ffd9dfb4d18 24853->24860 24854 7ffd9dfb4d9c 24856 7ffd9dfaffb8 __FrameHandler3::FrameUnwindToState 26 API calls 24854->24856 24855 7ffd9dfb4d79 24857 7ffd9dfb0044 __free_lconv_mon 14 API calls 24855->24857 24858 7ffd9dfb4da2 24856->24858 24857->24851 24859 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24859->24860 24860->24854 24860->24855 24860->24859 24861 7ffd9dfb0044 __free_lconv_mon 14 API calls 24860->24861 24862 7ffd9dfb4210 23 API calls 24860->24862 24863 7ffd9dfb4d88 24860->24863 24861->24860 24862->24860 24864 7ffd9dfa40e0 _invalid_parameter_noinfo_noreturn 9 API calls 24863->24864 24864->24854 24866 7ffd9dfaf798 24865->24866 24867 7ffd9dfaf7a1 24865->24867 24866->24867 25176 7ffd9dfaf2c4 24866->25176 24867->24719 24867->24737 24872 7ffd9dfb4285 24871->24872 24877 7ffd9dfb42b2 24871->24877 24873 7ffd9dfb428a 24872->24873 24872->24877 24874 7ffd9dfa41e0 memcpy_s 14 API calls 24873->24874 24875 7ffd9dfb428f 24874->24875 24878 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 24875->24878 24876 7ffd9dfb42f6 24880 7ffd9dfa41e0 memcpy_s 14 API calls 24876->24880 24877->24876 24879 7ffd9dfb4315 24877->24879 24893 7ffd9dfb42ea __crtLCMapStringW 24877->24893 24881 7ffd9dfb429a 24878->24881 24882 7ffd9dfb431f 24879->24882 24883 7ffd9dfb4331 24879->24883 24884 7ffd9dfb42fb 24880->24884 24881->24733 24885 7ffd9dfa41e0 memcpy_s 14 API calls 24882->24885 24886 7ffd9dfa43d4 wcsftime 26 API calls 24883->24886 24887 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 24884->24887 24888 7ffd9dfb4324 24885->24888 24889 7ffd9dfb433e 24886->24889 24887->24893 24890 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 24888->24890 24889->24893 25218 7ffd9dfbc18c 24889->25218 24890->24893 24893->24733 24894 7ffd9dfa41e0 memcpy_s 14 API calls 24894->24893 24896 7ffd9dfb421d 24895->24896 24898 7ffd9dfb4227 24895->24898 24896->24898 24901 7ffd9dfb4243 24896->24901 24897 7ffd9dfa41e0 memcpy_s 14 API calls 24899 7ffd9dfb422f 24897->24899 24898->24897 24900 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 24899->24900 24902 7ffd9dfb423b 24900->24902 24901->24902 24903 7ffd9dfa41e0 memcpy_s 14 API calls 24901->24903 24902->24759 24902->24760 24903->24899 24905 7ffd9dfaf271 24904->24905 24914 7ffd9dfaf26d 24904->24914 24924 7ffd9dfb8ea0 24905->24924 24910 7ffd9dfaf283 24913 7ffd9dfb0044 __free_lconv_mon 14 API calls 24910->24913 24913->24914 24914->24782 24916 7ffd9dfaf58c 24914->24916 24915 7ffd9dfb0044 __free_lconv_mon 14 API calls 24915->24910 24917 7ffd9dfaf5ab 24916->24917 24922 7ffd9dfaf5be 24916->24922 24917->24782 24918 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24918->24922 24919 7ffd9dfaf650 24920 7ffd9dfb0044 __free_lconv_mon 14 API calls 24919->24920 24920->24917 24921 7ffd9dfb3118 WideCharToMultiByte wcsftime 24921->24922 24922->24917 24922->24918 24922->24919 24922->24921 24923 7ffd9dfb0044 __free_lconv_mon 14 API calls 24922->24923 24923->24922 24925 7ffd9dfaf276 24924->24925 24926 7ffd9dfb8ead 24924->24926 24930 7ffd9dfb9200 GetEnvironmentStringsW 24925->24930 24959 7ffd9dfb0514 24926->24959 24931 7ffd9dfb922e 24930->24931 24941 7ffd9dfb92d0 24930->24941 24934 7ffd9dfb3118 wcsftime WideCharToMultiByte 24931->24934 24932 7ffd9dfb92da FreeEnvironmentStringsW 24933 7ffd9dfaf27b 24932->24933 24933->24910 24942 7ffd9dfaf32c 24933->24942 24935 7ffd9dfb9280 24934->24935 24936 7ffd9dfb06e8 wcsftime 15 API calls 24935->24936 24935->24941 24937 7ffd9dfb928f 24936->24937 24938 7ffd9dfb92b9 24937->24938 24939 7ffd9dfb3118 wcsftime WideCharToMultiByte 24937->24939 24940 7ffd9dfb0044 __free_lconv_mon 14 API calls 24938->24940 24939->24938 24940->24941 24941->24932 24941->24933 24943 7ffd9dfaf353 24942->24943 24944 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24943->24944 24953 7ffd9dfaf388 24944->24953 24945 7ffd9dfaf3f7 24946 7ffd9dfb0044 __free_lconv_mon 14 API calls 24945->24946 24947 7ffd9dfaf290 24946->24947 24947->24915 24948 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24948->24953 24949 7ffd9dfaf3e8 25109 7ffd9dfaf548 24949->25109 24950 7ffd9dfabf58 __std_exception_copy 23 API calls 24950->24953 24953->24945 24953->24948 24953->24949 24953->24950 24954 7ffd9dfaf41f 24953->24954 24957 7ffd9dfb0044 __free_lconv_mon 14 API calls 24953->24957 24956 7ffd9dfa40e0 _invalid_parameter_noinfo_noreturn 9 API calls 24954->24956 24955 7ffd9dfb0044 __free_lconv_mon 14 API calls 24955->24945 24958 7ffd9dfaf431 24956->24958 24957->24953 24960 7ffd9dfb0525 24959->24960 24961 7ffd9dfb052a 24959->24961 24962 7ffd9dfb0bd0 __FrameHandler3::FrameUnwindToState 6 API calls 24960->24962 24963 7ffd9dfb0c18 __FrameHandler3::FrameUnwindToState 6 API calls 24961->24963 24968 7ffd9dfb0532 24961->24968 24962->24961 24964 7ffd9dfb0549 24963->24964 24966 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 24964->24966 24964->24968 24965 7ffd9dfaffb8 __FrameHandler3::FrameUnwindToState 26 API calls 24967 7ffd9dfb05ba 24965->24967 24969 7ffd9dfb055c 24966->24969 24968->24965 24972 7ffd9dfb05ac 24968->24972 24970 7ffd9dfb057a 24969->24970 24971 7ffd9dfb056a 24969->24971 24973 7ffd9dfb0c18 __FrameHandler3::FrameUnwindToState 6 API calls 24970->24973 24974 7ffd9dfb0c18 __FrameHandler3::FrameUnwindToState 6 API calls 24971->24974 24984 7ffd9dfb8c24 24972->24984 24976 7ffd9dfb0582 24973->24976 24975 7ffd9dfb0571 24974->24975 24979 7ffd9dfb0044 __free_lconv_mon 14 API calls 24975->24979 24977 7ffd9dfb0598 24976->24977 24978 7ffd9dfb0586 24976->24978 24981 7ffd9dfb01ac __FrameHandler3::FrameUnwindToState 14 API calls 24977->24981 24980 7ffd9dfb0c18 __FrameHandler3::FrameUnwindToState 6 API calls 24978->24980 24979->24968 24980->24975 24982 7ffd9dfb05a0 24981->24982 24983 7ffd9dfb0044 __free_lconv_mon 14 API calls 24982->24983 24983->24968 25002 7ffd9dfb8de8 24984->25002 24986 7ffd9dfb8c4d 25017 7ffd9dfb8930 24986->25017 24989 7ffd9dfb06e8 wcsftime 15 API calls 24991 7ffd9dfb8c78 24989->24991 24990 7ffd9dfb8d13 24992 7ffd9dfb0044 __free_lconv_mon 14 API calls 24990->24992 24991->24990 25024 7ffd9dfb8f1c 24991->25024 24993 7ffd9dfb8c67 24992->24993 24993->24925 24995 7ffd9dfb8d07 24996 7ffd9dfb8d0e 24995->24996 24999 7ffd9dfb8d33 24995->24999 24997 7ffd9dfa41e0 memcpy_s 14 API calls 24996->24997 24997->24990 24998 7ffd9dfb8d70 24998->24990 25033 7ffd9dfb8774 24998->25033 24999->24998 25000 7ffd9dfb0044 __free_lconv_mon 14 API calls 24999->25000 25000->24998 25003 7ffd9dfb8e0b 25002->25003 25004 7ffd9dfb8e15 25003->25004 25048 7ffd9dfb4518 EnterCriticalSection 25003->25048 25006 7ffd9dfb8e87 25004->25006 25009 7ffd9dfaffb8 __FrameHandler3::FrameUnwindToState 26 API calls 25004->25009 25006->24986 25010 7ffd9dfb8e9f 25009->25010 25013 7ffd9dfb8ef2 25010->25013 25014 7ffd9dfb0514 26 API calls 25010->25014 25013->24986 25015 7ffd9dfb8edc 25014->25015 25016 7ffd9dfb8c24 36 API calls 25015->25016 25016->25013 25018 7ffd9dfa43d4 wcsftime 26 API calls 25017->25018 25019 7ffd9dfb8944 25018->25019 25020 7ffd9dfb8950 GetOEMCP 25019->25020 25021 7ffd9dfb8962 25019->25021 25023 7ffd9dfb8977 25020->25023 25022 7ffd9dfb8967 GetACP 25021->25022 25021->25023 25022->25023 25023->24989 25023->24993 25025 7ffd9dfb8930 28 API calls 25024->25025 25026 7ffd9dfb8f47 25025->25026 25027 7ffd9dfb8f84 IsValidCodePage 25026->25027 25030 7ffd9dfb8fc7 memcpy_s _handle_error 25026->25030 25028 7ffd9dfb8f95 25027->25028 25027->25030 25029 7ffd9dfb8fcc GetCPInfo 25028->25029 25032 7ffd9dfb8f9e memcpy_s 25028->25032 25029->25030 25029->25032 25030->24995 25049 7ffd9dfb8a40 25032->25049 25108 7ffd9dfb4518 EnterCriticalSection 25033->25108 25050 7ffd9dfb8a7d GetCPInfo 25049->25050 25057 7ffd9dfb8b75 _handle_error 25049->25057 25052 7ffd9dfb8a90 25050->25052 25050->25057 25058 7ffd9dfb9fac 25052->25058 25053 7ffd9dfb8b09 25071 7ffd9dfb17b8 25053->25071 25056 7ffd9dfb17b8 30 API calls 25056->25057 25057->25030 25059 7ffd9dfa43d4 wcsftime 26 API calls 25058->25059 25060 7ffd9dfb9fee 25059->25060 25061 7ffd9dfb389c wcsftime MultiByteToWideChar 25060->25061 25062 7ffd9dfba024 25061->25062 25063 7ffd9dfb06e8 wcsftime 15 API calls 25062->25063 25064 7ffd9dfba02b _handle_error 25062->25064 25065 7ffd9dfba050 memcpy_s _com_util::ConvertStringToBSTR 25062->25065 25063->25065 25064->25053 25066 7ffd9dfba0e8 25065->25066 25067 7ffd9dfb389c wcsftime MultiByteToWideChar 25065->25067 25066->25064 25068 7ffd9dfb0044 __free_lconv_mon 14 API calls 25066->25068 25069 7ffd9dfba0ca 25067->25069 25068->25064 25069->25066 25070 7ffd9dfba0ce GetStringTypeW 25069->25070 25070->25066 25072 7ffd9dfa43d4 wcsftime 26 API calls 25071->25072 25073 7ffd9dfb17dd 25072->25073 25076 7ffd9dfb14a0 25073->25076 25075 7ffd9dfb1829 25075->25056 25077 7ffd9dfb14e2 25076->25077 25078 7ffd9dfb389c wcsftime MultiByteToWideChar 25077->25078 25080 7ffd9dfb152c 25078->25080 25079 7ffd9dfb176b _handle_error 25079->25075 25080->25079 25081 7ffd9dfb06e8 wcsftime 15 API calls 25080->25081 25084 7ffd9dfb155f _com_util::ConvertStringToBSTR 25080->25084 25081->25084 25082 7ffd9dfb389c wcsftime MultiByteToWideChar 25083 7ffd9dfb15d1 25082->25083 25085 7ffd9dfb1663 25083->25085 25102 7ffd9dfb0e7c 25083->25102 25084->25082 25084->25085 25085->25079 25087 7ffd9dfb0044 __free_lconv_mon 14 API calls 25085->25087 25087->25079 25089 7ffd9dfb1620 25089->25085 25092 7ffd9dfb0e7c __crtLCMapStringW 6 API calls 25089->25092 25090 7ffd9dfb1672 25091 7ffd9dfb06e8 wcsftime 15 API calls 25090->25091 25094 7ffd9dfb168c _com_util::ConvertStringToBSTR 25090->25094 25091->25094 25092->25085 25093 7ffd9dfb0e7c __crtLCMapStringW 6 API calls 25096 7ffd9dfb170d 25093->25096 25094->25085 25094->25093 25095 7ffd9dfb1742 25095->25085 25097 7ffd9dfb0044 __free_lconv_mon 14 API calls 25095->25097 25096->25095 25098 7ffd9dfb3118 wcsftime WideCharToMultiByte 25096->25098 25097->25085 25099 7ffd9dfb173c 25098->25099 25099->25095 25100 7ffd9dfb17a2 25099->25100 25100->25085 25101 7ffd9dfb0044 __free_lconv_mon 14 API calls 25100->25101 25101->25085 25103 7ffd9dfb0800 try_get_function 5 API calls 25102->25103 25104 7ffd9dfb0eba 25103->25104 25105 7ffd9dfb0ebf 25104->25105 25106 7ffd9dfb0f58 __crtLCMapStringW 5 API calls 25104->25106 25105->25085 25105->25089 25105->25090 25107 7ffd9dfb0f1b LCMapStringW 25106->25107 25107->25105 25110 7ffd9dfaf3f0 25109->25110 25111 7ffd9dfaf54d 25109->25111 25110->24955 25112 7ffd9dfaf576 25111->25112 25113 7ffd9dfb0044 __free_lconv_mon 14 API calls 25111->25113 25114 7ffd9dfb0044 __free_lconv_mon 14 API calls 25112->25114 25113->25111 25114->25110 25116 7ffd9dfbc351 25115->25116 25118 7ffd9dfbc368 25115->25118 25117 7ffd9dfa41e0 memcpy_s 14 API calls 25116->25117 25119 7ffd9dfbc356 25117->25119 25118->25116 25120 7ffd9dfbc376 25118->25120 25121 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 25119->25121 25122 7ffd9dfa43d4 wcsftime 26 API calls 25120->25122 25123 7ffd9dfbc361 25120->25123 25121->25123 25122->25123 25123->24802 25125 7ffd9dfa43d4 wcsftime 26 API calls 25124->25125 25126 7ffd9dfbc769 25125->25126 25129 7ffd9dfbc3e4 25126->25129 25128 7ffd9dfb4491 25128->24802 25128->24821 25130 7ffd9dfbc42e 25129->25130 25131 7ffd9dfbc4b5 25130->25131 25133 7ffd9dfbc4a0 GetCPInfo 25130->25133 25138 7ffd9dfbc4b9 _handle_error 25130->25138 25132 7ffd9dfb389c wcsftime MultiByteToWideChar 25131->25132 25131->25138 25134 7ffd9dfbc54d 25132->25134 25133->25131 25133->25138 25135 7ffd9dfbc580 _com_util::ConvertStringToBSTR 25134->25135 25136 7ffd9dfb06e8 wcsftime 15 API calls 25134->25136 25134->25138 25137 7ffd9dfb389c wcsftime MultiByteToWideChar 25135->25137 25140 7ffd9dfbc6fd 25135->25140 25136->25135 25139 7ffd9dfbc5ef 25137->25139 25138->25128 25139->25140 25141 7ffd9dfb389c wcsftime MultiByteToWideChar 25139->25141 25140->25138 25142 7ffd9dfb0044 __free_lconv_mon 14 API calls 25140->25142 25143 7ffd9dfbc615 25141->25143 25142->25138 25143->25140 25144 7ffd9dfb06e8 wcsftime 15 API calls 25143->25144 25145 7ffd9dfbc63e _com_util::ConvertStringToBSTR 25143->25145 25144->25145 25146 7ffd9dfb389c wcsftime MultiByteToWideChar 25145->25146 25147 7ffd9dfbc6e1 25145->25147 25148 7ffd9dfbc6af 25146->25148 25147->25140 25149 7ffd9dfb0044 __free_lconv_mon 14 API calls 25147->25149 25148->25147 25151 7ffd9dfb0a64 25148->25151 25149->25140 25152 7ffd9dfb0800 try_get_function 5 API calls 25151->25152 25153 7ffd9dfb0aa2 25152->25153 25154 7ffd9dfb0aa7 25153->25154 25155 7ffd9dfb0f58 __crtLCMapStringW 5 API calls 25153->25155 25154->25147 25156 7ffd9dfb0b03 CompareStringW 25155->25156 25156->25154 25158 7ffd9dfb076a HeapSize 25157->25158 25159 7ffd9dfb0751 25157->25159 25160 7ffd9dfa41e0 memcpy_s 14 API calls 25159->25160 25161 7ffd9dfb0756 25160->25161 25162 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 25161->25162 25163 7ffd9dfb0761 25162->25163 25163->24826 25165 7ffd9dfb0799 25164->25165 25166 7ffd9dfb07a3 25164->25166 25167 7ffd9dfb06e8 wcsftime 15 API calls 25165->25167 25168 7ffd9dfb07a8 25166->25168 25174 7ffd9dfb07af wcsftime 25166->25174 25173 7ffd9dfb07a1 25167->25173 25169 7ffd9dfb0044 __free_lconv_mon 14 API calls 25168->25169 25169->25173 25170 7ffd9dfb07b5 25172 7ffd9dfa41e0 memcpy_s 14 API calls 25170->25172 25171 7ffd9dfb07e2 HeapReAlloc 25171->25173 25171->25174 25172->25173 25173->24830 25174->25170 25174->25171 25175 7ffd9dfafdb8 wcsftime 2 API calls 25174->25175 25175->25174 25177 7ffd9dfaf2dd 25176->25177 25184 7ffd9dfaf2d9 25176->25184 25194 7ffd9dfb9304 GetEnvironmentStringsW 25177->25194 25180 7ffd9dfaf2ea 25182 7ffd9dfb0044 __free_lconv_mon 14 API calls 25180->25182 25182->25184 25184->24867 25186 7ffd9dfaf660 25184->25186 25185 7ffd9dfb0044 __free_lconv_mon 14 API calls 25185->25180 25187 7ffd9dfaf67b 25186->25187 25192 7ffd9dfaf68e 25186->25192 25187->24867 25188 7ffd9dfb389c MultiByteToWideChar wcsftime 25188->25192 25189 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 25189->25192 25190 7ffd9dfaf704 25191 7ffd9dfb0044 __free_lconv_mon 14 API calls 25190->25191 25191->25187 25192->25187 25192->25188 25192->25189 25192->25190 25193 7ffd9dfb0044 __free_lconv_mon 14 API calls 25192->25193 25193->25192 25195 7ffd9dfb9328 25194->25195 25196 7ffd9dfaf2e2 25194->25196 25197 7ffd9dfb06e8 wcsftime 15 API calls 25195->25197 25196->25180 25201 7ffd9dfaf434 25196->25201 25199 7ffd9dfb9362 memcpy_s 25197->25199 25198 7ffd9dfb0044 __free_lconv_mon 14 API calls 25200 7ffd9dfb9382 FreeEnvironmentStringsW 25198->25200 25199->25198 25200->25196 25202 7ffd9dfaf45c 25201->25202 25203 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 25202->25203 25212 7ffd9dfaf497 25203->25212 25204 7ffd9dfaf50c 25205 7ffd9dfb0044 __free_lconv_mon 14 API calls 25204->25205 25206 7ffd9dfaf2f7 25205->25206 25206->25185 25207 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 25207->25212 25208 7ffd9dfaf4fd 25209 7ffd9dfaf548 14 API calls 25208->25209 25211 7ffd9dfaf505 25209->25211 25210 7ffd9dfb4210 23 API calls 25210->25212 25214 7ffd9dfb0044 __free_lconv_mon 14 API calls 25211->25214 25212->25204 25212->25207 25212->25208 25212->25210 25213 7ffd9dfaf534 25212->25213 25215 7ffd9dfb0044 __free_lconv_mon 14 API calls 25212->25215 25216 7ffd9dfa40e0 _invalid_parameter_noinfo_noreturn 9 API calls 25213->25216 25214->25204 25215->25212 25217 7ffd9dfaf546 25216->25217 25220 7ffd9dfbc1b5 __crtLCMapStringW 25218->25220 25219 7ffd9dfb437a 25219->24893 25219->24894 25220->25219 25221 7ffd9dfb0a64 6 API calls 25220->25221 25221->25219 24130 7ffd9dfb2ac0 24131 7ffd9dfb2acb __scrt_uninitialize_crt 24130->24131 24139 7ffd9dfbb974 24131->24139 24152 7ffd9dfb4518 EnterCriticalSection 24139->24152 22788 7ffd9df9f2d1 22789 7ffd9df9f1d9 22788->22789 22791 7ffd9dfc13a8 22789->22791 22817 7ffd9dfc1008 22791->22817 22794 7ffd9dfc1426 22826 7ffd9dfc1314 22794->22826 22797 7ffd9dfc155b 22799 7ffd9dfc1621 22797->22799 22804 7ffd9dfc15b7 GetProcAddress 22797->22804 22798 7ffd9dfc14db LoadLibraryExA 22800 7ffd9dfc1547 22798->22800 22801 7ffd9dfc14f2 GetLastError 22798->22801 22806 7ffd9dfc1314 DloadReleaseSectionWriteAccess 6 API calls 22799->22806 22800->22797 22802 7ffd9dfc1552 FreeLibrary 22800->22802 22805 7ffd9dfc151c 22801->22805 22809 7ffd9dfc1507 22801->22809 22802->22797 22803 7ffd9dfc144f 22803->22797 22803->22798 22803->22799 22803->22800 22804->22799 22808 7ffd9dfc15cc GetLastError 22804->22808 22807 7ffd9dfc1314 DloadReleaseSectionWriteAccess 6 API calls 22805->22807 22810 7ffd9dfc1651 22806->22810 22811 7ffd9dfc1529 RaiseException 22807->22811 22812 7ffd9dfc15e1 22808->22812 22809->22800 22809->22805 22810->22789 22811->22810 22812->22799 22813 7ffd9dfc1314 DloadReleaseSectionWriteAccess 6 API calls 22812->22813 22814 7ffd9dfc1603 RaiseException 22813->22814 22815 7ffd9dfc1008 DloadAcquireSectionWriteAccess 6 API calls 22814->22815 22816 7ffd9dfc161d 22815->22816 22816->22799 22818 7ffd9dfc10ac 22817->22818 22819 7ffd9dfc101e 22817->22819 22818->22794 22818->22803 22834 7ffd9dfc10b4 22819->22834 22822 7ffd9dfc107e 22824 7ffd9dfc10b4 DloadGetSRWLockFunctionPointers 3 API calls 22822->22824 22825 7ffd9dfc1083 22824->22825 22825->22818 22827 7ffd9dfc1324 22826->22827 22833 7ffd9dfc137d RaiseException 22826->22833 22828 7ffd9dfc10b4 DloadGetSRWLockFunctionPointers 3 API calls 22827->22828 22829 7ffd9dfc1329 22828->22829 22830 7ffd9dfc1378 22829->22830 22832 7ffd9dfc1284 DloadProtectSection 3 API calls 22829->22832 22831 7ffd9dfc10b4 DloadGetSRWLockFunctionPointers 3 API calls 22830->22831 22831->22833 22832->22830 22833->22810 22835 7ffd9dfc10cf 22834->22835 22839 7ffd9dfc1023 22834->22839 22836 7ffd9dfc10d4 GetModuleHandleW 22835->22836 22835->22839 22837 7ffd9dfc10ee GetProcAddress 22836->22837 22836->22839 22838 7ffd9dfc1103 GetProcAddress 22837->22838 22837->22839 22838->22839 22839->22822 22840 7ffd9dfc1284 22839->22840 22841 7ffd9dfc12a6 DloadObtainSection 22840->22841 22842 7ffd9dfc12e6 VirtualProtect 22841->22842 22843 7ffd9dfc12ae 22841->22843 22845 7ffd9dfc1150 VirtualQuery 22841->22845 22842->22843 22843->22822 22846 7ffd9dfc1179 22845->22846 22847 7ffd9dfc11c9 22846->22847 22848 7ffd9dfc1185 GetSystemInfo 22846->22848 22847->22842 22848->22847 25487 7ffd9df9f1d4 25488 7ffd9df9f1d9 25487->25488 25489 7ffd9dfc13a8 __delayLoadHelper2 14 API calls 25488->25489 25489->25488 19924 7ffd9df91520 19925 7ffd9df91536 memcpy_s _com_util::ConvertStringToBSTR 19924->19925 20025 7ffd9df9db18 19925->20025 19934 7ffd9df9d9f0 24 API calls 19935 7ffd9df91639 19934->19935 19936 7ffd9df9d9f0 24 API calls 19935->19936 19937 7ffd9df91651 19936->19937 20055 7ffd9dfa4484 19937->20055 19940 7ffd9dfa4484 _scwprintf 26 API calls 19942 7ffd9df91687 19940->19942 19941 7ffd9dfa4484 _scwprintf 26 API calls 19943 7ffd9df916c9 19941->19943 19944 7ffd9df91669 19942->19944 19946 7ffd9dfa4484 _scwprintf 26 API calls 19942->19946 20063 7ffd9df9642c 19943->20063 19944->19941 19946->19944 19948 7ffd9df917ee 19951 7ffd9df9d740 36 API calls 19948->19951 19950 7ffd9df91721 19952 7ffd9dfa4484 _scwprintf 26 API calls 19950->19952 19953 7ffd9df91818 19951->19953 19954 7ffd9df91735 19952->19954 19955 7ffd9dfa4484 _scwprintf 26 API calls 19953->19955 19958 7ffd9df91830 19953->19958 19956 7ffd9dfa4484 _scwprintf 26 API calls 19954->19956 19963 7ffd9df91739 19954->19963 19955->19958 19960 7ffd9df91754 19956->19960 19957 7ffd9df9d740 36 API calls 19961 7ffd9df91798 19957->19961 19968 7ffd9df91834 _handle_error 19958->19968 19981 7ffd9df918e6 19958->19981 20084 7ffd9dfabf18 19958->20084 19959 7ffd9df91939 memcpy_s 20095 7ffd9df96d4c 19959->20095 19960->19963 19964 7ffd9dfa4484 _scwprintf 26 API calls 19960->19964 19965 7ffd9dfa4484 _scwprintf 26 API calls 19961->19965 19963->19957 19964->19963 19967 7ffd9df917ac 19965->19967 19969 7ffd9df9d740 36 API calls 19967->19969 19970 7ffd9df917cf 19969->19970 19972 7ffd9df9642c sscanf 29 API calls 19970->19972 19971 7ffd9df91867 memcpy_s 20087 7ffd9df9dc44 19971->20087 19972->19948 19973 7ffd9df9195c memcpy_s 19978 7ffd9df91b74 19973->19978 20114 7ffd9df91cac 19973->20114 19976 7ffd9df9d740 36 API calls 19979 7ffd9df918c3 19976->19979 19977 7ffd9df91c26 19982 7ffd9df936e0 6 API calls 19977->19982 19978->19977 20162 7ffd9df9a86c 19978->20162 19979->19981 19983 7ffd9df9642c sscanf 29 API calls 19979->19983 19981->19959 19981->19968 19982->19968 19983->19981 19985 7ffd9df91bae 19987 7ffd9df91c28 19985->19987 19988 7ffd9df91bb2 19985->19988 19986 7ffd9df91999 memcpy_s 19986->19977 20121 7ffd9df91e08 19986->20121 20179 7ffd9df965c4 19987->20179 20166 7ffd9df96f48 19988->20166 19991 7ffd9df91c31 20191 7ffd9df97284 19991->20191 19992 7ffd9df91bb7 20001 7ffd9df91bbb 19992->20001 20172 7ffd9df96478 19992->20172 19995 7ffd9df919d9 19995->19977 20128 7ffd9df963d8 19995->20128 19998 7ffd9df91bd9 19998->20001 20003 7ffd9df96478 80 API calls 19998->20003 20000 7ffd9df97310 65 API calls 20000->19977 20001->19977 20001->20000 20002 7ffd9dfa4484 _scwprintf 26 API calls 20004 7ffd9df91a14 20002->20004 20003->20001 20004->19978 20005 7ffd9df91a1c memcpy_s 20004->20005 20006 7ffd9df91a61 CreateMutexA GetLastError 20005->20006 20007 7ffd9df91a86 20006->20007 20008 7ffd9df91ae1 WaitForSingleObject 20006->20008 20010 7ffd9df91aa7 20007->20010 20011 7ffd9df91a8b OpenMutexA 20007->20011 20009 7ffd9df91cac 36 API calls 20008->20009 20012 7ffd9df91afd 20009->20012 20010->20008 20013 7ffd9df91aac 20010->20013 20011->20010 20026 7ffd9df915eb 20025->20026 20027 7ffd9df9db2e 20025->20027 20033 7ffd9df9dbe0 20026->20033 20201 7ffd9dfabfb8 20027->20201 20030 7ffd9dfabfb8 _scwprintf 23 API calls 20031 7ffd9df9db52 20030->20031 20032 7ffd9dfabfb8 _scwprintf 23 API calls 20031->20032 20032->20026 20034 7ffd9df9dbf6 20033->20034 20040 7ffd9df915fa 20033->20040 20035 7ffd9dfabfb8 _scwprintf 23 API calls 20034->20035 20036 7ffd9df9dc09 20035->20036 20037 7ffd9dfabfb8 _scwprintf 23 API calls 20036->20037 20038 7ffd9df9dc1a 20037->20038 20039 7ffd9dfabfb8 _scwprintf 23 API calls 20038->20039 20039->20040 20041 7ffd9df9db7c 20040->20041 20042 7ffd9df9db92 20041->20042 20048 7ffd9df91609 20041->20048 20043 7ffd9dfabfb8 _scwprintf 23 API calls 20042->20043 20044 7ffd9df9dba5 20043->20044 20045 7ffd9dfabfb8 _scwprintf 23 API calls 20044->20045 20046 7ffd9df9dbb6 20045->20046 20047 7ffd9dfabfb8 _scwprintf 23 API calls 20046->20047 20047->20048 20049 7ffd9df9d9f0 20048->20049 20050 7ffd9df9da1c 20049->20050 20051 7ffd9df9da39 RegOpenKeyExA 20050->20051 20052 7ffd9df9da21 20050->20052 20054 7ffd9df91621 20051->20054 20316 7ffd9dfabf58 20052->20316 20054->19934 20056 7ffd9dfa448c 20055->20056 20325 7ffd9dfa43d4 20056->20325 20059 7ffd9dfa41e0 memcpy_s 14 API calls 20060 7ffd9dfa44bf 20059->20060 20061 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20060->20061 20062 7ffd9df91665 20061->20062 20062->19940 20062->19944 20064 7ffd9df96451 sscanf 20063->20064 20428 7ffd9dfabc5c 20064->20428 20066 7ffd9df916f3 20066->19948 20067 7ffd9df9d740 20066->20067 20068 7ffd9df9d75e memcpy_s _com_util::ConvertStringToBSTR 20067->20068 20069 7ffd9df9d7c0 20068->20069 20070 7ffd9df9d7ff RegOpenKeyExA 20068->20070 20071 7ffd9dfabf58 __std_exception_copy 23 API calls 20069->20071 20072 7ffd9df9d7cf _handle_error 20070->20072 20073 7ffd9df9d82a 20070->20073 20071->20072 20072->19950 20073->20072 20074 7ffd9df9d8a1 RegOpenKeyExA 20073->20074 20074->20072 20075 7ffd9df9d8cc 20074->20075 20075->20072 20076 7ffd9dfa4484 _scwprintf 26 API calls 20075->20076 20077 7ffd9df9d91b 20076->20077 20077->20072 20078 7ffd9df9d950 20077->20078 20739 7ffd9df9c748 GetCurrentProcess 20078->20739 20081 7ffd9df9d964 RegOpenKeyExA 20081->20072 20082 7ffd9df9d993 20081->20082 20082->20072 20747 7ffd9df9d690 20082->20747 20753 7ffd9dfabe84 20084->20753 20088 7ffd9df918a8 20087->20088 20089 7ffd9df9dc5a 20087->20089 20088->19976 20090 7ffd9dfabfb8 _scwprintf 23 API calls 20089->20090 20091 7ffd9df9dc6d 20090->20091 20092 7ffd9dfabfb8 _scwprintf 23 API calls 20091->20092 20093 7ffd9df9dc7e 20092->20093 20094 7ffd9dfabfb8 _scwprintf 23 API calls 20093->20094 20094->20088 20096 7ffd9df96d6a _com_util::ConvertStringToBSTR 20095->20096 20765 7ffd9df9b3e4 20096->20765 20098 7ffd9df96da4 20099 7ffd9df9b3e4 37 API calls 20098->20099 20100 7ffd9df96dc0 memcpy_s 20098->20100 20099->20100 20101 7ffd9df96f1c _handle_error 20100->20101 20783 7ffd9df96704 20100->20783 20101->19973 20104 7ffd9df96e3d memcpy_s 20105 7ffd9df96704 _snwprintf_s 32 API calls 20104->20105 20106 7ffd9df96e6e LoadLibraryA 20105->20106 20107 7ffd9df96704 _snwprintf_s 32 API calls 20106->20107 20108 7ffd9df96ea0 LoadLibraryA 20107->20108 20108->20101 20109 7ffd9df96eb5 memcpy_s 20108->20109 20110 7ffd9df96ec7 GetProcAddress 20109->20110 20110->20101 20111 7ffd9df96edc 20110->20111 20111->20101 20787 7ffd9dfacb38 20111->20787 20115 7ffd9df963d8 swprintf 32 API calls 20114->20115 20116 7ffd9df91d0e 20115->20116 21257 7ffd9df93ad0 20116->21257 20118 7ffd9df91dc1 _handle_error 20118->19986 20120 7ffd9df963d8 swprintf 32 API calls 20120->20118 20122 7ffd9df963d8 swprintf 32 API calls 20121->20122 20123 7ffd9df91e66 20122->20123 20124 7ffd9df93ad0 4 API calls 20123->20124 20125 7ffd9df91e82 20124->20125 20126 7ffd9df91f1e _handle_error 20125->20126 20127 7ffd9df963d8 swprintf 32 API calls 20125->20127 20126->19995 20127->20126 20129 7ffd9df963fd _snwprintf_s 20128->20129 21268 7ffd9dfa69bc 20129->21268 20163 7ffd9df9a899 memcpy_s 20162->20163 20165 7ffd9df9a891 _handle_error 20162->20165 20164 7ffd9df9a8ab GetVersionExA 20163->20164 20164->20165 20165->19985 20167 7ffd9df96f75 memcpy_s 20166->20167 21527 7ffd9df9b774 20167->21527 20170 7ffd9dfa4484 _scwprintf 26 API calls 20171 7ffd9df96f9b _handle_error 20170->20171 20171->19992 21582 7ffd9df96698 20172->21582 20175 7ffd9df96704 _snwprintf_s 32 API calls 20176 7ffd9df964cf 20175->20176 21590 7ffd9df96834 20176->21590 20178 7ffd9df964de _handle_error 20178->19998 20180 7ffd9df9662b 20179->20180 20181 7ffd9df965ec 20179->20181 20183 7ffd9dfabf58 __std_exception_copy 23 API calls 20180->20183 20182 7ffd9df96698 43 API calls 20181->20182 20184 7ffd9df965fe 20182->20184 20185 7ffd9df96629 20183->20185 20186 7ffd9df96651 20184->20186 20188 7ffd9df96704 _snwprintf_s 32 API calls 20184->20188 21711 7ffd9df96ba8 20185->21711 21725 7ffd9df9c69c 20186->21725 20188->20185 20190 7ffd9df96658 _handle_error 20190->19991 20192 7ffd9df972b3 memcpy_s 20191->20192 22752 7ffd9df97510 20192->22752 20194 7ffd9df972c5 20195 7ffd9df972d3 20194->20195 22770 7ffd9df994a8 20194->22770 20197 7ffd9df97510 27 API calls 20195->20197 20198 7ffd9df972e2 20197->20198 20199 7ffd9df972f0 _handle_error 20198->20199 20200 7ffd9df994a8 33 API calls 20198->20200 20199->19977 20200->20199 20202 7ffd9dfabfc8 20201->20202 20205 7ffd9dfabfd2 20201->20205 20202->20205 20207 7ffd9dfac004 20202->20207 20210 7ffd9dfa41e0 20205->20210 20206 7ffd9df9db41 20206->20030 20207->20206 20208 7ffd9dfa41e0 memcpy_s 14 API calls 20207->20208 20209 7ffd9dfabfd9 20208->20209 20213 7ffd9dfa4090 20209->20213 20216 7ffd9dfb05bc GetLastError 20210->20216 20212 7ffd9dfa41e9 20212->20209 20298 7ffd9dfa3fe0 20213->20298 20217 7ffd9dfb05e3 20216->20217 20218 7ffd9dfb05de 20216->20218 20222 7ffd9dfb05eb SetLastError 20217->20222 20243 7ffd9dfb0c18 20217->20243 20239 7ffd9dfb0bd0 20218->20239 20222->20212 20226 7ffd9dfb0637 20228 7ffd9dfb0c18 __FrameHandler3::FrameUnwindToState 6 API calls 20226->20228 20227 7ffd9dfb0627 20229 7ffd9dfb0c18 __FrameHandler3::FrameUnwindToState 6 API calls 20227->20229 20230 7ffd9dfb063f 20228->20230 20231 7ffd9dfb062e 20229->20231 20232 7ffd9dfb0655 20230->20232 20233 7ffd9dfb0643 20230->20233 20255 7ffd9dfb0044 20231->20255 20261 7ffd9dfb01ac 20232->20261 20235 7ffd9dfb0c18 __FrameHandler3::FrameUnwindToState 6 API calls 20233->20235 20235->20231 20266 7ffd9dfb0800 20239->20266 20244 7ffd9dfb0800 try_get_function 5 API calls 20243->20244 20245 7ffd9dfb0c46 20244->20245 20246 7ffd9dfb0c58 TlsSetValue 20245->20246 20247 7ffd9dfb0606 20245->20247 20246->20247 20247->20222 20248 7ffd9dfb308c 20247->20248 20254 7ffd9dfb309d wcsftime 20248->20254 20249 7ffd9dfb30ee 20251 7ffd9dfa41e0 memcpy_s 13 API calls 20249->20251 20250 7ffd9dfb30d2 HeapAlloc 20252 7ffd9dfb0619 20250->20252 20250->20254 20251->20252 20252->20226 20252->20227 20254->20249 20254->20250 20275 7ffd9dfafdb8 20254->20275 20256 7ffd9dfb0049 HeapFree 20255->20256 20257 7ffd9dfb0079 __free_lconv_mon 20255->20257 20256->20257 20258 7ffd9dfb0064 20256->20258 20257->20222 20259 7ffd9dfa41e0 memcpy_s 12 API calls 20258->20259 20260 7ffd9dfb0069 GetLastError 20259->20260 20260->20257 20284 7ffd9dfb0084 20261->20284 20267 7ffd9dfb0861 TlsGetValue 20266->20267 20273 7ffd9dfb085c try_get_function 20266->20273 20268 7ffd9dfb0944 20268->20267 20271 7ffd9dfb0952 GetProcAddress 20268->20271 20269 7ffd9dfb0890 LoadLibraryExW 20270 7ffd9dfb08b1 GetLastError 20269->20270 20269->20273 20270->20273 20271->20267 20272 7ffd9dfb0929 FreeLibrary 20272->20273 20273->20267 20273->20268 20273->20269 20273->20272 20274 7ffd9dfb08eb LoadLibraryExW 20273->20274 20274->20273 20278 7ffd9dfafde8 20275->20278 20283 7ffd9dfb4518 EnterCriticalSection 20278->20283 20296 7ffd9dfb4518 EnterCriticalSection 20284->20296 20299 7ffd9dfb05bc _invalid_parameter_noinfo_noreturn 14 API calls 20298->20299 20300 7ffd9dfa4005 20299->20300 20302 7ffd9dfa4016 20300->20302 20306 7ffd9dfa40e0 IsProcessorFeaturePresent 20300->20306 20302->20206 20307 7ffd9dfa40f3 20306->20307 20310 7ffd9dfa3e7c 20307->20310 20309 7ffd9dfa410e GetCurrentProcess TerminateProcess 20311 7ffd9dfa3eb6 __scrt_fastfail memcpy_s 20310->20311 20312 7ffd9dfa3ede RtlCaptureContext RtlLookupFunctionEntry 20311->20312 20313 7ffd9dfa3f18 RtlVirtualUnwind 20312->20313 20314 7ffd9dfa3f4e IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 20312->20314 20313->20314 20315 7ffd9dfa3fa0 __scrt_fastfail _handle_error 20314->20315 20315->20309 20317 7ffd9dfabf65 20316->20317 20318 7ffd9dfabf6f 20316->20318 20317->20318 20323 7ffd9dfabf8a 20317->20323 20319 7ffd9dfa41e0 memcpy_s 14 API calls 20318->20319 20320 7ffd9dfabf76 20319->20320 20321 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20320->20321 20322 7ffd9dfabf82 20321->20322 20322->20054 20323->20322 20324 7ffd9dfa41e0 memcpy_s 14 API calls 20323->20324 20324->20320 20326 7ffd9dfa43f8 20325->20326 20327 7ffd9dfa43f3 20325->20327 20326->20327 20333 7ffd9dfb0440 GetLastError 20326->20333 20327->20059 20327->20062 20334 7ffd9dfb0467 20333->20334 20335 7ffd9dfb0462 20333->20335 20337 7ffd9dfb0c18 __FrameHandler3::FrameUnwindToState 6 API calls 20334->20337 20339 7ffd9dfb046f SetLastError 20334->20339 20336 7ffd9dfb0bd0 __FrameHandler3::FrameUnwindToState 6 API calls 20335->20336 20336->20334 20338 7ffd9dfb048a 20337->20338 20338->20339 20341 7ffd9dfb308c __FrameHandler3::FrameUnwindToState 14 API calls 20338->20341 20342 7ffd9dfb050e 20339->20342 20343 7ffd9dfa4413 20339->20343 20344 7ffd9dfb049d 20341->20344 20368 7ffd9dfaffb8 20342->20368 20360 7ffd9dfb1064 20343->20360 20346 7ffd9dfb04bb 20344->20346 20347 7ffd9dfb04ab 20344->20347 20349 7ffd9dfb0c18 __FrameHandler3::FrameUnwindToState 6 API calls 20346->20349 20350 7ffd9dfb0c18 __FrameHandler3::FrameUnwindToState 6 API calls 20347->20350 20352 7ffd9dfb04c3 20349->20352 20351 7ffd9dfb04b2 20350->20351 20355 7ffd9dfb0044 __free_lconv_mon 14 API calls 20351->20355 20353 7ffd9dfb04c7 20352->20353 20354 7ffd9dfb04d9 20352->20354 20356 7ffd9dfb0c18 __FrameHandler3::FrameUnwindToState 6 API calls 20353->20356 20357 7ffd9dfb01ac __FrameHandler3::FrameUnwindToState 14 API calls 20354->20357 20355->20339 20356->20351 20358 7ffd9dfb04e1 20357->20358 20359 7ffd9dfb0044 __free_lconv_mon 14 API calls 20358->20359 20359->20339 20361 7ffd9dfb1079 20360->20361 20362 7ffd9dfa4436 20360->20362 20361->20362 20412 7ffd9dfb9b18 20361->20412 20364 7ffd9dfb1098 20362->20364 20365 7ffd9dfb10ad 20364->20365 20367 7ffd9dfb10c0 20364->20367 20365->20367 20425 7ffd9dfb8f00 20365->20425 20367->20327 20377 7ffd9dfb94d0 20368->20377 20403 7ffd9dfb9488 20377->20403 20408 7ffd9dfb4518 EnterCriticalSection 20403->20408 20413 7ffd9dfb0440 __FrameHandler3::FrameUnwindToState 26 API calls 20412->20413 20414 7ffd9dfb9b27 20413->20414 20415 7ffd9dfb9b70 20414->20415 20424 7ffd9dfb4518 EnterCriticalSection 20414->20424 20415->20362 20426 7ffd9dfb0440 __FrameHandler3::FrameUnwindToState 26 API calls 20425->20426 20427 7ffd9dfb8f09 20426->20427 20429 7ffd9dfabcaa 20428->20429 20430 7ffd9dfabc92 20428->20430 20429->20430 20432 7ffd9dfabcaf 20429->20432 20431 7ffd9dfa41e0 memcpy_s 14 API calls 20430->20431 20433 7ffd9dfabc97 20431->20433 20435 7ffd9dfa43d4 wcsftime 26 API calls 20432->20435 20434 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20433->20434 20437 7ffd9dfabca2 _handle_error 20434->20437 20436 7ffd9dfabccb memcpy_s 20435->20436 20439 7ffd9dfab118 20436->20439 20437->20066 20440 7ffd9dfab139 20439->20440 20441 7ffd9dfab133 20439->20441 20443 7ffd9dfa41e0 memcpy_s 14 API calls 20440->20443 20441->20440 20442 7ffd9dfab151 20441->20442 20445 7ffd9dfab168 20442->20445 20446 7ffd9dfab158 20442->20446 20444 7ffd9dfab13e 20443->20444 20447 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20444->20447 20453 7ffd9dfab187 20445->20453 20456 7ffd9dfab4d0 20445->20456 20465 7ffd9dfa86c8 20445->20465 20448 7ffd9dfa41e0 memcpy_s 14 API calls 20446->20448 20452 7ffd9dfab149 20447->20452 20455 7ffd9dfab15d 20448->20455 20450 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20450->20452 20452->20437 20453->20452 20454 7ffd9dfa41e0 memcpy_s 14 API calls 20453->20454 20454->20455 20455->20450 20457 7ffd9dfab4e5 20456->20457 20458 7ffd9dfab54e 20456->20458 20459 7ffd9dfab515 20457->20459 20460 7ffd9dfab4ea 20457->20460 20502 7ffd9dfa8674 20458->20502 20464 7ffd9dfab4f7 20459->20464 20499 7ffd9dfab44c 20459->20499 20460->20464 20479 7ffd9dfab204 20460->20479 20464->20445 20466 7ffd9dfa86e1 20465->20466 20478 7ffd9dfa8704 sscanf 20465->20478 20466->20478 20704 7ffd9dfb3020 20466->20704 20469 7ffd9dfa875b 20472 7ffd9dfa881b 20469->20472 20474 7ffd9dfa8771 20469->20474 20470 7ffd9dfa872c 20471 7ffd9dfb3020 sscanf 29 API calls 20470->20471 20473 7ffd9dfa873b 20471->20473 20475 7ffd9dfb2ee8 sscanf 26 API calls 20472->20475 20477 7ffd9dfb3020 sscanf 29 API calls 20473->20477 20473->20478 20710 7ffd9dfab7b8 20474->20710 20475->20478 20477->20473 20478->20445 20480 7ffd9dfab21d 20479->20480 20481 7ffd9dfab2a4 20479->20481 20483 7ffd9dfab22a 20480->20483 20484 7ffd9dfab225 20480->20484 20490 7ffd9dfab264 sscanf 20480->20490 20482 7ffd9dfab2a9 20481->20482 20481->20483 20485 7ffd9dfab2ae 20482->20485 20486 7ffd9dfab303 20482->20486 20498 7ffd9dfab25f 20483->20498 20549 7ffd9dfab394 20483->20549 20484->20483 20487 7ffd9dfab255 20484->20487 20485->20490 20492 7ffd9dfab2b3 20485->20492 20541 7ffd9dfab324 20486->20541 20506 7ffd9dfab588 20487->20506 20493 7ffd9dfab288 20490->20493 20495 7ffd9dfab273 20490->20495 20492->20498 20535 7ffd9dfabbe4 20492->20535 20526 7ffd9dfa82cc 20493->20526 20495->20498 20515 7ffd9dfa8488 20495->20515 20498->20464 20500 7ffd9dfb2ee8 sscanf 26 API calls 20499->20500 20501 7ffd9dfab461 20500->20501 20501->20464 20503 7ffd9dfa8689 20502->20503 20504 7ffd9dfa86b2 20503->20504 20505 7ffd9dfabd84 sscanf 29 API calls 20503->20505 20504->20464 20505->20503 20507 7ffd9dfab5ae sscanf 20506->20507 20508 7ffd9dfab5a1 20506->20508 20510 7ffd9dfab5db 20507->20510 20511 7ffd9dfab5f4 20507->20511 20509 7ffd9dfa8674 sscanf 29 API calls 20508->20509 20509->20507 20513 7ffd9dfab5e1 20510->20513 20514 7ffd9dfa8488 sscanf 27 API calls 20510->20514 20512 7ffd9dfa82cc sscanf 23 API calls 20511->20512 20512->20513 20513->20498 20514->20513 20516 7ffd9dfa84f1 20515->20516 20517 7ffd9dfa84b0 20515->20517 20520 7ffd9dfa850f 20516->20520 20524 7ffd9dfa84d8 20516->20524 20556 7ffd9dfabb4c 20516->20556 20517->20516 20518 7ffd9dfa84c8 20517->20518 20519 7ffd9dfa41e0 memcpy_s 14 API calls 20518->20519 20521 7ffd9dfa84cd 20519->20521 20522 7ffd9dfa41e0 memcpy_s 14 API calls 20520->20522 20523 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20521->20523 20522->20524 20523->20524 20524->20498 20527 7ffd9dfa82f8 20526->20527 20530 7ffd9dfa8341 20526->20530 20528 7ffd9dfa8310 20527->20528 20527->20530 20529 7ffd9dfa41e0 memcpy_s 14 API calls 20528->20529 20531 7ffd9dfa8315 20529->20531 20533 7ffd9dfa41e0 memcpy_s 14 API calls 20530->20533 20534 7ffd9dfa8320 20530->20534 20532 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20531->20532 20532->20534 20533->20534 20534->20498 20536 7ffd9dfabc09 20535->20536 20540 7ffd9dfabc19 sscanf 20535->20540 20537 7ffd9dfa41e0 memcpy_s 14 API calls 20536->20537 20538 7ffd9dfabc0e 20537->20538 20539 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20538->20539 20539->20540 20540->20498 20542 7ffd9dfa8674 sscanf 29 API calls 20541->20542 20543 7ffd9dfab33e sscanf 20542->20543 20544 7ffd9dfab36b 20543->20544 20545 7ffd9dfab37f 20543->20545 20546 7ffd9dfab371 20544->20546 20595 7ffd9dfa8224 20544->20595 20602 7ffd9dfa8180 20545->20602 20546->20498 20550 7ffd9dfa8674 sscanf 29 API calls 20549->20550 20551 7ffd9dfab3c0 20550->20551 20691 7ffd9dfa7d74 20551->20691 20554 7ffd9dfab41c 20554->20498 20555 7ffd9dfabbe4 sscanf 23 API calls 20555->20554 20561 7ffd9dfb2ee8 20556->20561 20562 7ffd9dfb0440 __FrameHandler3::FrameUnwindToState 26 API calls 20561->20562 20563 7ffd9dfb2ef1 20562->20563 20564 7ffd9dfb1064 wcsftime 26 API calls 20563->20564 20565 7ffd9dfabb74 20564->20565 20566 7ffd9dfb1a90 20565->20566 20567 7ffd9dfb1ab8 20566->20567 20573 7ffd9dfabbba 20566->20573 20568 7ffd9dfa43d4 wcsftime 26 API calls 20567->20568 20567->20573 20569 7ffd9dfb1ae4 20568->20569 20570 7ffd9dfb1b14 20569->20570 20571 7ffd9dfb1af2 20569->20571 20570->20573 20585 7ffd9dfba154 20570->20585 20582 7ffd9dfba1a0 20571->20582 20573->20516 20576 7ffd9dfb1b58 20579 7ffd9dfb1b8d 20576->20579 20588 7ffd9dfb389c 20576->20588 20577 7ffd9dfb1baa 20578 7ffd9dfb389c wcsftime MultiByteToWideChar 20577->20578 20578->20579 20579->20573 20581 7ffd9dfa41e0 memcpy_s 14 API calls 20579->20581 20581->20573 20591 7ffd9dfbee24 20582->20591 20584 7ffd9dfba1b3 20584->20573 20586 7ffd9dfa43d4 wcsftime 26 API calls 20585->20586 20587 7ffd9dfb1b54 20586->20587 20587->20576 20587->20577 20589 7ffd9dfb38a4 MultiByteToWideChar 20588->20589 20593 7ffd9dfbee8d 20591->20593 20594 7ffd9dfbee81 _handle_error 20591->20594 20592 7ffd9dfa41e0 memcpy_s 14 API calls 20592->20594 20593->20592 20593->20594 20594->20584 20609 7ffd9dfa6af8 20595->20609 20597 7ffd9dfa8270 20598 7ffd9dfa8280 20597->20598 20599 7ffd9dfa41e0 memcpy_s 14 API calls 20597->20599 20598->20546 20600 7ffd9dfa82a1 20599->20600 20601 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20600->20601 20601->20598 20676 7ffd9dfa6a50 20602->20676 20604 7ffd9dfa81cc 20605 7ffd9dfa81dc 20604->20605 20606 7ffd9dfa41e0 memcpy_s 14 API calls 20604->20606 20605->20546 20607 7ffd9dfa81fd 20606->20607 20608 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20607->20608 20608->20605 20610 7ffd9dfa6b27 20609->20610 20611 7ffd9dfa6b22 20609->20611 20613 7ffd9dfa41e0 memcpy_s 14 API calls 20610->20613 20611->20610 20612 7ffd9dfa6b51 20611->20612 20620 7ffd9dfa6ba0 20612->20620 20615 7ffd9dfa6b2c 20613->20615 20617 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20615->20617 20616 7ffd9dfa6b5b 20631 7ffd9dfa7b94 20616->20631 20619 7ffd9dfa6b37 _handle_error 20617->20619 20619->20597 20621 7ffd9dfa6bca 20620->20621 20622 7ffd9dfa6bd0 20620->20622 20621->20622 20626 7ffd9dfa6bea 20621->20626 20623 7ffd9dfa41e0 memcpy_s 14 API calls 20622->20623 20624 7ffd9dfa6bd5 20623->20624 20625 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20624->20625 20630 7ffd9dfa6be0 sscanf 20625->20630 20635 7ffd9dfabd84 20626->20635 20628 7ffd9dfa6c38 20629 7ffd9dfabd84 sscanf 29 API calls 20628->20629 20628->20630 20629->20628 20630->20616 20632 7ffd9dfa7ba4 20631->20632 20634 7ffd9dfa7bb2 sscanf 20631->20634 20632->20634 20641 7ffd9dfa8e14 20632->20641 20634->20619 20636 7ffd9dfabda7 20635->20636 20637 7ffd9dfabdd0 20635->20637 20639 7ffd9dfabdb2 20636->20639 20640 7ffd9dfb2f18 sscanf 29 API calls 20636->20640 20638 7ffd9dfb2ee8 sscanf 26 API calls 20637->20638 20638->20639 20639->20628 20640->20639 20654 7ffd9dfa93de memcpy_s 20641->20654 20659 7ffd9dfa8ec9 memcpy_s 20641->20659 20642 7ffd9dfaa560 20643 7ffd9dfaa585 20642->20643 20646 7ffd9dfaa5f5 20642->20646 20660 7ffd9dfaa5a6 20642->20660 20644 7ffd9dfabdfc memcpy_s 23 API calls 20643->20644 20644->20660 20645 7ffd9dfa98ff 20647 7ffd9dfabdfc 23 API calls memcpy_s 20645->20647 20666 7ffd9dfaa0c6 memcpy_s 20645->20666 20673 7ffd9dfa9bf1 memcpy_s 20645->20673 20675 7ffd9dfa99b1 sscanf _handle_error 20645->20675 20646->20646 20653 7ffd9dfaa5f0 20646->20653 20646->20660 20647->20645 20648 7ffd9dfabdfc memcpy_s 23 API calls 20652 7ffd9dfa9ff8 20648->20652 20649 7ffd9dfa9f75 20649->20648 20649->20652 20650 7ffd9dfabdfc 23 API calls memcpy_s 20650->20666 20651 7ffd9dfa41e0 14 API calls memcpy_s 20651->20654 20655 7ffd9dfabdfc memcpy_s 23 API calls 20652->20655 20652->20666 20658 7ffd9dfabdfc memcpy_s 23 API calls 20653->20658 20654->20645 20654->20651 20657 7ffd9dfa4090 23 API calls _invalid_parameter_noinfo 20654->20657 20654->20675 20655->20666 20656 7ffd9dfa41e0 14 API calls memcpy_s 20656->20659 20657->20654 20661 7ffd9dfaa689 20658->20661 20659->20654 20659->20656 20662 7ffd9dfa4090 23 API calls _invalid_parameter_noinfo 20659->20662 20663 7ffd9dfabdfc memcpy_s 23 API calls 20660->20663 20672 7ffd9dfaa7b7 20660->20672 20664 7ffd9dfaa6c1 20661->20664 20665 7ffd9dfaa6a2 20661->20665 20662->20659 20663->20672 20668 7ffd9dfa88cc sscanf 9 API calls 20664->20668 20667 7ffd9dfa8890 sscanf 9 API calls 20665->20667 20666->20642 20666->20650 20666->20653 20667->20675 20668->20675 20669 7ffd9dfabdfc memcpy_s 23 API calls 20674 7ffd9dfaa9a7 20669->20674 20670 7ffd9dfabdfc 23 API calls memcpy_s 20670->20673 20671 7ffd9dfaac50 swprintf 23 API calls 20671->20675 20672->20669 20672->20674 20672->20675 20673->20649 20673->20666 20673->20670 20674->20671 20675->20634 20677 7ffd9dfa6a7a 20676->20677 20678 7ffd9dfa6a7f 20676->20678 20677->20678 20679 7ffd9dfa6aa9 20677->20679 20680 7ffd9dfa41e0 memcpy_s 14 API calls 20678->20680 20682 7ffd9dfa6ba0 sscanf 29 API calls 20679->20682 20681 7ffd9dfa6a84 20680->20681 20683 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20681->20683 20684 7ffd9dfa6ab3 20682->20684 20686 7ffd9dfa6a8f _handle_error 20683->20686 20687 7ffd9dfa7a24 20684->20687 20686->20604 20688 7ffd9dfa7a34 20687->20688 20690 7ffd9dfa7a42 sscanf 20687->20690 20689 7ffd9dfa8e14 sscanf 23 API calls 20688->20689 20688->20690 20689->20690 20690->20686 20692 7ffd9dfa7da8 20691->20692 20693 7ffd9dfa7da2 20691->20693 20694 7ffd9dfa41e0 memcpy_s 14 API calls 20692->20694 20693->20692 20696 7ffd9dfa7dca 20693->20696 20695 7ffd9dfa7dad 20694->20695 20697 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20695->20697 20698 7ffd9dfa43d4 wcsftime 26 API calls 20696->20698 20703 7ffd9dfa7db8 20697->20703 20699 7ffd9dfa7dd7 20698->20699 20700 7ffd9dfabd84 sscanf 29 API calls 20699->20700 20701 7ffd9dfa7e2e sscanf 20699->20701 20700->20699 20702 7ffd9dfa41e0 memcpy_s 14 API calls 20701->20702 20701->20703 20702->20703 20703->20554 20703->20555 20705 7ffd9dfb3037 20704->20705 20706 7ffd9dfa8724 20704->20706 20707 7ffd9dfa43d4 wcsftime 26 API calls 20705->20707 20706->20469 20706->20470 20708 7ffd9dfb3043 20707->20708 20709 7ffd9dfabd84 sscanf 29 API calls 20708->20709 20709->20706 20711 7ffd9dfab7cd 20710->20711 20713 7ffd9dfab7fd 20711->20713 20714 7ffd9dfb1a64 20711->20714 20713->20478 20715 7ffd9dfb1a77 20714->20715 20718 7ffd9dfac3c8 20715->20718 20719 7ffd9dfac3ef 20718->20719 20720 7ffd9dfac404 20718->20720 20721 7ffd9dfa41e0 memcpy_s 14 API calls 20719->20721 20720->20719 20722 7ffd9dfac412 20720->20722 20723 7ffd9dfac3f4 20721->20723 20724 7ffd9dfa43d4 wcsftime 26 API calls 20722->20724 20725 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20723->20725 20727 7ffd9dfac41f 20724->20727 20738 7ffd9dfac3ff 20725->20738 20726 7ffd9dfabd84 sscanf 29 API calls 20726->20727 20727->20726 20728 7ffd9dfac44f 20727->20728 20729 7ffd9dfac4b6 20728->20729 20730 7ffd9dfa41e0 memcpy_s 14 API calls 20728->20730 20731 7ffd9dfa41e0 memcpy_s 14 API calls 20729->20731 20733 7ffd9dfac5b8 sscanf 20729->20733 20732 7ffd9dfac4f2 20730->20732 20734 7ffd9dfac5ad 20731->20734 20735 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20732->20735 20737 7ffd9dfa41e0 memcpy_s 14 API calls 20733->20737 20733->20738 20736 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20734->20736 20735->20729 20736->20733 20737->20738 20738->20713 20740 7ffd9df9c770 20739->20740 20741 7ffd9df9c818 20740->20741 20742 7ffd9df9c79c GetLastError 20740->20742 20743 7ffd9df9c80d CloseHandle 20740->20743 20741->20072 20741->20081 20742->20743 20744 7ffd9df9c7a7 LocalAlloc 20742->20744 20743->20741 20744->20743 20745 7ffd9df9c7bb LocalFree 20744->20745 20745->20743 20751 7ffd9df9dab8 20747->20751 20750 7ffd9df9d6ec 20750->20072 20752 7ffd9df9d6b5 lstrlenA RegOpenKeyExA 20751->20752 20752->20750 20754 7ffd9dfabe92 20753->20754 20756 7ffd9dfabeaa 20753->20756 20755 7ffd9dfa41e0 memcpy_s 14 API calls 20754->20755 20758 7ffd9dfabe97 20755->20758 20757 7ffd9dfabea2 20756->20757 20761 7ffd9dfb0d24 20756->20761 20757->19971 20760 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20758->20760 20760->20757 20762 7ffd9dfb0800 try_get_function 5 API calls 20761->20762 20763 7ffd9dfb0d4c GetSystemTimeAsFileTime 20762->20763 20766 7ffd9df9b401 memcpy_s _com_util::ConvertStringToBSTR 20765->20766 20767 7ffd9df9b470 GetModuleHandleA 20766->20767 20768 7ffd9df9b481 GetModuleFileNameA 20766->20768 20767->20768 20773 7ffd9df9b4ac _handle_error 20767->20773 20769 7ffd9df9b494 20768->20769 20768->20773 20770 7ffd9df9b4cf GetLongPathNameA 20769->20770 20771 7ffd9df9b4a2 GetShortPathNameA 20769->20771 20772 7ffd9df9b4a8 20770->20772 20771->20772 20772->20773 20790 7ffd9dfad838 20772->20790 20773->20098 20775 7ffd9df9b544 20777 7ffd9dfabf58 __std_exception_copy 23 API calls 20775->20777 20779 7ffd9df9b55b 20777->20779 20778 7ffd9df9b575 20793 7ffd9df9fa54 20778->20793 20780 7ffd9dfabfb8 _scwprintf 23 API calls 20779->20780 20780->20773 20784 7ffd9df9672a _snwprintf_s 20783->20784 20843 7ffd9dfa6888 20784->20843 21202 7ffd9dfaca4c 20787->21202 20796 7ffd9dfad568 20790->20796 20833 7ffd9df9fa68 20793->20833 20797 7ffd9dfad7b7 20796->20797 20798 7ffd9dfad592 20796->20798 20799 7ffd9dfa41e0 memcpy_s 14 API calls 20797->20799 20798->20797 20802 7ffd9dfad610 20798->20802 20800 7ffd9dfad811 20799->20800 20801 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20800->20801 20811 7ffd9df9b515 20801->20811 20807 7ffd9dfad635 20802->20807 20810 7ffd9dfad680 20802->20810 20820 7ffd9dfb40b0 20802->20820 20805 7ffd9dfad716 20808 7ffd9dfad787 20805->20808 20813 7ffd9dfad731 20805->20813 20806 7ffd9dfad6d1 20806->20805 20806->20807 20809 7ffd9dfb40b0 _scwprintf 23 API calls 20806->20809 20812 7ffd9dfa41e0 memcpy_s 14 API calls 20807->20812 20808->20807 20808->20811 20814 7ffd9dfad79c 20808->20814 20809->20805 20810->20806 20829 7ffd9dfb41fc 20810->20829 20811->20775 20811->20778 20812->20811 20813->20807 20815 7ffd9dfad765 20813->20815 20817 7ffd9dfb40b0 _scwprintf 23 API calls 20813->20817 20816 7ffd9dfb40b0 _scwprintf 23 API calls 20814->20816 20815->20807 20815->20811 20818 7ffd9dfad77a 20815->20818 20816->20811 20817->20815 20819 7ffd9dfb40b0 _scwprintf 23 API calls 20818->20819 20819->20811 20824 7ffd9dfb40c8 20820->20824 20821 7ffd9dfb40cd 20822 7ffd9dfb40e3 20821->20822 20823 7ffd9dfa41e0 memcpy_s 14 API calls 20821->20823 20822->20810 20825 7ffd9dfb40d7 20823->20825 20824->20821 20824->20822 20827 7ffd9dfb4112 20824->20827 20826 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20825->20826 20826->20822 20827->20822 20828 7ffd9dfa41e0 memcpy_s 14 API calls 20827->20828 20828->20825 20830 7ffd9dfb4184 20829->20830 20831 7ffd9dfa43d4 wcsftime 26 API calls 20830->20831 20832 7ffd9dfb41a8 20831->20832 20832->20810 20834 7ffd9df9fa7a 20833->20834 20839 7ffd9df9fb04 RtlCaptureContext RtlLookupFunctionEntry 20834->20839 20840 7ffd9df9fa92 20839->20840 20841 7ffd9df9fb34 RtlVirtualUnwind 20839->20841 20842 7ffd9df9f94c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20840->20842 20841->20840 20844 7ffd9dfa68b4 20843->20844 20848 7ffd9dfa68cd 20843->20848 20845 7ffd9dfa41e0 memcpy_s 14 API calls 20844->20845 20846 7ffd9dfa68b9 20845->20846 20847 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20846->20847 20868 7ffd9df9674b LoadLibraryA 20847->20868 20849 7ffd9dfa41e0 memcpy_s 14 API calls 20848->20849 20848->20868 20850 7ffd9dfa68fb 20849->20850 20850->20846 20851 7ffd9dfa68ff 20850->20851 20852 7ffd9dfa6956 20851->20852 20853 7ffd9dfa692d 20851->20853 20854 7ffd9dfa4830 swprintf 32 API calls 20852->20854 20871 7ffd9dfa4830 20853->20871 20857 7ffd9dfa695e 20854->20857 20856 7ffd9dfa6936 20858 7ffd9dfa693b 20856->20858 20859 7ffd9dfa6981 20856->20859 20857->20859 20861 7ffd9dfa696d 20857->20861 20860 7ffd9dfa41e0 memcpy_s 14 API calls 20858->20860 20864 7ffd9dfa41e0 memcpy_s 14 API calls 20859->20864 20859->20868 20862 7ffd9dfa6940 20860->20862 20863 7ffd9dfa41e0 memcpy_s 14 API calls 20861->20863 20866 7ffd9dfa41e0 memcpy_s 14 API calls 20862->20866 20862->20868 20865 7ffd9dfa6972 20863->20865 20867 7ffd9dfa6992 20864->20867 20865->20868 20870 7ffd9dfa41e0 memcpy_s 14 API calls 20865->20870 20866->20868 20869 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20867->20869 20868->20104 20869->20868 20870->20868 20872 7ffd9dfa4887 20871->20872 20873 7ffd9dfa486f 20871->20873 20872->20873 20875 7ffd9dfa4891 20872->20875 20874 7ffd9dfa41e0 memcpy_s 14 API calls 20873->20874 20876 7ffd9dfa4874 20874->20876 20877 7ffd9dfa43d4 wcsftime 26 API calls 20875->20877 20879 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20876->20879 20878 7ffd9dfa48a2 20877->20878 20884 7ffd9dfa5128 20878->20884 20881 7ffd9dfa487f _handle_error 20879->20881 20881->20856 20882 7ffd9dfb0044 __free_lconv_mon 14 API calls 20882->20881 20885 7ffd9dfa532c 20884->20885 20886 7ffd9dfa5151 20884->20886 20887 7ffd9dfa41e0 memcpy_s 14 API calls 20885->20887 20888 7ffd9dfa5157 20886->20888 20897 7ffd9dfa516e 20886->20897 20890 7ffd9dfa5331 20887->20890 20891 7ffd9dfa41e0 memcpy_s 14 API calls 20888->20891 20889 7ffd9dfa4941 20889->20882 20892 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20890->20892 20893 7ffd9dfa515c 20891->20893 20892->20889 20894 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20893->20894 20894->20889 20897->20885 20897->20889 20900 7ffd9dfa5adc 20897->20900 20916 7ffd9dfa56e4 20897->20916 20938 7ffd9dfa4e5c 20897->20938 20946 7ffd9dfa53b0 20897->20946 20901 7ffd9dfa5b63 20900->20901 20905 7ffd9dfa5b0d 20900->20905 20902 7ffd9dfa5b67 20901->20902 20903 7ffd9dfa5be2 20901->20903 20906 7ffd9dfa5bc8 20902->20906 20911 7ffd9dfa5b6f 20902->20911 20972 7ffd9dfa5db8 20903->20972 20905->20903 20908 7ffd9dfa5beb swprintf 20905->20908 20905->20911 20912 7ffd9dfa5b39 20905->20912 20913 7ffd9dfa5b45 20905->20913 20914 7ffd9dfa5b54 swprintf 20905->20914 20957 7ffd9dfa6254 20906->20957 20908->20897 20911->20908 20911->20914 20963 7ffd9dfa608c 20911->20963 20912->20903 20912->20913 20912->20914 20913->20908 20953 7ffd9dfa5fd0 20913->20953 20914->20908 20978 7ffd9dfa6588 20914->20978 20917 7ffd9dfa5708 20916->20917 20918 7ffd9dfa56ef 20916->20918 20919 7ffd9dfa572c 20917->20919 20920 7ffd9dfa41e0 memcpy_s 14 API calls 20917->20920 20918->20919 20921 7ffd9dfa5b63 20918->20921 20927 7ffd9dfa5b0d 20918->20927 20919->20897 20922 7ffd9dfa5721 20920->20922 20923 7ffd9dfa5b67 20921->20923 20924 7ffd9dfa5be2 20921->20924 20926 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20922->20926 20928 7ffd9dfa5bc8 20923->20928 20932 7ffd9dfa5b6f 20923->20932 20925 7ffd9dfa5db8 swprintf 28 API calls 20924->20925 20936 7ffd9dfa5b54 swprintf 20925->20936 20926->20919 20927->20924 20930 7ffd9dfa5beb swprintf 20927->20930 20927->20932 20934 7ffd9dfa5b39 20927->20934 20935 7ffd9dfa5b45 20927->20935 20927->20936 20931 7ffd9dfa6254 swprintf 23 API calls 20928->20931 20929 7ffd9dfa5fd0 swprintf 28 API calls 20929->20936 20930->20897 20931->20936 20932->20930 20933 7ffd9dfa608c swprintf 24 API calls 20932->20933 20932->20936 20933->20936 20934->20924 20934->20935 20934->20936 20935->20929 20935->20930 20936->20930 20937 7ffd9dfa6588 swprintf 28 API calls 20936->20937 20937->20930 20939 7ffd9dfa4e7d 20938->20939 20942 7ffd9dfa4e82 20938->20942 20940 7ffd9dfa41e0 memcpy_s 14 API calls 20939->20940 20940->20942 21171 7ffd9dfb1a38 20942->21171 20944 7ffd9dfa41e0 memcpy_s 14 API calls 20945 7ffd9dfa4ebf 20944->20945 20945->20897 21196 7ffd9dfa54c8 20946->21196 20949 7ffd9dfa53c4 20949->20897 20950 7ffd9dfa41e0 memcpy_s 14 API calls 20951 7ffd9dfa5411 20950->20951 20952 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20951->20952 20952->20949 20955 7ffd9dfa5fe1 20953->20955 20954 7ffd9dfa603c 20954->20914 20955->20954 20982 7ffd9dfb1db4 20955->20982 20958 7ffd9dfa627c swprintf 20957->20958 20959 7ffd9dfa41e0 memcpy_s 14 API calls 20958->20959 20962 7ffd9dfa6290 20958->20962 20960 7ffd9dfa6285 20959->20960 20961 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20960->20961 20961->20962 20962->20914 20964 7ffd9dfa60be 20963->20964 20965 7ffd9dfa6138 20964->20965 20966 7ffd9dfa60f9 20964->20966 20971 7ffd9dfa6109 swprintf 20965->20971 21017 7ffd9dfa49fc 20965->21017 20967 7ffd9dfa41e0 memcpy_s 14 API calls 20966->20967 20969 7ffd9dfa60fe 20967->20969 20970 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20969->20970 20970->20971 20971->20914 20973 7ffd9dfa5dd0 20972->20973 20974 7ffd9dfa49fc swprintf 15 API calls 20973->20974 20975 7ffd9dfa5e16 20974->20975 21034 7ffd9dfb2660 20975->21034 20977 7ffd9dfa5edc swprintf 20977->20914 20979 7ffd9dfa6615 _handle_error swprintf 20978->20979 20980 7ffd9dfa65af swprintf 20978->20980 20979->20908 20980->20979 20981 7ffd9dfb1db4 swprintf 28 API calls 20980->20981 20981->20980 20985 7ffd9dfb1c18 20982->20985 20986 7ffd9dfb1c3b 20985->20986 20987 7ffd9dfb1c40 20986->20987 20988 7ffd9dfb1c75 20986->20988 20989 7ffd9dfb1c5f 20986->20989 20987->20954 20990 7ffd9dfa43d4 wcsftime 26 API calls 20988->20990 20991 7ffd9dfa41e0 memcpy_s 14 API calls 20989->20991 20992 7ffd9dfb1c82 20990->20992 20993 7ffd9dfb1c64 20991->20993 20994 7ffd9dfb1cbf 20992->20994 20995 7ffd9dfb1c91 20992->20995 20996 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 20993->20996 20998 7ffd9dfb1cc9 20994->20998 21014 7ffd9dfb3118 20994->21014 21010 7ffd9dfba354 20995->21010 20996->20987 21000 7ffd9dfb1cd7 memcpy_s 20998->21000 21001 7ffd9dfb1d1d memcpy_s 20998->21001 21000->20987 21005 7ffd9dfa41e0 memcpy_s 14 API calls 21000->21005 21001->20987 21007 7ffd9dfa41e0 memcpy_s 14 API calls 21001->21007 21005->20987 21006 7ffd9dfa41e0 memcpy_s 14 API calls 21006->20987 21008 7ffd9dfb1da3 21007->21008 21011 7ffd9dfb1ca6 21010->21011 21012 7ffd9dfba36b 21010->21012 21011->20987 21011->21006 21012->21011 21013 7ffd9dfa41e0 memcpy_s 14 API calls 21012->21013 21013->21011 21015 7ffd9dfb3134 WideCharToMultiByte 21014->21015 21018 7ffd9dfa4a22 21017->21018 21019 7ffd9dfa4a31 21017->21019 21020 7ffd9dfa41e0 memcpy_s 14 API calls 21018->21020 21026 7ffd9dfa4a27 21019->21026 21027 7ffd9dfb06e8 21019->21027 21020->21026 21023 7ffd9dfa4a72 21025 7ffd9dfb0044 __free_lconv_mon 14 API calls 21023->21025 21024 7ffd9dfb0044 __free_lconv_mon 14 API calls 21024->21023 21025->21026 21026->20971 21028 7ffd9dfb0733 21027->21028 21032 7ffd9dfb06f7 wcsftime 21027->21032 21029 7ffd9dfa41e0 memcpy_s 14 API calls 21028->21029 21031 7ffd9dfa4a5e 21029->21031 21030 7ffd9dfb071a HeapAlloc 21030->21031 21030->21032 21031->21023 21031->21024 21032->21028 21032->21030 21033 7ffd9dfafdb8 wcsftime 2 API calls 21032->21033 21033->21032 21035 7ffd9dfb2685 21034->21035 21036 7ffd9dfb269d 21034->21036 21037 7ffd9dfa41e0 memcpy_s 14 API calls 21035->21037 21036->21035 21040 7ffd9dfb26b4 21036->21040 21038 7ffd9dfb268a 21037->21038 21039 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 21038->21039 21048 7ffd9dfb2696 21039->21048 21045 7ffd9dfb27c2 21040->21045 21055 7ffd9dfb26fc 21040->21055 21041 7ffd9dfb2901 21121 7ffd9dfb1dc8 21041->21121 21042 7ffd9dfb28c8 21114 7ffd9dfb2138 21042->21114 21044 7ffd9dfb283b 21072 7ffd9dfba4f4 21044->21072 21045->21041 21045->21042 21045->21044 21047 7ffd9dfb27ff 21045->21047 21050 7ffd9dfb27f1 21045->21050 21062 7ffd9dfb252c 21047->21062 21048->20977 21050->21042 21053 7ffd9dfb27fa 21050->21053 21053->21044 21053->21047 21055->21048 21057 7ffd9dfabf58 __std_exception_copy 23 API calls 21055->21057 21059 7ffd9dfb27b1 21057->21059 21059->21048 21060 7ffd9dfa40e0 _invalid_parameter_noinfo_noreturn 9 API calls 21059->21060 21061 7ffd9dfb2963 21060->21061 21063 7ffd9dfba4f4 swprintf 24 API calls 21062->21063 21064 7ffd9dfb2570 21063->21064 21065 7ffd9dfba410 swprintf 23 API calls 21064->21065 21075 7ffd9dfba542 fegetenv swprintf 21072->21075 21073 7ffd9dfba5a3 21075->21073 21078 7ffd9dfba622 21075->21078 21115 7ffd9dfba4f4 swprintf 24 API calls 21114->21115 21116 7ffd9dfb2182 21115->21116 21122 7ffd9dfa43d4 wcsftime 26 API calls 21121->21122 21123 7ffd9dfb1e16 21122->21123 21124 7ffd9dfb1e36 21123->21124 21125 7ffd9dfb1e21 21123->21125 21172 7ffd9dfb1a4b 21171->21172 21175 7ffd9dfac0c0 21172->21175 21176 7ffd9dfac0ec 21175->21176 21177 7ffd9dfac101 21175->21177 21178 7ffd9dfa41e0 memcpy_s 14 API calls 21176->21178 21177->21176 21179 7ffd9dfac10f 21177->21179 21180 7ffd9dfac0f1 21178->21180 21181 7ffd9dfa43d4 wcsftime 26 API calls 21179->21181 21182 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 21180->21182 21184 7ffd9dfac11c 21181->21184 21195 7ffd9dfa4eae 21182->21195 21183 7ffd9dfabd84 sscanf 29 API calls 21183->21184 21184->21183 21185 7ffd9dfac14e 21184->21185 21186 7ffd9dfac1b9 21185->21186 21188 7ffd9dfa41e0 memcpy_s 14 API calls 21185->21188 21187 7ffd9dfa41e0 memcpy_s 14 API calls 21186->21187 21190 7ffd9dfac2b4 21186->21190 21192 7ffd9dfac2a9 21187->21192 21189 7ffd9dfac1f5 21188->21189 21193 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 21189->21193 21191 7ffd9dfa41e0 memcpy_s 14 API calls 21190->21191 21190->21195 21191->21195 21194 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 21192->21194 21193->21186 21194->21190 21195->20944 21195->20945 21198 7ffd9dfa54e1 21196->21198 21197 7ffd9dfa53c0 21197->20949 21197->20950 21198->21197 21199 7ffd9dfa41e0 memcpy_s 14 API calls 21198->21199 21200 7ffd9dfa555a 21199->21200 21201 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 21200->21201 21201->21197 21206 7ffd9dfaca75 21202->21206 21203 7ffd9dfacacb 21204 7ffd9dfa41e0 memcpy_s 14 API calls 21203->21204 21205 7ffd9dfacad0 21204->21205 21208 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 21205->21208 21206->21203 21207 7ffd9dfaca9f 21206->21207 21216 7ffd9dfac6e4 21207->21216 21212 7ffd9df96f13 FreeLibrary 21208->21212 21210 7ffd9dfacaaf 21211 7ffd9dfacab5 21210->21211 21214 7ffd9dfacae0 21210->21214 21213 7ffd9dfa41e0 memcpy_s 14 API calls 21211->21213 21212->20101 21213->21212 21214->21212 21215 7ffd9dfa41e0 memcpy_s 14 API calls 21214->21215 21215->21205 21217 7ffd9dfac72a 21216->21217 21218 7ffd9dfac73b 21217->21218 21219 7ffd9dfac754 21217->21219 21227 7ffd9dfac72f _handle_error 21217->21227 21220 7ffd9dfa41e0 memcpy_s 14 API calls 21218->21220 21221 7ffd9dfa43d4 wcsftime 26 API calls 21219->21221 21222 7ffd9dfac740 21220->21222 21223 7ffd9dfac760 21221->21223 21224 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 21222->21224 21225 7ffd9dfac791 21223->21225 21226 7ffd9dfac772 21223->21226 21224->21227 21229 7ffd9dfac986 21225->21229 21230 7ffd9dfac79a 21225->21230 21247 7ffd9dfb31b0 21226->21247 21227->21210 21231 7ffd9dfac9ca 21229->21231 21235 7ffd9dfac98f 21229->21235 21233 7ffd9dfac86e 21230->21233 21236 7ffd9dfac7a3 21230->21236 21244 7ffd9dfac7f9 21230->21244 21232 7ffd9dfb3118 wcsftime WideCharToMultiByte 21231->21232 21237 7ffd9dfac89d 21232->21237 21234 7ffd9dfb3118 wcsftime WideCharToMultiByte 21233->21234 21238 7ffd9dfac896 21234->21238 21235->21227 21242 7ffd9dfa41e0 memcpy_s 14 API calls 21235->21242 21236->21227 21240 7ffd9dfa41e0 memcpy_s 14 API calls 21236->21240 21237->21227 21241 7ffd9dfa41e0 memcpy_s 14 API calls 21237->21241 21238->21237 21243 7ffd9dfac8ba GetLastError 21238->21243 21239 7ffd9dfb3118 wcsftime WideCharToMultiByte 21239->21236 21240->21227 21241->21227 21242->21227 21243->21237 21246 7ffd9dfac8c9 21243->21246 21244->21239 21245 7ffd9dfb3118 wcsftime WideCharToMultiByte 21245->21246 21246->21227 21246->21237 21246->21245 21250 7ffd9dfb3273 21247->21250 21252 7ffd9dfb31f0 memcpy_s 21247->21252 21248 7ffd9dfbbe10 _Wcsftime 14 API calls 21248->21250 21250->21248 21251 7ffd9dfb3259 _handle_error 21250->21251 21251->21227 21252->21251 21253 7ffd9dfbbe10 21252->21253 21254 7ffd9dfbbe3a 21253->21254 21255 7ffd9dfa41e0 memcpy_s 14 API calls 21254->21255 21256 7ffd9dfbbe48 _Wcsftime 21254->21256 21255->21256 21256->21252 21258 7ffd9df93af6 21257->21258 21259 7ffd9df93b0f RegOpenKeyExA 21257->21259 21262 7ffd9df941fc 21258->21262 21261 7ffd9df91d2a 21259->21261 21261->20118 21261->20120 21263 7ffd9df94222 GetModuleHandleA 21262->21263 21264 7ffd9df94273 21262->21264 21265 7ffd9df94249 21263->21265 21266 7ffd9df94234 GetProcAddress 21263->21266 21264->21265 21267 7ffd9df94279 RegOpenKeyExA 21264->21267 21265->21261 21266->21265 21267->21265 21269 7ffd9dfa6a06 21268->21269 21270 7ffd9dfa69ca 21268->21270 21271 7ffd9dfa41e0 memcpy_s 14 API calls 21269->21271 21270->21269 21273 7ffd9dfa69d4 21270->21273 21272 7ffd9dfa69fe 21271->21272 21275 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 21272->21275 21274 7ffd9dfa4830 swprintf 32 API calls 21273->21274 21276 7ffd9dfa69ed 21274->21276 21277 7ffd9df919ff 21275->21277 21276->21277 21278 7ffd9dfa41e0 memcpy_s 14 API calls 21276->21278 21277->20002 21278->21272 21528 7ffd9df93ad0 4 API calls 21527->21528 21529 7ffd9df9b7d1 21528->21529 21530 7ffd9df9b7d9 StringFromCLSID 21529->21530 21541 7ffd9df96f86 21529->21541 21531 7ffd9df9b7f6 21530->21531 21530->21541 21543 7ffd9df9a350 21531->21543 21533 7ffd9df9b803 CoTaskMemFree 21534 7ffd9df9b816 21533->21534 21535 7ffd9df9b827 21533->21535 21534->21535 21548 7ffd9dfa0910 21534->21548 21537 7ffd9df93ad0 4 API calls 21535->21537 21538 7ffd9df9b845 21537->21538 21539 7ffd9df93ad0 4 API calls 21538->21539 21542 7ffd9df9b863 21538->21542 21539->21542 21541->20170 21541->20171 21559 7ffd9df9a524 21542->21559 21563 7ffd9df9fe50 21543->21563 21546 7ffd9df9a386 SysAllocString 21547 7ffd9df9a3a3 _com_util::ConvertStringToBSTR 21546->21547 21547->21533 21549 7ffd9dfa093b 21548->21549 21550 7ffd9dfa0958 21548->21550 21549->21535 21550->21550 21551 7ffd9dfa096b WideCharToMultiByte 21550->21551 21552 7ffd9dfa09e6 GetLastError 21551->21552 21553 7ffd9dfa099a 21551->21553 21556 7ffd9dfa09f0 Concurrency::details::_Concurrent_queue_iterator_base_v4::~_Concurrent_queue_iterator_base_v4 _com_util::ConvertStringToBSTR 21552->21556 21554 7ffd9dfa09aa WideCharToMultiByte 21553->21554 21555 7ffd9dfa09db _com_util::ConvertStringToBSTR 21553->21555 21554->21549 21554->21556 21555->21552 21557 7ffd9dfa0a08 GetLastError 21556->21557 21558 7ffd9dfa0a12 _com_util::ConvertStringToBSTR 21557->21558 21560 7ffd9df9a539 21559->21560 21561 7ffd9df9a55d Concurrency::details::_Concurrent_queue_iterator_base_v4::~_Concurrent_queue_iterator_base_v4 21559->21561 21560->21561 21562 7ffd9df9a553 SysFreeString 21560->21562 21561->21541 21562->21561 21566 7ffd9df9fe5b 21563->21566 21564 7ffd9df9a379 21564->21546 21564->21547 21565 7ffd9dfafdb8 wcsftime 2 API calls 21565->21566 21566->21563 21566->21564 21566->21565 21569 7ffd9dfa0654 21566->21569 21573 7ffd9dfa0674 21566->21573 21570 7ffd9dfa0662 std::bad_alloc::bad_alloc 21569->21570 21577 7ffd9dfa1640 21570->21577 21572 7ffd9dfa0673 21574 7ffd9dfa0682 std::bad_alloc::bad_alloc 21573->21574 21575 7ffd9dfa1640 _CxxThrowException 2 API calls 21574->21575 21576 7ffd9dfa0693 21575->21576 21576->21566 21578 7ffd9dfa16a6 RtlPcToFileHeader 21577->21578 21579 7ffd9dfa1689 21577->21579 21580 7ffd9dfa16c8 21578->21580 21581 7ffd9dfa16d9 RaiseException 21578->21581 21579->21578 21580->21581 21581->21572 21604 7ffd9df9b584 21582->21604 21585 7ffd9df966c6 21587 7ffd9dfabfb8 _scwprintf 23 API calls 21585->21587 21586 7ffd9df966e0 21588 7ffd9df9b3e4 37 API calls 21586->21588 21589 7ffd9df964a4 21587->21589 21588->21589 21589->20175 21589->20178 21616 7ffd9df99f1c 21590->21616 21605 7ffd9df93ad0 4 API calls 21604->21605 21606 7ffd9df9b5ff 21605->21606 21607 7ffd9df93ad0 4 API calls 21606->21607 21608 7ffd9df966c0 21606->21608 21609 7ffd9df9b623 21607->21609 21608->21585 21608->21586 21609->21608 21610 7ffd9df93ad0 4 API calls 21609->21610 21611 7ffd9df9b641 21610->21611 21611->21608 21612 7ffd9df93ad0 4 API calls 21611->21612 21613 7ffd9df9b65e 21612->21613 21613->21608 21614 7ffd9df9b69c GetLongPathNameA 21613->21614 21615 7ffd9df9b68b GetShortPathNameA 21613->21615 21614->21608 21615->21608 21619 7ffd9df9be04 21616->21619 21648 7ffd9df9a2d8 21619->21648 21649 7ffd9df9fe50 4 API calls 21648->21649 21712 7ffd9df99f1c 47 API calls 21711->21712 21713 7ffd9df96bd5 21712->21713 21715 7ffd9df96bed 21713->21715 21729 7ffd9df996f4 RegOpenKeyExA 21713->21729 21724 7ffd9df96cb1 21715->21724 21736 7ffd9df9c3b8 21715->21736 21768 7ffd9df97988 CoInitialize 21715->21768 21716 7ffd9df9c3b8 43 API calls 21717 7ffd9df96cea 21716->21717 21719 7ffd9df96d1a 21717->21719 21721 7ffd9df97988 214 API calls 21717->21721 22008 7ffd9df9988c 21719->22008 21721->21719 21724->21716 21724->21719 21726 7ffd9df9c6b1 21725->21726 21727 7ffd9df9c6ac 21725->21727 21726->20190 22739 7ffd9dfae288 21727->22739 21730 7ffd9df99857 _handle_error 21729->21730 21733 7ffd9df9974e 21729->21733 21730->21715 21731 7ffd9df99797 lstrcmpiA 21731->21733 21733->21730 21733->21731 21734 7ffd9df963d8 swprintf 32 API calls 21733->21734 22050 7ffd9df9bb00 21733->22050 22061 7ffd9df9a0c4 21733->22061 21734->21733 21737 7ffd9df9c416 lstrlenA 21736->21737 21739 7ffd9df9c5b4 _handle_error 21736->21739 21738 7ffd9dfabf58 __std_exception_copy 23 API calls 21737->21738 21740 7ffd9df9c436 21738->21740 21739->21715 21741 7ffd9dfabf58 __std_exception_copy 23 API calls 21740->21741 21742 7ffd9df9c448 21741->21742 21743 7ffd9dfabf58 __std_exception_copy 23 API calls 21742->21743 21744 7ffd9df9c45a 21743->21744 21745 7ffd9dfabf58 __std_exception_copy 23 API calls 21744->21745 21746 7ffd9df9c46c 21745->21746 21747 7ffd9dfabf58 __std_exception_copy 23 API calls 21746->21747 21748 7ffd9df9c47a 21747->21748 21751 7ffd9df9c5ee 21748->21751 22105 7ffd9dfac6b8 21748->22105 21753 7ffd9df9fa54 7 API calls 21751->21753 21752 7ffd9dfabf58 __std_exception_copy 23 API calls 21754 7ffd9df9c5f3 21753->21754 21769 7ffd9df9a2d8 9 API calls 21768->21769 21770 7ffd9df97a08 21769->21770 22108 7ffd9dfaff88 21770->22108 21773 7ffd9df9a2d8 9 API calls 21774 7ffd9df97a34 21773->21774 21775 7ffd9df9a430 29 API calls 21774->21775 21776 7ffd9df97a45 21775->21776 21777 7ffd9df9a524 SysFreeString 21776->21777 21778 7ffd9df97a52 21777->21778 21779 7ffd9df9a2d8 9 API calls 21778->21779 21780 7ffd9df97a62 21779->21780 22658 7ffd9df99be4 22008->22658 22051 7ffd9df9bb21 memcpy_s _com_util::ConvertStringToBSTR 22050->22051 22052 7ffd9df963d8 swprintf 32 API calls 22051->22052 22053 7ffd9df9bb71 RegOpenKeyExA 22052->22053 22054 7ffd9df9bba0 memcpy_s 22053->22054 22060 7ffd9df9bc84 _handle_error 22053->22060 22055 7ffd9df963d8 swprintf 32 API calls 22054->22055 22054->22060 22056 7ffd9df9bc1c 22055->22056 22057 7ffd9df963d8 swprintf 32 API calls 22056->22057 22056->22060 22058 7ffd9df9bc51 22057->22058 22059 7ffd9df963d8 swprintf 32 API calls 22058->22059 22059->22060 22060->21733 22062 7ffd9df9a112 22061->22062 22063 7ffd9df9a1c1 22061->22063 22070 7ffd9df9a5a0 22062->22070 22085 7ffd9df9a58c 22063->22085 22067 7ffd9df9a14f memcpy_s 22080 7ffd9df9a49c 22067->22080 22069 7ffd9df9a1aa 22069->21733 22071 7ffd9df9a5c9 22070->22071 22072 7ffd9df9a5f2 22070->22072 22074 7ffd9df9fe50 4 API calls 22071->22074 22073 7ffd9df9a601 22072->22073 22075 7ffd9df9fe50 4 API calls 22072->22075 22073->22067 22076 7ffd9df9a5d9 22074->22076 22075->22073 22077 7ffd9df9a5e1 22076->22077 22088 7ffd9dfa40b0 22076->22088 22077->22067 22081 7ffd9df9a4c4 22080->22081 22082 7ffd9df9a4ed Concurrency::details::_Concurrent_queue_iterator_base_v4::~_Concurrent_queue_iterator_base_v4 22080->22082 22081->22082 22083 7ffd9dfa40b0 _invalid_parameter_noinfo_noreturn 23 API calls 22081->22083 22082->22069 22084 7ffd9df9a522 22083->22084 22093 7ffd9dfa08dc 22085->22093 22089 7ffd9dfa3fe0 _invalid_parameter_noinfo_noreturn 23 API calls 22088->22089 22090 7ffd9dfa40c9 22089->22090 22091 7ffd9dfa40e0 _invalid_parameter_noinfo_noreturn 9 API calls 22090->22091 22092 7ffd9dfa40de 22091->22092 22098 7ffd9dfa0850 22093->22098 22096 7ffd9dfa1640 _CxxThrowException 2 API calls 22097 7ffd9dfa08fe 22096->22097 22101 7ffd9dfa20ac 22098->22101 22100 7ffd9dfa0887 22100->22096 22102 7ffd9dfa2102 __std_exception_copy 22101->22102 22103 7ffd9dfa20cd 22101->22103 22102->22100 22103->22102 22104 7ffd9dfabf58 __std_exception_copy 23 API calls 22103->22104 22104->22102 22106 7ffd9dfac0c0 swprintf 29 API calls 22105->22106 22107 7ffd9df9c4af lstrlenA 22106->22107 22107->21752 22110 7ffd9dfaff99 22108->22110 22231 7ffd9dfafec0 22110->22231 22232 7ffd9dfafeed 22231->22232 22233 7ffd9dfa41e0 memcpy_s 14 API calls 22232->22233 22234 7ffd9df97a21 22232->22234 22235 7ffd9dfaff3f 22233->22235 22234->21773 22236 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 22235->22236 22236->22234 22660 7ffd9df99c4f 22658->22660 22659 7ffd9df99c92 22662 7ffd9df99cb7 MultiByteToWideChar 22659->22662 22669 7ffd9df99ce7 _com_util::ConvertStringToBSTR 22659->22669 22660->22659 22661 7ffd9df99c69 MultiByteToWideChar 22660->22661 22661->22659 22662->22669 22663 7ffd9df99d73 22664 7ffd9df9a744 GetVersionExA 22663->22664 22665 7ffd9df99d87 22664->22665 22666 7ffd9df99da3 22665->22666 22667 7ffd9df957e0 114 API calls 22665->22667 22668 7ffd9df9a2d8 9 API calls 22666->22668 22667->22666 22670 7ffd9df99dbc 22668->22670 22669->22663 22671 7ffd9df99d4b MultiByteToWideChar 22669->22671 22672 7ffd9df9a350 5 API calls 22670->22672 22671->22663 22673 7ffd9df99dca 22672->22673 22674 7ffd9df9a2d8 9 API calls 22673->22674 22740 7ffd9dfae29f 22739->22740 22742 7ffd9dfae2bd 22739->22742 22741 7ffd9dfa41e0 memcpy_s 14 API calls 22740->22741 22743 7ffd9dfae2a4 22741->22743 22747 7ffd9dfae2af 22742->22747 22751 7ffd9dfb2b1c EnterCriticalSection 22742->22751 22745 7ffd9dfa4090 _invalid_parameter_noinfo 23 API calls 22743->22745 22745->22747 22747->21726 22753 7ffd9df93ad0 4 API calls 22752->22753 22754 7ffd9df975b5 22753->22754 22755 7ffd9df975f1 22754->22755 22756 7ffd9df975d4 22754->22756 22761 7ffd9df9768d _handle_error 22754->22761 22758 7ffd9df93ad0 4 API calls 22755->22758 22757 7ffd9df93ad0 4 API calls 22756->22757 22759 7ffd9df975e0 22757->22759 22758->22759 22760 7ffd9df93ad0 4 API calls 22759->22760 22759->22761 22762 7ffd9df97621 22760->22762 22761->20194 22762->22761 22763 7ffd9df93ad0 4 API calls 22762->22763 22764 7ffd9df976b8 22763->22764 22764->22761 22765 7ffd9df93ad0 4 API calls 22764->22765 22766 7ffd9df976de 22765->22766 22766->22761 22767 7ffd9dfabfb8 _scwprintf 23 API calls 22766->22767 22776 7ffd9df994fc memcpy_s Concurrency::details::_Concurrent_queue_iterator_base_v4::~_Concurrent_queue_iterator_base_v4 22770->22776 22771 7ffd9df996a1 FindClose 22772 7ffd9df99601 _handle_error 22771->22772 22772->20195 22773 7ffd9dfabfb8 _scwprintf 23 API calls 22774 7ffd9df99561 FindFirstFileA 22773->22774 22774->22776 22775 7ffd9df99673 DeleteFileA 22775->22776 22776->22771 22776->22773 22776->22775 22778 7ffd9df99658 FindNextFileA 22776->22778 22779 7ffd9df9fe50 4 API calls 22776->22779 22780 7ffd9df995f0 22776->22780 22782 7ffd9dfabfb8 23 API calls _scwprintf 22776->22782 22783 7ffd9df9b70c CreateFileA 22776->22783 22778->22776 22779->22776 22787 7ffd9dfa1700 RtlUnwind 22780->22787 22782->22776 22784 7ffd9df9b750 CloseHandle 22783->22784 22785 7ffd9df9b740 GetLastError 22783->22785 22786 7ffd9df9b74b 22784->22786 22785->22786 22786->22776 22787->22772 24538 7ffd9dfb1148 24541 7ffd9dfb10cc 24538->24541 24548 7ffd9dfb4518 EnterCriticalSection 24541->24548

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 7ffd9df91520-7ffd9df91667 call 7ffd9df9fd90 call 7ffd9dfa14b0 * 7 call 7ffd9df9db18 call 7ffd9df9dbe0 call 7ffd9df9db7c call 7ffd9df9d9f0 * 3 call 7ffd9dfa4484 31 7ffd9df91669-7ffd9df91671 0->31 32 7ffd9df91673-7ffd9df91689 call 7ffd9dfa4484 0->32 33 7ffd9df916b5-7ffd9df91700 call 7ffd9dfa4484 call 7ffd9df9642c 31->33 38 7ffd9df9168b-7ffd9df9168e 32->38 39 7ffd9df91690-7ffd9df916aa call 7ffd9dfa4484 32->39 45 7ffd9df91706-7ffd9df9171c call 7ffd9df9d740 33->45 46 7ffd9df917fa 33->46 41 7ffd9df916ad-7ffd9df916b0 38->41 39->41 41->33 49 7ffd9df91721-7ffd9df91737 call 7ffd9dfa4484 45->49 48 7ffd9df917fe-7ffd9df9181a call 7ffd9df9d740 46->48 53 7ffd9df9181c-7ffd9df91832 call 7ffd9dfa4484 48->53 54 7ffd9df9183e-7ffd9df91843 48->54 59 7ffd9df91739-7ffd9df9173e 49->59 60 7ffd9df91740-7ffd9df91756 call 7ffd9dfa4484 49->60 53->54 66 7ffd9df91834-7ffd9df91839 53->66 57 7ffd9df91925 54->57 58 7ffd9df91849-7ffd9df9184b 54->58 63 7ffd9df91929-7ffd9df9192f 57->63 58->57 62 7ffd9df91851-7ffd9df9185a 58->62 64 7ffd9df9177d-7ffd9df917f8 call 7ffd9df9d740 call 7ffd9dfa4484 call 7ffd9df9d740 call 7ffd9df9642c 59->64 76 7ffd9df91758-7ffd9df9175b 60->76 77 7ffd9df9175d-7ffd9df91777 call 7ffd9dfa4484 60->77 62->63 68 7ffd9df91860-7ffd9df918c5 call 7ffd9dfabf18 call 7ffd9dfa14b0 * 2 call 7ffd9df9dc44 call 7ffd9df9d740 62->68 69 7ffd9df91939-7ffd9df9195c call 7ffd9dfa14b0 call 7ffd9df96d4c 63->69 70 7ffd9df91931-7ffd9df91933 63->70 64->48 72 7ffd9df91c4b-7ffd9df91c6d call 7ffd9df9fe00 66->72 113 7ffd9df918c7-7ffd9df918eb call 7ffd9df9642c 68->113 114 7ffd9df918ed-7ffd9df918fb 68->114 92 7ffd9df91961-7ffd9df91968 69->92 70->66 70->69 83 7ffd9df9177a 76->83 77->83 83->64 92->92 95 7ffd9df9196a-7ffd9df9196d 92->95 98 7ffd9df91973-7ffd9df9199b call 7ffd9dfa14b0 call 7ffd9df91cac 95->98 99 7ffd9df91b74-7ffd9df91b82 call 7ffd9df9b768 95->99 108 7ffd9df91c36-7ffd9df91c46 call 7ffd9df936e0 98->108 120 7ffd9df919a1-7ffd9df919db call 7ffd9dfa14b0 * 2 call 7ffd9df91e08 98->120 99->108 109 7ffd9df91b88-7ffd9df91b92 99->109 108->72 109->108 112 7ffd9df91b98-7ffd9df91ba3 109->112 112->108 117 7ffd9df91ba9-7ffd9df91bb0 call 7ffd9df9a86c 112->117 119 7ffd9df918fe-7ffd9df91916 113->119 114->119 129 7ffd9df91c28-7ffd9df91c31 call 7ffd9df965c4 call 7ffd9df97284 117->129 130 7ffd9df91bb2-7ffd9df91bb9 call 7ffd9df96f48 117->130 123 7ffd9df91918-7ffd9df9191b 119->123 124 7ffd9df91921-7ffd9df91923 119->124 120->108 142 7ffd9df919e1-7ffd9df91a16 call 7ffd9df963d8 call 7ffd9dfa4484 120->142 123->124 127 7ffd9df9191d-7ffd9df9191f 123->127 124->63 127->63 129->108 139 7ffd9df91bbb-7ffd9df91bd0 130->139 140 7ffd9df91bd2-7ffd9df91bdb call 7ffd9df96478 130->140 143 7ffd9df91c19 139->143 150 7ffd9df91bf8-7ffd9df91c01 call 7ffd9df96478 140->150 151 7ffd9df91bdd-7ffd9df91bf6 140->151 142->99 158 7ffd9df91a1c-7ffd9df91a84 call 7ffd9dfa14b0 CreateMutexA GetLastError 142->158 146 7ffd9df91c1c-7ffd9df91c26 call 7ffd9df97310 143->146 146->108 150->108 157 7ffd9df91c03-7ffd9df91c12 150->157 151->146 157->143 161 7ffd9df91a86-7ffd9df91a89 158->161 162 7ffd9df91ae1-7ffd9df91aff WaitForSingleObject call 7ffd9df91cac 158->162 164 7ffd9df91aa7-7ffd9df91aaa 161->164 165 7ffd9df91a8b-7ffd9df91aa2 OpenMutexA 161->165 168 7ffd9df91b3f-7ffd9df91b6f call 7ffd9df936e0 call 7ffd9dfa1700 162->168 169 7ffd9df91b01-7ffd9df91b18 call 7ffd9dfa4484 162->169 164->162 167 7ffd9df91aac-7ffd9df91adc call 7ffd9df936e0 call 7ffd9dfa1700 164->167 165->164 167->72 168->72 169->168 177 7ffd9df91b1a-7ffd9df91b3a call 7ffd9df97310 169->177 177->168
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: sscanf$MutexOpen_local_unwind$CreateErrorLastObjectSingleWait_invalid_parameter_noinfo_snwprintf_sswprintf
      • String ID: %llu$%llu$%llu$%s\bin\jp2ssv.dll$11.361.2$Mutex$SSVAgentMutex$block$block$deployment.webjava.enabled$false$jp2ssv.dll$jp2ssv.dll$jp2ssv.dll$later$later$true$true$update$update
      • API String ID: 1521680484-3839229735
      • Opcode ID: 06989ee496560a191980a93f29b8cb2a99d3fa4950b5b5c850a5ca76a6bd9294
      • Instruction ID: 6b013ba25f58719ccf2c27fe57f1ef7514741a0d2466ebaf4a84a70454a1f2b6
      • Opcode Fuzzy Hash: 06989ee496560a191980a93f29b8cb2a99d3fa4950b5b5c850a5ca76a6bd9294
      • Instruction Fuzzy Hash: 40127162F1C9C651EB30DFA5E8621EAA261FBD5384F404236DACD47A99FE3CD509C740

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 182 7ffd9df91f64-7ffd9df91fa3 call 7ffd9df9fd90 185 7ffd9df923a7-7ffd9df923a9 182->185 186 7ffd9df91fa9-7ffd9df91feb GetModuleFileNameA call 7ffd9dfa457c call 7ffd9dfa46ec 182->186 188 7ffd9df923b7 185->188 189 7ffd9df923ab-7ffd9df923b2 call 7ffd9df95728 185->189 197 7ffd9df91ff1-7ffd9df920ec call 7ffd9dfa14b0 * 7 call 7ffd9df9db18 call 7ffd9df9dbe0 call 7ffd9df9db7c call 7ffd9df9d9f0 * 3 call 7ffd9dfa4484 186->197 198 7ffd9df92342-7ffd9df9234d 186->198 190 7ffd9df923bc-7ffd9df923e7 call 7ffd9df9fe00 188->190 189->188 237 7ffd9df920ee-7ffd9df920f1 197->237 238 7ffd9df920f3-7ffd9df92106 call 7ffd9dfa4484 197->238 199 7ffd9df9236f-7ffd9df9237d 198->199 200 7ffd9df9234f-7ffd9df9235e 198->200 204 7ffd9df92397-7ffd9df9239a 199->204 200->199 202 7ffd9df92360-7ffd9df9236d 200->202 202->199 206 7ffd9df9239c-7ffd9df923a5 DisableThreadLibraryCalls 204->206 207 7ffd9df9237f-7ffd9df92385 204->207 206->188 210 7ffd9df92387-7ffd9df9238c 207->210 211 7ffd9df92393 207->211 210->211 211->204 239 7ffd9df92127-7ffd9df92168 call 7ffd9dfa4484 call 7ffd9df9642c 237->239 243 7ffd9df92108-7ffd9df9210b 238->243 244 7ffd9df9210d-7ffd9df92124 call 7ffd9dfa4484 238->244 250 7ffd9df9223b-7ffd9df92253 call 7ffd9df9d740 239->250 251 7ffd9df9216e-7ffd9df92195 call 7ffd9df9d740 call 7ffd9dfa4484 239->251 243->239 244->239 256 7ffd9df92255-7ffd9df9226a call 7ffd9dfa4484 250->256 257 7ffd9df92270-7ffd9df92274 250->257 266 7ffd9df92197-7ffd9df9219a 251->266 267 7ffd9df9219c-7ffd9df921af call 7ffd9dfa4484 251->267 256->257 270 7ffd9df9233e-7ffd9df92340 256->270 260 7ffd9df92335-7ffd9df92338 257->260 261 7ffd9df9227a-7ffd9df9227d 257->261 260->198 265 7ffd9df9233a-7ffd9df9233c 260->265 261->260 264 7ffd9df92283-7ffd9df92287 261->264 264->260 271 7ffd9df9228d-7ffd9df922e0 call 7ffd9dfabf18 call 7ffd9dfa14b0 * 2 call 7ffd9df9dc44 call 7ffd9df9d740 264->271 265->198 265->270 268 7ffd9df921d0-7ffd9df921e1 call 7ffd9df9d740 266->268 275 7ffd9df921b6-7ffd9df921cd call 7ffd9dfa4484 267->275 276 7ffd9df921b1-7ffd9df921b4 267->276 277 7ffd9df921e6-7ffd9df92236 call 7ffd9dfa4484 call 7ffd9df9d740 call 7ffd9df9642c 268->277 270->190 295 7ffd9df92307-7ffd9df92314 271->295 296 7ffd9df922e2-7ffd9df92305 call 7ffd9df9642c 271->296 275->268 276->268 277->250 298 7ffd9df92317-7ffd9df92321 295->298 296->298 300 7ffd9df92330 298->300 301 7ffd9df92323-7ffd9df9232a 298->301 300->260 301->300 302 7ffd9df9232c-7ffd9df9232e 301->302 302->260
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: sscanf$CallsDisableFileLibraryModuleNameOpenThread_invalid_parameter_noinfostrstr
      • String ID: %llu$%llu$%llu$block$block$deployment.webjava.enabled$false$later$later$ssvagent.exe$true$true$update$update
      • API String ID: 1610733529-2036894985
      • Opcode ID: 31d723c57e7ce75be79ebd9b7beab8ca7e763c65bacb6803460a3e03684e70a8
      • Instruction ID: e0437aaf56e8bac87c8eb9087f5a3043e6677e4543656e0118e4e2f2b2d83710
      • Opcode Fuzzy Hash: 31d723c57e7ce75be79ebd9b7beab8ca7e763c65bacb6803460a3e03684e70a8
      • Instruction Fuzzy Hash: F7C15122B28AC355EB34AFA5D8626F91361FF94788F804232D98D4B599FE7CE705C740

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Open$_invalid_parameter_noinfo
      • String ID: SOFTWARE\Oracle\JavaDeploy$deployment.modified.timestamp$deployment.modified.timestamp
      • API String ID: 2082215927-716718558
      • Opcode ID: 5257eef159938afc1ac749d74670a1734ca4e6543f3238034bb47169f28f6cd5
      • Instruction ID: f25c6985f8f3d7e80ff5d33af41e7b73dd17f379f3659bedd80928cbecc047f7
      • Opcode Fuzzy Hash: 5257eef159938afc1ac749d74670a1734ca4e6543f3238034bb47169f28f6cd5
      • Instruction Fuzzy Hash: D1714022B18AC286E7709FA5E86166A67A5FB847C4F501231FACE47F58EF3CD145CB40

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 303 7ffd9df9fe94-7ffd9df9fe9a 304 7ffd9df9fed5-7ffd9df9fedf 303->304 305 7ffd9df9fe9c-7ffd9df9fe9f 303->305 306 7ffd9dfa0000-7ffd9dfa001c 304->306 307 7ffd9df9fec9-7ffd9df9ff01 call 7ffd9df9f6cc 305->307 308 7ffd9df9fea1-7ffd9df9fea4 305->308 312 7ffd9dfa001e 306->312 313 7ffd9dfa0030-7ffd9dfa004b call 7ffd9df9f560 306->313 322 7ffd9df9ff06-7ffd9df9ff08 307->322 310 7ffd9df9fea6-7ffd9df9fea9 308->310 311 7ffd9df9febc __scrt_dllmain_crt_thread_attach 308->311 318 7ffd9df9feb5-7ffd9df9feba call 7ffd9df9f610 310->318 319 7ffd9df9feab-7ffd9df9feb4 310->319 316 7ffd9df9fec1-7ffd9df9fec8 311->316 314 7ffd9dfa0020-7ffd9dfa002f 312->314 324 7ffd9dfa004d-7ffd9dfa0080 call 7ffd9df9f688 call 7ffd9dfa0764 call 7ffd9dfa07d0 call 7ffd9df9f6b8 call 7ffd9df9f88c call 7ffd9df9f8b0 313->324 325 7ffd9dfa0082-7ffd9dfa00b4 call 7ffd9dfa0398 313->325 318->316 326 7ffd9df9ff0a 322->326 327 7ffd9df9ff22-7ffd9df9ff37 call 7ffd9df9f560 322->327 324->314 335 7ffd9dfa00b6-7ffd9dfa00bc 325->335 336 7ffd9dfa00c5-7ffd9dfa00cb 325->336 330 7ffd9df9ff0c-7ffd9df9ff21 326->330 338 7ffd9df9ff3d-7ffd9df9ff4e call 7ffd9df9f5d0 327->338 339 7ffd9df9fff1-7ffd9df9ffff call 7ffd9dfa0398 327->339 335->336 341 7ffd9dfa00be-7ffd9dfa00c0 335->341 342 7ffd9dfa00cd-7ffd9dfa00d7 336->342 343 7ffd9dfa0112-7ffd9dfa011a call 7ffd9df91f64 336->343 354 7ffd9df9ff50-7ffd9df9ff74 call 7ffd9dfa0794 call 7ffd9dfa0754 call 7ffd9dfa0770 call 7ffd9dfafe80 338->354 355 7ffd9df9ff9f-7ffd9df9ffa9 call 7ffd9df9f88c 338->355 339->306 348 7ffd9dfa01b5-7ffd9dfa01c2 341->348 349 7ffd9dfa00d9-7ffd9dfa00e1 342->349 350 7ffd9dfa00e3-7ffd9dfa00f1 342->350 353 7ffd9dfa011f-7ffd9dfa0128 343->353 356 7ffd9dfa00f7-7ffd9dfa00ff call 7ffd9df9fe94 349->356 350->356 370 7ffd9dfa01ab-7ffd9dfa01b3 350->370 359 7ffd9dfa012a-7ffd9dfa012c 353->359 360 7ffd9dfa0162-7ffd9dfa0164 353->360 354->355 403 7ffd9df9ff76-7ffd9df9ff7d __scrt_dllmain_after_initialize_c 354->403 355->326 373 7ffd9df9ffaf-7ffd9df9ffbb call 7ffd9dfa078c 355->373 372 7ffd9dfa0104-7ffd9dfa010c 356->372 359->360 366 7ffd9dfa012e-7ffd9dfa0152 call 7ffd9df91f64 call 7ffd9df9fe94 359->366 368 7ffd9dfa0166-7ffd9dfa0169 360->368 369 7ffd9dfa016b-7ffd9dfa0180 call 7ffd9df9fe94 360->369 366->360 397 7ffd9dfa0154-7ffd9dfa0159 366->397 368->369 368->370 369->370 387 7ffd9dfa0182-7ffd9dfa018c 369->387 370->348 372->343 372->370 392 7ffd9df9ffbd-7ffd9df9ffc7 call 7ffd9df9f7f0 373->392 393 7ffd9df9ffe1-7ffd9df9ffec 373->393 389 7ffd9dfa0197-7ffd9dfa01a7 387->389 390 7ffd9dfa018e-7ffd9dfa0195 387->390 389->370 390->370 392->393 402 7ffd9df9ffc9-7ffd9df9ffd7 392->402 393->330 397->360 402->393 403->355 404 7ffd9df9ff7f-7ffd9df9ff9c call 7ffd9dfafe1c 403->404 404->355
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Initialize__scrt_fastfail__scrt_release_startup_lock$__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_is_nonwritable_in_current_image__scrt_uninitialize_crt
      • String ID:
      • API String ID: 4085079087-0
      • Opcode ID: b0b55818c316fdf5a3517c4d4876db3057afc319c5bfef9534f6fb83436c9f7f
      • Instruction ID: ac82cd6f028a5110aa1e6cc059fe7f52d2b37582428d4729d6192b363263fe63
      • Opcode Fuzzy Hash: b0b55818c316fdf5a3517c4d4876db3057afc319c5bfef9534f6fb83436c9f7f
      • Instruction Fuzzy Hash: 26919322F1CAC345FA74AFE6A5632B92690AF85780F444375EACD4379AFE3CE4458700

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: __vcrt_initialize__vcrt_initialize_locks__vcrt_initialize_winapi_thunks__vcrt_uninitialize
      • String ID:
      • API String ID: 1882725809-0
      • Opcode ID: 7ab1baf98a59c69f39ac2451dd79b0a18bdd618af924edda5b286a407d09aafc
      • Instruction ID: 06ab530f096fe52261f5eb5e833df4e0db7a2f7634cc46fd165d984b305e1c19
      • Opcode Fuzzy Hash: 7ab1baf98a59c69f39ac2451dd79b0a18bdd618af924edda5b286a407d09aafc
      • Instruction Fuzzy Hash: DCE01A10F0C7C645FE752EE621732B916900F96340F1857B9EAED82193FE1DA44A5635

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Open_invalid_parameter_noinfo
      • String ID:
      • API String ID: 131715653-0
      • Opcode ID: d244560fa4788ac33a2a4150e5f567402c1ac3b7fae48a1d4fe5a9c6bebaa959
      • Instruction ID: b33f9256c856b2f0ce7b58ae0ee418ed7f2a92b14f8679106452a7cc3f8ae801
      • Opcode Fuzzy Hash: d244560fa4788ac33a2a4150e5f567402c1ac3b7fae48a1d4fe5a9c6bebaa959
      • Instruction Fuzzy Hash: 68119032B1C7C286E7608F92E85152AB7A5FB88BC4F544235EA8D47B55EF3CE515CB00

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 39a261442b0964c5366dc9ef667b9b885fa98aac484cf6d7e758a5e18f53b61e
      • Instruction ID: b0615d75d0eb85b84637e69ab6cf14d7871ed50285cef4cf3b836ae5200a8d5f
      • Opcode Fuzzy Hash: 39a261442b0964c5366dc9ef667b9b885fa98aac484cf6d7e758a5e18f53b61e
      • Instruction Fuzzy Hash: AE115E3AB486C286E330AFD5A462569A2A8EB80780F154335D7DD4B696FF3CE8148B50

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 502 7ffd9df9f282-7ffd9df9f289 503 7ffd9df9f1d9-7ffd9df9f213 call 7ffd9dfc13a8 502->503 505 7ffd9df9f218-7ffd9df9f265 503->505 505->503
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: b5349ba073e493907d70b657106c693bb803f91517c994d154a66991fb509178
      • Instruction ID: 600ba09aa40014ddce087762ca86bcd58bb8ebfde2808ac6f3f3bbf21d8864d7
      • Opcode Fuzzy Hash: b5349ba073e493907d70b657106c693bb803f91517c994d154a66991fb509178
      • Instruction Fuzzy Hash: 4501D662A1CBC1C2E6208F58F84206AE360FBD9780F605725EFC852E18EF6CC2548B44

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 520 7ffd9df9f265 521 7ffd9df9f1d9-7ffd9df9f213 call 7ffd9dfc13a8 520->521 523 7ffd9df9f218-7ffd9df9f250 521->523 523->520
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: 3bf326bf2a40f5c1602910a48eb7300059a6ba1f2391d7c39976ab2625828fd0
      • Instruction ID: 9da0e7b5a7e94b31b497967d7b3e49598d9f8e869adee5cf30e3a9c6104f7f65
      • Opcode Fuzzy Hash: 3bf326bf2a40f5c1602910a48eb7300059a6ba1f2391d7c39976ab2625828fd0
      • Instruction Fuzzy Hash: 50F0A46291CBC1C2E6208F59F84206AE760FBD9794F609725EFC952E18EF6CC2548B44

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 525 7ffd9df9f271 526 7ffd9df9f1d9-7ffd9df9f213 call 7ffd9dfc13a8 525->526 528 7ffd9df9f218-7ffd9df9f265 526->528 528->526
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: 391e2ef7d3195a82ce86e24c16bcc35e6925976b4c2bb8ffc056e2d051142cda
      • Instruction ID: 9da0e7b5a7e94b31b497967d7b3e49598d9f8e869adee5cf30e3a9c6104f7f65
      • Opcode Fuzzy Hash: 391e2ef7d3195a82ce86e24c16bcc35e6925976b4c2bb8ffc056e2d051142cda
      • Instruction Fuzzy Hash: 50F0A46291CBC1C2E6208F59F84206AE760FBD9794F609725EFC952E18EF6CC2548B44

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 531 7ffd9df9f27d 532 7ffd9df9f1d9-7ffd9df9f213 call 7ffd9dfc13a8 531->532 534 7ffd9df9f218-7ffd9df9f265 532->534 534->532
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: 35f44e23c740a906e0e5ec181a92d95e001227a378cb51d0db83079725294728
      • Instruction ID: 9da0e7b5a7e94b31b497967d7b3e49598d9f8e869adee5cf30e3a9c6104f7f65
      • Opcode Fuzzy Hash: 35f44e23c740a906e0e5ec181a92d95e001227a378cb51d0db83079725294728
      • Instruction Fuzzy Hash: 50F0A46291CBC1C2E6208F59F84206AE760FBD9794F609725EFC952E18EF6CC2548B44

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 537 7ffd9df9f295 538 7ffd9df9f1d9-7ffd9df9f213 call 7ffd9dfc13a8 537->538 540 7ffd9df9f218-7ffd9df9f265 538->540 540->538
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: eef22f7847af817f5346a3a387ef8d2fd40d258e0acf854cdd94b1023cd87576
      • Instruction ID: 9da0e7b5a7e94b31b497967d7b3e49598d9f8e869adee5cf30e3a9c6104f7f65
      • Opcode Fuzzy Hash: eef22f7847af817f5346a3a387ef8d2fd40d258e0acf854cdd94b1023cd87576
      • Instruction Fuzzy Hash: 50F0A46291CBC1C2E6208F59F84206AE760FBD9794F609725EFC952E18EF6CC2548B44

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 543 7ffd9df9f2a1 544 7ffd9df9f1d9-7ffd9df9f213 call 7ffd9dfc13a8 543->544 546 7ffd9df9f218-7ffd9df9f265 544->546 546->544
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: d7ff8efee44fc5f71f716ac6409122c6c6ad1b8f3da895bbf402fdd2773ae484
      • Instruction ID: 9da0e7b5a7e94b31b497967d7b3e49598d9f8e869adee5cf30e3a9c6104f7f65
      • Opcode Fuzzy Hash: d7ff8efee44fc5f71f716ac6409122c6c6ad1b8f3da895bbf402fdd2773ae484
      • Instruction Fuzzy Hash: 50F0A46291CBC1C2E6208F59F84206AE760FBD9794F609725EFC952E18EF6CC2548B44
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: 1a28e83d2baca6c60245efe20df3e30e10596345c6c4b41bce8e00da07353f41
      • Instruction ID: 9da0e7b5a7e94b31b497967d7b3e49598d9f8e869adee5cf30e3a9c6104f7f65
      • Opcode Fuzzy Hash: 1a28e83d2baca6c60245efe20df3e30e10596345c6c4b41bce8e00da07353f41
      • Instruction Fuzzy Hash: 50F0A46291CBC1C2E6208F59F84206AE760FBD9794F609725EFC952E18EF6CC2548B44
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: 80632c6ec193bc15b98e596cd374bf4440c4681666b2ecc1ac29071cc8c0dd8f
      • Instruction ID: 9da0e7b5a7e94b31b497967d7b3e49598d9f8e869adee5cf30e3a9c6104f7f65
      • Opcode Fuzzy Hash: 80632c6ec193bc15b98e596cd374bf4440c4681666b2ecc1ac29071cc8c0dd8f
      • Instruction Fuzzy Hash: 50F0A46291CBC1C2E6208F59F84206AE760FBD9794F609725EFC952E18EF6CC2548B44
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: 543bbabc983a2fa57f5449900e1caab5b606cc3ce7f2394880d883332c3830cd
      • Instruction ID: 9da0e7b5a7e94b31b497967d7b3e49598d9f8e869adee5cf30e3a9c6104f7f65
      • Opcode Fuzzy Hash: 543bbabc983a2fa57f5449900e1caab5b606cc3ce7f2394880d883332c3830cd
      • Instruction Fuzzy Hash: 50F0A46291CBC1C2E6208F59F84206AE760FBD9794F609725EFC952E18EF6CC2548B44
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: 16ae7dfd2a5fcea2c82cc4a5e8670a0deca76735726ff86c449210828a221591
      • Instruction ID: 9da0e7b5a7e94b31b497967d7b3e49598d9f8e869adee5cf30e3a9c6104f7f65
      • Opcode Fuzzy Hash: 16ae7dfd2a5fcea2c82cc4a5e8670a0deca76735726ff86c449210828a221591
      • Instruction Fuzzy Hash: 50F0A46291CBC1C2E6208F59F84206AE760FBD9794F609725EFC952E18EF6CC2548B44

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 508 7ffd9df9f1d4 509 7ffd9df9f1d9-7ffd9df9f213 call 7ffd9dfc13a8 508->509 511 7ffd9df9f218-7ffd9df9f265 509->511 511->509
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: c15c9f59d9c9ccd348bad0d6c8561a15aacde049c291fd8f720ead0ccb6f9074
      • Instruction ID: 69d8c4bd323edbd8ea9c8df58b5f3466bef01e981a223e2d37eb50e4b4f5e200
      • Opcode Fuzzy Hash: c15c9f59d9c9ccd348bad0d6c8561a15aacde049c291fd8f720ead0ccb6f9074
      • Instruction Fuzzy Hash: 5BF0A46291CBC1C2E6208F59F84206AE760FBD9794F609725EFC952E18EF6CC2548B44

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 514 7ffd9df9f259 515 7ffd9df9f1d9-7ffd9df9f213 call 7ffd9dfc13a8 514->515 517 7ffd9df9f218-7ffd9df9f265 515->517 517->515
      APIs
      • __delayLoadHelper2.DELAYIMP ref: 00007FFD9DF9F213
        • Part of subcall function 00007FFD9DFC13A8: DloadAcquireSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC13C2
        • Part of subcall function 00007FFD9DFC13A8: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00007FFD9DFC142E
        • Part of subcall function 00007FFD9DFC13A8: RaiseException.KERNEL32 ref: 00007FFD9DFC1442
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2LoadRaiseRelease__delay
      • String ID:
      • API String ID: 1206973476-0
      • Opcode ID: c9690756d4dd4b92c6fc5678ae5c0b1c42bb4dbc50b8e96cdaf29ed4b20306c7
      • Instruction ID: 9da0e7b5a7e94b31b497967d7b3e49598d9f8e869adee5cf30e3a9c6104f7f65
      • Opcode Fuzzy Hash: c9690756d4dd4b92c6fc5678ae5c0b1c42bb4dbc50b8e96cdaf29ed4b20306c7
      • Instruction Fuzzy Hash: 50F0A46291CBC1C2E6208F59F84206AE760FBD9794F609725EFC952E18EF6CC2548B44
      APIs
      • HeapAlloc.KERNEL32(?,?,00000000,00007FFD9DFB0619,?,?,00006AC2EEAEFA12,00007FFD9DFA41E9,?,?,?,?,00007FFD9DFB07BA,?,?,00000000), ref: 00007FFD9DFB30E1
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AllocHeap
      • String ID:
      • API String ID: 4292702814-0
      • Opcode ID: 383924febe7b85696b94743aac14defc0d99da142849da29586037dfeace2a7f
      • Instruction ID: 2e2948674eb5e317f06c3dc2e06e587f3d755b252f32fcfcdcec596f1a0acb3f
      • Opcode Fuzzy Hash: 383924febe7b85696b94743aac14defc0d99da142849da29586037dfeace2a7f
      • Instruction Fuzzy Hash: BAF06D04F4928641FE755FE699732B512C41F98BC4F0C5632CECE8A6C2FE6DE5888230
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ByteCharMultiWide$String$AllocConvertFreeInitializeUninitialize_com_util::swprintf
      • String ID: : $ : $ : $ : $ : $ : $ : $ : $ : $ : $%1d.%1d.%1d$'$FALSE$FALSE$InHighIntegrityMode: $MajorVer: $MaxUpdateVer: $MicroVer: $MinUpdateVer: $MinorVer: $PARAMETERS: $REDIRECT_CLSID$SSV_DLL$SetStaticVersionRedirectKeys: 1 : $SetStaticVersionRedirectKeys: 10 : $SetStaticVersionRedirectKeys: 2 : $SetStaticVersionRedirectKeys: 3 : $SetStaticVersionRedirectKeys: 4 : $SetStaticVersionRedirectKeys: 5 : $SetStaticVersionRedirectKeys: 6 : $SetStaticVersionRedirectKeys: 7 : $SetStaticVersionRedirectKeys: 8 : $SetStaticVersionRedirectKeys: 9 : $TRUE$TRUE$VERSION$createFamilyCLSID: $ssvDLL: ${E19F9331-3110-11D4-991C-005004D3B3DB}
      • API String ID: 302353784-2235754527
      • Opcode ID: 929ca3f9df810dd3edb0d50090094b04a678409c0df34416addf5ec5cabd3311
      • Instruction ID: ff670498425ad95962a99a61c8ae48b24ec6462c8cc0c7f10303d19b1b131270
      • Opcode Fuzzy Hash: 929ca3f9df810dd3edb0d50090094b04a678409c0df34416addf5ec5cabd3311
      • Instruction Fuzzy Hash: 69D22166B05AC699DB30DFB4D8622E83361FB41358F805332E65D5B6E9EF38DA49C340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: memcpy_s$_invalid_parameter_noinfo
      • String ID: $%llu
      • API String ID: 2880407647-3173638401
      • Opcode ID: 634d361a60300ce70fcd9f8ed63ab7ed394f02b0a8249bd0b0b7ba94679ccf0e
      • Instruction ID: 9ce2527c6cbabf2ff93dc182eceaeedb83de3f392ecbf5d210ba66a8250f673f
      • Opcode Fuzzy Hash: 634d361a60300ce70fcd9f8ed63ab7ed394f02b0a8249bd0b0b7ba94679ccf0e
      • Instruction Fuzzy Hash: 1703F672B181D28BDB758E64D4617F937A5FBC878CF405235DA4A5BB48FB38AA04CB40
      APIs
        • Part of subcall function 00007FFD9DF9B3E4: GetModuleHandleA.KERNEL32(00000000,?,?,?,?,00000800,?,00007FFD9DF96DA4,00000000,?,00000104,?,?,00007FFD9DF9195C), ref: 00007FFD9DF9B473
        • Part of subcall function 00007FFD9DF9B3E4: GetModuleFileNameA.KERNEL32(00000000,?,?,?,?,00000800,?,00007FFD9DF96DA4,00000000,?,00000104,?,?,00007FFD9DF9195C), ref: 00007FFD9DF9B48A
        • Part of subcall function 00007FFD9DF9B3E4: GetShortPathNameA.KERNEL32 ref: 00007FFD9DF9B4A2
      • _snwprintf_s.LEGACY_STDIO_DEFINITIONS ref: 00007FFD9DF96E1A
      • LoadLibraryA.KERNEL32(00000000,?,00000104,?,?,00007FFD9DF9195C), ref: 00007FFD9DF96E26
      • _snwprintf_s.LEGACY_STDIO_DEFINITIONS ref: 00007FFD9DF96E69
      • LoadLibraryA.KERNEL32(?,00000104,?,?,00007FFD9DF9195C), ref: 00007FFD9DF96E75
      • _snwprintf_s.LEGACY_STDIO_DEFINITIONS ref: 00007FFD9DF96E9B
      • LoadLibraryA.KERNEL32(?,00000104,?,?,00007FFD9DF9195C), ref: 00007FFD9DF96EA7
      • GetProcAddress.KERNEL32(?,00000104,?,?,00007FFD9DF9195C), ref: 00007FFD9DF96ED1
      • _Wcsftime.LIBCMT ref: 00007FFD9DF96F0E
      • FreeLibrary.KERNEL32(?,00000104,?,?,00007FFD9DF9195C), ref: 00007FFD9DF96F16
        • Part of subcall function 00007FFD9DF9B3E4: GetLongPathNameA.KERNEL32 ref: 00007FFD9DF9B4CF
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Library$LoadName_snwprintf_s$ModulePath$AddressFileFreeHandleLongProcShortWcsftime
      • String ID: %s\%s$%s\%s$%s\deploy.dll$getLatestInstalledVersion$jp2ssv.dll$msvcp140.dll$ssv.dll$vcruntime140.dll
      • API String ID: 2458015616-2230199283
      • Opcode ID: 189665066616595832c88f8149e6b8d370ef5ce3a6ca16d5fd219ee3d0b9010f
      • Instruction ID: f9ed638ba02ae08d61a1bb98d2392331a0271070fd4618784ff055d433774365
      • Opcode Fuzzy Hash: 189665066616595832c88f8149e6b8d370ef5ce3a6ca16d5fd219ee3d0b9010f
      • Instruction Fuzzy Hash: 41511132B08EC295E731DFA1E8661E92365BB897C9F444236DA8D46799FF3CD209C310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
      • API String ID: 808467561-2761157908
      • Opcode ID: 392f6b6f0b3c0a0cfcc601a5e793c3bdcc4a232016a2b6fb597afb8c494e4a74
      • Instruction ID: 8cda0e437a31026dd94e9395c4cc22c53375cd85da89ac6185b5e198c24156ef
      • Opcode Fuzzy Hash: 392f6b6f0b3c0a0cfcc601a5e793c3bdcc4a232016a2b6fb597afb8c494e4a74
      • Instruction Fuzzy Hash: 3AB2E772B082C28AE7758EA5D5617F937A1FB44388F505235DB4E67B88EB7CE940CB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Module$ByteCharMultiWide$FileHandleName_invalid_parameter_noinfo
      • String ID: Module$Module_Raw$REGISTRY
      • API String ID: 633357525-549000027
      • Opcode ID: f59b16d5c55a5ea1640bd3f4e49bf1d21e274a211428c2b9c7f45e150542dd60
      • Instruction ID: ca96526e646a2ff72c1574e3788fa97b729dae3d059c22670a23981d55d7ed38
      • Opcode Fuzzy Hash: f59b16d5c55a5ea1640bd3f4e49bf1d21e274a211428c2b9c7f45e150542dd60
      • Instruction Fuzzy Hash: 73627F22F09AC295EB759FE5D4622B82390AF54B98F844331EA9D477D6FF3CE5498300
      APIs
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF9398A
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF939AC
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF93A41
      • lstrcmpiA.KERNEL32(?,00000000,FFFFFFFF,00000000,?,00000000,00000000,00000000,00007FFD9DF943AB), ref: 00007FFD9DF947E3
      • lstrcmpiA.KERNEL32(?,00000000,00000000,00000000,00007FFD9DF943AB), ref: 00007FFD9DF947FB
      • CharNextA.USER32(?,00000000,00000000,00000000,00007FFD9DF943AB), ref: 00007FFD9DF94846
      • lstrcmpiA.KERNEL32(?,00000000,00000000,00000000,00007FFD9DF943AB), ref: 00007FFD9DF9486D
      • lstrcmpiA.KERNEL32(?,00000000,00000000,00000000,00007FFD9DF943AB), ref: 00007FFD9DF948E6
      • lstrcmpiA.KERNEL32(?,00000000,00000000,00000000,00007FFD9DF943AB), ref: 00007FFD9DF94912
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF939C3
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF939D9
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF939E8
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF93A60
      • CharNextA.USER32(?,00000000,00000000,00000000,00007FFD9DF943AB), ref: 00007FFD9DF94A17
      • lstrcmpiA.KERNEL32(?,00000000,00000000,00000000,00007FFD9DF943AB), ref: 00007FFD9DF94CAB
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CharNext$lstrcmpi
      • String ID: Delete$ForceRemove$NoRemove$Val
      • API String ID: 3586774192-1781481701
      • Opcode ID: b792288ab48acdc3113caaf7659aec790278bc08f99a8c1b028134949074f2c6
      • Instruction ID: d6036cc4984663d679969c34d55cad5daff245c2a3a970e2ac3f0fe43b0a76c7
      • Opcode Fuzzy Hash: b792288ab48acdc3113caaf7659aec790278bc08f99a8c1b028134949074f2c6
      • Instruction Fuzzy Hash: 5E129261F086C246FB349FE5A8222B966D1AFA5BD4F404335DACD9B695FF3CE8048704
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ByteCharMultiWide$InitializeOpenUninitialize
      • String ID: '$CLSID_STRING$Java Plug-in$JavaSoft$NODOTVERSION$Software${5852F5ED-8BF4-11D4-A245-0080C6F74284}
      • API String ID: 1861335079-2342161888
      • Opcode ID: 7f9f342f8b82bc003bba41477066fe6de19d44da589d027c7ffad286b251a31d
      • Instruction ID: cd6e31d012d03e5a4b0049faba7b9ef206c9c93dc05323ac4d704814177e5a54
      • Opcode Fuzzy Hash: 7f9f342f8b82bc003bba41477066fe6de19d44da589d027c7ffad286b251a31d
      • Instruction Fuzzy Hash: E9918E26B08AC299E7709FB1D8622E937A4FB44758F449335EA9E477D8EF38D158C340
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: %s\Sun\Java\Deployment\%s$DeploymentRuleSet.jar$\Java\Java Update\jucheck.exe$h
      • API String ID: 0-835978652
      • Opcode ID: c06f65703be671fb740b90d4bb2b903a746086a75d06577ab66fec3626ddce02
      • Instruction ID: 4adab57c2cb75dbb5ed0ca27dc2d97b3422959f4e45217ad25e20d72e831239f
      • Opcode Fuzzy Hash: c06f65703be671fb740b90d4bb2b903a746086a75d06577ab66fec3626ddce02
      • Instruction Fuzzy Hash: 0BB1A322F19BC285EB209FB4D8662AD27A1FB45798F504731EA9D17AD9EF3CD194C300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: LibraryLoadResource$ByteCharFindFreeMultiSizeofWide
      • String ID: REGISTRY
      • API String ID: 2112413501-194740550
      • Opcode ID: acd537686daa82ab8c00cec96e649a415d24f43cbf1fb046536ea460a8e787fc
      • Instruction ID: 491193953004ccb8331cf4f638af7a2e558944369c313dbeb5cca76ee70fcd49
      • Opcode Fuzzy Hash: acd537686daa82ab8c00cec96e649a415d24f43cbf1fb046536ea460a8e787fc
      • Instruction Fuzzy Hash: 89911562F08AC286EB359FE498221B822D0FF557A8F544735DAAD47BC5FF3CE9058204
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Open$swprintf
      • String ID: %s\%s$JavaHome$RuntimeLib$SOFTWARE\JavaSoft\Java Runtime Environment$SOFTWARE\JavaSoft\Java Runtime Environment
      • API String ID: 3904290426-1474300321
      • Opcode ID: f0aa83d946c3e49064ca171275f7c7b4d798c0e82ce483c5b70335f5c635de81
      • Instruction ID: 9b595c0c1350833c15048bd6ae303fd59c80765eb3189f6781188f9f0cc2f698
      • Opcode Fuzzy Hash: f0aa83d946c3e49064ca171275f7c7b4d798c0e82ce483c5b70335f5c635de81
      • Instruction Fuzzy Hash: 91515E32B08B8595E730DFA5E8515AA73A4FB85794F504336EA8D03A98EF3DD615CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _get_daylight$_invalid_parameter_noinfo$InformationTimeZone
      • String ID: ?
      • API String ID: 435049134-1684325040
      • Opcode ID: bd7881590763dc93024a16697a97a44a50c4d14023ff70fb2882da424a42b082
      • Instruction ID: 1d52c1719c053f489991219f1e9b8f6de77e41bde8a2ec85ce65ea4d03be4dd0
      • Opcode Fuzzy Hash: bd7881590763dc93024a16697a97a44a50c4d14023ff70fb2882da424a42b082
      • Instruction Fuzzy Hash: D0D19522B08AC289FB709FA5D9622B92790EB447D4F845335EB8D4B795FF3CE4418760
      APIs
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF9398A
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF939AC
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF93A41
        • Part of subcall function 00007FFD9DF962A8: lstrcmpiA.KERNEL32(?,00000000,00000000,?), ref: 00007FFD9DF962C4
      • CharNextA.USER32(?,00006AC2EEAEFA12,00000000,?,?,00000000,00000000,?), ref: 00007FFD9DF92C76
      • CharNextA.USER32(?,00006AC2EEAEFA12,00000000,?,?,00000000,00000000,?), ref: 00007FFD9DF92D51
      • CharNextA.USER32(?,00006AC2EEAEFA12,00000000,?,?,00000000,00000000,?), ref: 00007FFD9DF92D69
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CharNext$lstrcmpi
      • String ID:
      • API String ID: 3586774192-0
      • Opcode ID: 40fb3e7af9d98c7d0256e03d4a62867a1e0ddf12141ad93470b76351430a399e
      • Instruction ID: 8dd21e8cc8e8f23be52439a6d704da1a0b1b6b9aec5233f0a038565c388c7d69
      • Opcode Fuzzy Hash: 40fb3e7af9d98c7d0256e03d4a62867a1e0ddf12141ad93470b76351430a399e
      • Instruction Fuzzy Hash: 90F1D022F086C296EB349FE598662F92791EB447A8F840335EA9D47BD5FF3CD5498300
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1405656091-0
      • Opcode ID: b4432a344c3a555ee76dee4d310d3f8f8cee425a12fa84d97cf3040707d73335
      • Instruction ID: 0d4c8938d52a2f72e4930ea3d889ba025c31f55b0c8b242d73b5046e61e1f358
      • Opcode Fuzzy Hash: b4432a344c3a555ee76dee4d310d3f8f8cee425a12fa84d97cf3040707d73335
      • Instruction Fuzzy Hash: B491FB72B043864BEB788FA5D9623782795EB947C8F448135DA4D8B789FF3CE5508700
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
      • String ID:
      • API String ID: 1239891234-0
      • Opcode ID: 95237892bd91c0d9798e73f4bc81ba1e30643d7e4dd7d42e5968682c736c0ade
      • Instruction ID: 0b0fc8bd379d4fdcdf309412dd262db7002df328845c0bcd2c5f9ea13efcb922
      • Opcode Fuzzy Hash: 95237892bd91c0d9798e73f4bc81ba1e30643d7e4dd7d42e5968682c736c0ade
      • Instruction Fuzzy Hash: E6317F36718BC19ADB709FA5E8512AE73A4FB84798F504235EA8D43B58EF3CC159CB00
      APIs
      • _get_daylight.LIBCMT ref: 00007FFD9DFB629F
        • Part of subcall function 00007FFD9DFB5880: _invalid_parameter_noinfo.LIBCMT ref: 00007FFD9DFB5894
      • _get_daylight.LIBCMT ref: 00007FFD9DFB62B0
        • Part of subcall function 00007FFD9DFB5820: _invalid_parameter_noinfo.LIBCMT ref: 00007FFD9DFB5834
      • _get_daylight.LIBCMT ref: 00007FFD9DFB62C1
        • Part of subcall function 00007FFD9DFB5850: _invalid_parameter_noinfo.LIBCMT ref: 00007FFD9DFB5864
        • Part of subcall function 00007FFD9DFB0044: HeapFree.KERNEL32(?,?,00007FFD9DFAF933,00007FFD9DFB9E88,?,?,?,00007FFD9DFB9ECB,?,?,00006AC2EEAEFA12,00007FFD9DFB9A38,?,?,?,00007FFD9DFB996B), ref: 00007FFD9DFB005A
        • Part of subcall function 00007FFD9DFB0044: GetLastError.KERNEL32(?,?,00007FFD9DFAF933,00007FFD9DFB9E88,?,?,?,00007FFD9DFB9ECB,?,?,00006AC2EEAEFA12,00007FFD9DFB9A38,?,?,?,00007FFD9DFB996B), ref: 00007FFD9DFB006C
      • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FFD9DFB64F5), ref: 00007FFD9DFB62E8
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
      • String ID: ?
      • API String ID: 3458911817-1684325040
      • Opcode ID: 04696fbbc6ec48e3e68bb116718cf29dd6bf503b7e1fde6fa10e7bb2df231013
      • Instruction ID: 9bb98ad639807659d1864f45ddc7aa3fa9fb2b171ec29048953caab52b4b9b34
      • Opcode Fuzzy Hash: 04696fbbc6ec48e3e68bb116718cf29dd6bf503b7e1fde6fa10e7bb2df231013
      • Instruction Fuzzy Hash: 6C61A332B08A8289E7709FA1E8621A977A0FB44794F844336EB8D47795FF3CE541C760
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ErrorFileLastWrite$Console
      • String ID:
      • API String ID: 786612050-0
      • Opcode ID: 8ef58a2333d960558992878652b1ff3caf0e79299979685ffb4df9ab5f5c2baa
      • Instruction ID: dc5c9a68fb8430c6e26227bcc53a0166a2584965f18c6eb9921ffb1661da706a
      • Opcode Fuzzy Hash: 8ef58a2333d960558992878652b1ff3caf0e79299979685ffb4df9ab5f5c2baa
      • Instruction Fuzzy Hash: 62D1BF62B08AC19AE720CFA4D9612ED77B1FB45798B144236CB8E47F99EE3CD016C710
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: FileFind$CloseDeleteFirstNext_invalid_parameter_noinfo_local_unwind
      • String ID:
      • API String ID: 1705660847-0
      • Opcode ID: c6383e6905e86354cab5c0d84a085e6cc6792051aa71fabd5b89885bc194bd20
      • Instruction ID: f5196266d7ca8d569379c5051e37ca112186135434e07a6405ae1465acd634cb
      • Opcode Fuzzy Hash: c6383e6905e86354cab5c0d84a085e6cc6792051aa71fabd5b89885bc194bd20
      • Instruction Fuzzy Hash: 64519226B08AC151E670DF91E8622EAA3A0FB85BD4F455232DEDD53795FF3CD5098B00
      APIs
      Strings
      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FFD9DF9F477
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: DebugDebuggerErrorLastOutputPresentString
      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
      • API String ID: 389471666-631824599
      • Opcode ID: 32159da2667f3b9849b16fdc563a20598ba3c85a850bf4a7bde06273c9ac0adb
      • Instruction ID: 27828d8c99a7c72c2c53d0b379053ff8a06c358047c16da4bd20ed3c6a8b8ca8
      • Opcode Fuzzy Hash: 32159da2667f3b9849b16fdc563a20598ba3c85a850bf4a7bde06273c9ac0adb
      • Instruction Fuzzy Hash: 3D114C32B14B82A6E7249FA6D6663B932A0FF48385F444235CA8D42A51FF3CE178C750
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Virtual$AllocInfoProtectQuerySystemtry_get_function
      • String ID:
      • API String ID: 3306135294-0
      • Opcode ID: 5ca0a7ec0eec55a3a2c4a08aeb90b18ac1e3441cfa849694d88987f5aa331d19
      • Instruction ID: 11eb7b4b0b26c4621cb6d3c4ea004fd03442421697f6b287d22f1f4922b444b3
      • Opcode Fuzzy Hash: 5ca0a7ec0eec55a3a2c4a08aeb90b18ac1e3441cfa849694d88987f5aa331d19
      • Instruction Fuzzy Hash: 5C316D32724B859AEB20DF75D8517E823A5FB48B88F484135DA4D8BB44EF3DE585C700
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _get_daylight$_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1286766494-0
      • Opcode ID: 9d5c94c60ce6c146c63a2e44383a9ea8ac5c14ff111f73395e182fb61da06cd8
      • Instruction ID: ed6e5b50068142f677b5650b7a2d48b29ff12eebbe9e58e8db08434ca56f6363
      • Opcode Fuzzy Hash: 9d5c94c60ce6c146c63a2e44383a9ea8ac5c14ff111f73395e182fb61da06cd8
      • Instruction Fuzzy Hash: 48928D76B08BC286EB348FA4D86217927A5FB45788F148235DBCD0BA94EF3DE511C720
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: gfffffff
      • API String ID: 3215553584-1523873471
      • Opcode ID: 0c5c02b96e18df3db29adbf39ba0761df5944b8030605a219fd084750963f313
      • Instruction ID: cd660785c93d0a9f6632e44adec6049e3be35ecad4fc9439591cf6f8572a6429
      • Opcode Fuzzy Hash: 0c5c02b96e18df3db29adbf39ba0761df5944b8030605a219fd084750963f313
      • Instruction Fuzzy Hash: 3A915762B097C686EF21CFA5A4213BD6B94AB54BC4F098232CB8D47395FE3DE506C311
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: strchr
      • String ID:
      • API String ID: 2830005266-0
      • Opcode ID: 65dd2a7eccd2c79d44cd0dbcb66701b859529cf1ab0b7db1b97cbc727733571f
      • Instruction ID: 7a0d42ce5f2195be4aa4f8b5a5ab76fb22540899d36bc28018de58f1138d9c10
      • Opcode Fuzzy Hash: 65dd2a7eccd2c79d44cd0dbcb66701b859529cf1ab0b7db1b97cbc727733571f
      • Instruction Fuzzy Hash: DC02AD21B196D640FA319F96A6332792694AF41BA8F188735DFED477D1FE3CE4018324
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: memcpy_s
      • String ID:
      • API String ID: 1502251526-0
      • Opcode ID: c3ce4f40abd015804e06012491579be2688d1f3553d77213851906fb9fecb7c1
      • Instruction ID: 6d00ca4d2cef87baf9f74ab593a530b0fc4f3b26256de9301bda9dba00910a40
      • Opcode Fuzzy Hash: c3ce4f40abd015804e06012491579be2688d1f3553d77213851906fb9fecb7c1
      • Instruction Fuzzy Hash: 9AC1D472B182DA87EB34CF59E055A6AB791FB94784F448235DB9E53744FA3DE804CB00
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CurrentFeatureInformationPresentProcessProcessorTimeZone_get_daylight_invalid_parameter_noinfo
      • String ID:
      • API String ID: 341842238-0
      • Opcode ID: a356ff44c7fe08ede85d1b24c399bd14485f0c4609b727f1bb95983bde910740
      • Instruction ID: 1bb1c6284a5291d915929529a68c1ac0aac804a785f70dafc072cbb6487b9801
      • Opcode Fuzzy Hash: a356ff44c7fe08ede85d1b24c399bd14485f0c4609b727f1bb95983bde910740
      • Instruction Fuzzy Hash: A941A066B187C586EB74CFE5E4626A962A0EB98380F409231EADD47B95FF3CE5508700
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: FileFind$CloseCreateErrorFirstLastNext_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2842505342-0
      • Opcode ID: c08843fb8f68cf03f7789a4c46c241b51713ca92ff95c9c2bd7797747c459e41
      • Instruction ID: 0075066797e1296a5b08bca9acdd51c1c0d96e61ada3099477bcbeef49798990
      • Opcode Fuzzy Hash: c08843fb8f68cf03f7789a4c46c241b51713ca92ff95c9c2bd7797747c459e41
      • Instruction Fuzzy Hash: 64317362B18AC195E720EFB5D8622E96390FB84794F844632DE8D47799FF38D60AC740
      APIs
      • _invalid_parameter_noinfo.LIBCMT ref: 00007FFD9DFB2691
        • Part of subcall function 00007FFD9DFA40E0: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FFD9DFA408D), ref: 00007FFD9DFA40E9
        • Part of subcall function 00007FFD9DFA40E0: GetCurrentProcess.KERNEL32(?,?,?,?,00007FFD9DFA408D), ref: 00007FFD9DFA410E
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
      • String ID: -
      • API String ID: 4036615347-2547889144
      • Opcode ID: f30431a1fd95573c15dcfd89aa47b9aaae2925108b865685cb72cdfe89fbaf68
      • Instruction ID: 066c5511e3a4727bb29f84c4756728f84966702eeb2b2e1d1368332c5befb307
      • Opcode Fuzzy Hash: f30431a1fd95573c15dcfd89aa47b9aaae2925108b865685cb72cdfe89fbaf68
      • Instruction Fuzzy Hash: F2810F32B087C686EA748EA9B46236AA691FB95794F144335EBDD03BD8EF3CD4008710
      APIs
      • _invalid_parameter_noinfo.LIBCMT ref: 00007FFD9DFB7FD8
        • Part of subcall function 00007FFD9DFA40E0: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FFD9DFA408D), ref: 00007FFD9DFA40E9
        • Part of subcall function 00007FFD9DFA40E0: GetCurrentProcess.KERNEL32(?,?,?,?,00007FFD9DFA408D), ref: 00007FFD9DFA410E
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
      • String ID: *?
      • API String ID: 4036615347-2564092906
      • Opcode ID: 4f4b62dfc343c943f822ecf4745ef85c72e1cea372fbfdd212ab7dff0f8a4782
      • Instruction ID: a6066241bf34ba183c4cd13a68fda49500fe091990fa292b4d912a648cce43d9
      • Opcode Fuzzy Hash: 4f4b62dfc343c943f822ecf4745ef85c72e1cea372fbfdd212ab7dff0f8a4782
      • Instruction Fuzzy Hash: 5351D166B15BD685EF20CFE698225A927A0FF84BD8B484631DF9D07B85FE3CD0418320
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ExceptionRaise_clrfp
      • String ID:
      • API String ID: 15204871-0
      • Opcode ID: b2e9369180dbe41cd3aa7bc69ba0ad97f333a94b5de1c0bdfb9b7b427a26ee5b
      • Instruction ID: 327af77f3474d57e860c4a77e961ea588bd556e0cadeb16df96b7f20702ad57f
      • Opcode Fuzzy Hash: b2e9369180dbe41cd3aa7bc69ba0ad97f333a94b5de1c0bdfb9b7b427a26ee5b
      • Instruction Fuzzy Hash: 1AB16D77600B858BEB25DF6DC55636C37A0F784B88F148A21DA9D877A4DF39E462C700
      APIs
      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,00007FFD9DF90000,00000000,00000000,?,?,?,00007FFD9DF9620F), ref: 00007FFD9DF9550F
      • WideCharToMultiByte.KERNEL32(?,?,?,?,?,00007FFD9DF90000,00000000,00000000,?,?,?,00007FFD9DF9620F), ref: 00007FFD9DF955F2
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ByteCharMultiWide
      • String ID:
      • API String ID: 626452242-0
      • Opcode ID: 800fbec7aa9bf4a8cbbcc61cded88ad31487562974ab2d17b07c78309925f791
      • Instruction ID: b3aabf54621fb39e54f7124de35748b2e0006feaabaef5a5cfc6b776f767a8a8
      • Opcode Fuzzy Hash: 800fbec7aa9bf4a8cbbcc61cded88ad31487562974ab2d17b07c78309925f791
      • Instruction Fuzzy Hash: 4961F232F08BC285EA349FA5A5225B922A1EB557B4F540735EABD47BC5EF3CE5058300
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _get_daylight_invalid_parameter_noinfo
      • String ID:
      • API String ID: 474895018-0
      • Opcode ID: 84dbe30e15e6eae941505677de12013f0c5c3030e7563b86cffdf7c97d8bb012
      • Instruction ID: 29e6245b36f5804cf9201ab4482b12a19732f7fcce133c7ee0664d6daa06890e
      • Opcode Fuzzy Hash: 84dbe30e15e6eae941505677de12013f0c5c3030e7563b86cffdf7c97d8bb012
      • Instruction Fuzzy Hash: 1371E322F086C246F7748EB9947263F6281AF90760F144735DBED87AC1FE7DE8418A20
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e75528dbd0d7067ecdd27007f8628ad0d228c9b8524537b888c72de96c31e67b
      • Instruction ID: 47a0a93ac7797db38be4c74879d9da00e0b649e2b9b0d2298454ac4d4ef1c96f
      • Opcode Fuzzy Hash: e75528dbd0d7067ecdd27007f8628ad0d228c9b8524537b888c72de96c31e67b
      • Instruction Fuzzy Hash: AA51A026B087D194F7309FB6A9112AE7BA5BB847D4F144235EE9C47A85EF3CD141C700
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CreateInstance
      • String ID:
      • API String ID: 542301482-0
      • Opcode ID: e6521d9c78b99e8d543134cf68f819a2d73d25d7cf811e9d7d2394d92e07a1ca
      • Instruction ID: 8e0512bd1b275aaba839e8e37e0361bbe3a716975a6da7ce95ee13b461d8bd6b
      • Opcode Fuzzy Hash: e6521d9c78b99e8d543134cf68f819a2d73d25d7cf811e9d7d2394d92e07a1ca
      • Instruction Fuzzy Hash: 7F012C7BB08A8282E7218FA5E421069A3A1FB84BC4B588231DA8D43758EF39D45AC700
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Version
      • String ID:
      • API String ID: 1889659487-0
      • Opcode ID: 62c5b087a6450926370cf8209f5462acc4037c5462491ac5b58cda2a3a1f95f5
      • Instruction ID: 60332a27836927dab44d941a673f78269b873a384350b8d1e760ec60d58154e9
      • Opcode Fuzzy Hash: 62c5b087a6450926370cf8209f5462acc4037c5462491ac5b58cda2a3a1f95f5
      • Instruction Fuzzy Hash: 62E0302AB1858186F770AFA0E42636A62A0FB88744F814225D68D02645EF3CD209CF10
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: 0
      • API String ID: 3215553584-4108050209
      • Opcode ID: 96dcd4de4b1df0aef028137f7808bc8982df8eab9eceec7f6b82003babea1daa
      • Instruction ID: 8691563e628b6af077d213ddd4b01d9f29ef5a2491fffe53966f77f85ec28415
      • Opcode Fuzzy Hash: 96dcd4de4b1df0aef028137f7808bc8982df8eab9eceec7f6b82003babea1daa
      • Instruction Fuzzy Hash: 6A71E411B0C6C646FA748E9990623BA63A2ABE5768F540335CDCD0F7D9FE3DE8468701
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: 0
      • API String ID: 3215553584-4108050209
      • Opcode ID: 440c5aab33dc9f6f19e7a2815fc18fa09c256e57a27b87fb0389583b4f7a7f1a
      • Instruction ID: aea106139752d70edc9ab0a0b0542a5f9f4a14d6d2c37f9e4b9e1968431263ae
      • Opcode Fuzzy Hash: 440c5aab33dc9f6f19e7a2815fc18fa09c256e57a27b87fb0389583b4f7a7f1a
      • Instruction Fuzzy Hash: 94610611B0C6C646FA784EA950223BA5791AFE1788F581332DDCD1B7CAFE3DE8468741
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: HeapProcess
      • String ID:
      • API String ID: 54951025-0
      • Opcode ID: 0fecff8c7abd5b688fc1d4c59210d4994446f0f19b179665c75e03d6f4b80512
      • Instruction ID: f82f29cdce530bc22c1449e464e497615c74a5f234994491591d48d1f7a89cf0
      • Opcode Fuzzy Hash: 0fecff8c7abd5b688fc1d4c59210d4994446f0f19b179665c75e03d6f4b80512
      • Instruction Fuzzy Hash: 28B09220F17A82CAEE182FA16C9325462A4BF48B00F858238C88C41320FF2C21F94B10
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b5949e5ca0c8ce3dcaf72348acdb818015073b73d60e7c43b96f1175034bdaf6
      • Instruction ID: dd95abe883cc54a7722aec5f46ea1caad15105b4affabb2d5b3566c23dfda88f
      • Opcode Fuzzy Hash: b5949e5ca0c8ce3dcaf72348acdb818015073b73d60e7c43b96f1175034bdaf6
      • Instruction Fuzzy Hash: 77916A27B182C246FA394EA590323B92690AFC0794F84173ADE9E4B7C0FE7CE405DB10
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ErrorFreeHeapLast
      • String ID:
      • API String ID: 485612231-0
      • Opcode ID: bcdc896120c78d454949465a930d2dfda336c6b9241685cc9389bf13f65822f1
      • Instruction ID: b97850a133126f91ab1656fc216bfb79c858cc5de7959f40f6687e130cbcf05f
      • Opcode Fuzzy Hash: bcdc896120c78d454949465a930d2dfda336c6b9241685cc9389bf13f65822f1
      • Instruction Fuzzy Hash: 5D41F833714A9445EF54CFAAD9251A9B3A1AB8CFD4B099532EE8D87B58FF3CD0458304
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ef758bb68dd0015e5eebd32fc6ef9229b7fc843b489c190bb509a01dbbf15546
      • Instruction ID: 8e7376c4b9dd2499dd2841e4b8ee151c3265156f1333c722c46c44c426368e03
      • Opcode Fuzzy Hash: ef758bb68dd0015e5eebd32fc6ef9229b7fc843b489c190bb509a01dbbf15546
      • Instruction Fuzzy Hash: 4D316F32F1C2C385FAB65EE9957767D16929FC2340F288332C9AD06D99FC3AF9819500
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b6b969d1584351714580b89cd7e8c15aedd21309ac5cf89bc00d356c17acacad
      • Instruction ID: e243a2ea05f6c707856003fcf8d72cd0358e6dce4c480e6c8e6d77cc26c6758c
      • Opcode Fuzzy Hash: b6b969d1584351714580b89cd7e8c15aedd21309ac5cf89bc00d356c17acacad
      • Instruction Fuzzy Hash: EEF068727182958FDBA88F6DA41362977D0F7083C4F408539D5CD87B54E63D90618F14
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CharNext$Task$AllocFreeRealloc
      • String ID: }}$HKCR$HKCU{Software{Classes
      • API String ID: 3917957913-1142484189
      • Opcode ID: 62e52356015a5d0dc33101422d7587e26c655e3b550c2a50da4106ee225c1683
      • Instruction ID: c83a6f32353f9fdeb038bf379027510baa99614e501fbb707f6d2e735ea148af
      • Opcode Fuzzy Hash: 62e52356015a5d0dc33101422d7587e26c655e3b550c2a50da4106ee225c1683
      • Instruction Fuzzy Hash: 0CA17C22F09A8295FB759FE598722BC27E06F44B94F144235CEDE87395FE3DA8498310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CloseHandleProcess$Window$CurrentErrorLastLocalOpenShellThreadTimefwprintf
      • String ID: GetCurrentUserHandle: AdjustTokenPrivileges failed.$GetCurrentUserHandle: Can't get primary token.$GetCurrentUserHandle: Can't get process token of desktop shell.$GetCurrentUserHandle: Can't open desktop shell process.$GetCurrentUserHandle: No desktop shell is present.$GetCurrentUserHandle: OpenProcessToken failed.$GetCurrentUserHandle: Unable to get PID of desktop shell.$SeIncreaseQuotaPrivilege
      • API String ID: 1976429503-1238159523
      • Opcode ID: e6e94d15d8b48a30eb5d9f8d2e548e25f834094bf9d12c1b81c2c6b0c1b91b4b
      • Instruction ID: 0bbdbb98226e84f0eb9a3ee0fad897f7d153ceafae6952971f4bb9cb6632fa09
      • Opcode Fuzzy Hash: e6e94d15d8b48a30eb5d9f8d2e548e25f834094bf9d12c1b81c2c6b0c1b91b4b
      • Instruction Fuzzy Hash: 76412E22F18A9289FB60DFF1E8663BD27B0BF48749F444235DA8E56655EF3CE5488700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Library$Free$AddressProc$DesktopDirectoryInputLoadOpenSystemwsprintf
      • String ID: Kernel32.dll$WTSFreeMemory$WTSGetActiveConsoleSessionId$WTSQuerySessionInformationA$Wtsapi32.dll
      • API String ID: 2940747028-3942689601
      • Opcode ID: b4028af8245e8be4252f8bf68f082aa3c1480abf7be00e6efa0992e81f2d260f
      • Instruction ID: 85ee6a20b6efeae5d970ae0a2da60bb8482fa19abdb109d9a7e3a7b4e8092472
      • Opcode Fuzzy Hash: b4028af8245e8be4252f8bf68f082aa3c1480abf7be00e6efa0992e81f2d260f
      • Instruction Fuzzy Hash: AA313221F0978295EF75AFE6A86317926A0AF84B94F480236DD8D42794FF3CE55AC700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: swprintf$Open
      • String ID: %s\%s$%s\%s$%s\%s$%s\%s$JavaHome$SOFTWARE\JavaSoft\Java Runtime Environment$bin\client\jvm.dll$bin\java.exe$bin\server\jvm.dll
      • API String ID: 3060457134-1466848623
      • Opcode ID: 32314bf4e816f653e8fb876ec049608df7bfc1b5edf1fd377f7b83842963051e
      • Instruction ID: f041f83e2a7216a0ecd59aa01bf31fca266be9f55e313d7b6c58aa01e4e5deeb
      • Opcode Fuzzy Hash: 32314bf4e816f653e8fb876ec049608df7bfc1b5edf1fd377f7b83842963051e
      • Instruction Fuzzy Hash: 4F412E36B18AC296E730DFA1E8615EA3365FB88784F444236EA8D43758EF3CD649C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ByteCharMultiWide
      • String ID: : $ : $'$11.361.2$REDIRECT_CLSID$RedirectDynamicClsidKey : $RedirectDynamicClsidKey : InHighIntegrityMode : $SSV_DLL$VERSION${8AD9C840-044E-11D1-B3E9-00805F499D93}${CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}
      • API String ID: 626452242-3194389621
      • Opcode ID: 4373bdf4ca3389d860e4ce2a48be1ed56508f338310bb958032a450841d95de1
      • Instruction ID: 84528756a37dd1d10ee04b6b3f489456fd5c9ebd640616959809243046f58f2f
      • Opcode Fuzzy Hash: 4373bdf4ca3389d860e4ce2a48be1ed56508f338310bb958032a450841d95de1
      • Instruction Fuzzy Hash: 8E919E36B04AC29AEB20DFA0D9621E973A1FB40798F445331EA9D47AD9EF3CD558C300
      APIs
      • swprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FFD9DF973AC
      • WaitForSingleObject.KERNEL32 ref: 00007FFD9DF974C5
      • CloseHandle.KERNEL32 ref: 00007FFD9DF974CF
        • Part of subcall function 00007FFD9DF9B3E4: GetModuleHandleA.KERNEL32(00000000,?,?,?,?,00000800,?,00007FFD9DF96DA4,00000000,?,00000104,?,?,00007FFD9DF9195C), ref: 00007FFD9DF9B473
        • Part of subcall function 00007FFD9DF9B3E4: GetModuleFileNameA.KERNEL32(00000000,?,?,?,?,00000800,?,00007FFD9DF96DA4,00000000,?,00000104,?,?,00007FFD9DF9195C), ref: 00007FFD9DF9B48A
        • Part of subcall function 00007FFD9DF9B3E4: GetShortPathNameA.KERNEL32 ref: 00007FFD9DF9B4A2
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: HandleModuleName$CloseFileObjectPathShortSingleWaitswprintf
      • String ID: -high$ -new$ -old$ -regdeploy$ -settreatas$%s\bin\ssvagent.exe$%s\ssvagent.exe$runas
      • API String ID: 3610605512-595605224
      • Opcode ID: 0fd901b3bbd83cdb6d32e22c656e6a78c8e4f958314177c4ec2b6d034dde7c7d
      • Instruction ID: 048ce22e6e1b835304d93f161a6ef9732928d1dfd1c836061974e36e393fa8e8
      • Opcode Fuzzy Hash: 0fd901b3bbd83cdb6d32e22c656e6a78c8e4f958314177c4ec2b6d034dde7c7d
      • Instruction Fuzzy Hash: DA515F26B09BC289EB70DFA1D8623E967A0FB84784F540236DE8D53A95EF3CD645C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AddressHandleModuleProc$String$ConvertCurrentDirectoryFreeProcessWindows_com_util::
      • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$\sysWow64\javaws.exe$\system32\javaws.exe$kernel32$kernel32
      • API String ID: 2226367265-272254647
      • Opcode ID: e96b04ec342cf2b5a24c61d02313916e693cb6b088e58ef6b1724bb9701a59e6
      • Instruction ID: 6431d5814a591ca2c23f598a55a7e9b500c805fef23e556a6a076d6f16517115
      • Opcode Fuzzy Hash: e96b04ec342cf2b5a24c61d02313916e693cb6b088e58ef6b1724bb9701a59e6
      • Instruction Fuzzy Hash: C6413026F1CA8291EA30EFA5E4621B97360FF84784F844231D9CD575A9FF2CE549C710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: wsprintf
      • String ID: %1d.%1d*$%1d.%1d.%1d$%s*$%s_%02d$1.3.0_02$11.361.2
      • API String ID: 2111968516-4005296808
      • Opcode ID: da3e9676f709ab059a29877ca355ad0edcf90fdbc51453e2757fedbd72463284
      • Instruction ID: 94aca54d2635ac5eec1c570863ce3e89cd73536eb678c6c0ec4861a3582e11ca
      • Opcode Fuzzy Hash: da3e9676f709ab059a29877ca355ad0edcf90fdbc51453e2757fedbd72463284
      • Instruction Fuzzy Hash: 9A41A661F1C6D6A1EF70AFE5E4624B86765FB10B88B844332C98D077A4EF2DE555C300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Current_invalid_parameter_noinfo_snwprintf_s$DebugOutputProcessStringThreadwcsftime
      • String ID: ...$Error:$P:%04d T:%04d %s%s$[%08x]
      • API String ID: 4121278308-3806032009
      • Opcode ID: b3efbf50475dc0ca35aeba42556d225cecfdaf2c4e115e0d9d8016c0ca1ea4b9
      • Instruction ID: 5fb0be3779cf5d6fc4d5a47fa49cbe30669cf9f4166314363e904129f7bfc902
      • Opcode Fuzzy Hash: b3efbf50475dc0ca35aeba42556d225cecfdaf2c4e115e0d9d8016c0ca1ea4b9
      • Instruction Fuzzy Hash: 0551F722B18AC596E730DFA5E8612EA7764FB85784F444231EA8E47699FF3CD605C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: strchrswprintf
      • String ID: 1.3.1$1.4.2$1.5.0$1.6.0$1.7.0$1.8.0
      • API String ID: 1210014026-375587272
      • Opcode ID: 61625b077b594457907bcce8cfa725b7a9e90e980de26022399f6905fe7993bc
      • Instruction ID: e4652c4c833718206ade85c4bdef2c92d714f906ad0eb527539d44ebc7c58234
      • Opcode Fuzzy Hash: 61625b077b594457907bcce8cfa725b7a9e90e980de26022399f6905fe7993bc
      • Instruction Fuzzy Hash: D6111A62F1CA8290EA74EFA0E4720B962A0EB85340F861375D5CE427A9FF2CE604C700
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type_get_daylight
      • String ID:
      • API String ID: 1330151763-0
      • Opcode ID: da91ab5875a8e5f41171df20e2ba2be3d50c452c82ced639b775666c0d19a953
      • Instruction ID: c3c93238240a076eea71575b559d2f736568b274ad259cd0fd234e385e7cfa61
      • Opcode Fuzzy Hash: da91ab5875a8e5f41171df20e2ba2be3d50c452c82ced639b775666c0d19a953
      • Instruction Fuzzy Hash: E4C1A036B24A8186EB20DFA5C8A21AD3770F789B98B105329DFAE57794EF3CD155C310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: FreeGlobal$AllocCloseCurrentErrorHandleLastLocalProcess_invalid_parameter_noinfo
      • String ID: S-1-5-18
      • API String ID: 2217911499-4289277601
      • Opcode ID: c829ddb936b256c840dc56f2b916bb401c6da8c0dd0c25d62129ed7a97935d9c
      • Instruction ID: 45cb9de86d5308d848cdc7b3e9cd5f21884db1a1b00fd2026ea60744c537809e
      • Opcode Fuzzy Hash: c829ddb936b256c840dc56f2b916bb401c6da8c0dd0c25d62129ed7a97935d9c
      • Instruction Fuzzy Hash: A8311432F146C29AE7709FA1E8666A933A0FF4978DF080235D98D47654EF3CE485C750
      APIs
        • Part of subcall function 00007FFD9DF99BE4: MultiByteToWideChar.KERNEL32 ref: 00007FFD9DF99C82
        • Part of subcall function 00007FFD9DF99BE4: MultiByteToWideChar.KERNEL32 ref: 00007FFD9DF99CD7
        • Part of subcall function 00007FFD9DF99BE4: MultiByteToWideChar.KERNEL32 ref: 00007FFD9DF99D63
        • Part of subcall function 00007FFD9DF9A2D8: _com_util::ConvertStringToBSTR.COMSUPP ref: 00007FFD9DF9A31D
        • Part of subcall function 00007FFD9DF9B774: StringFromCLSID.OLE32 ref: 00007FFD9DF9B7E8
        • Part of subcall function 00007FFD9DF9B774: CoTaskMemFree.OLE32 ref: 00007FFD9DF9B807
        • Part of subcall function 00007FFD9DFA4484: _invalid_parameter_noinfo.LIBCMT ref: 00007FFD9DFA44C5
      • strstr.LIBVCRUNTIME ref: 00007FFD9DF999F9
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ByteCharMultiWide$String$ConvertFreeFromTask_com_util::_invalid_parameter_noinfostrstr
      • String ID: RedirectDynamicAndTreatasKeys: bLegacy(false) : $RedirectDynamicAndTreatasKeys: bLegacy(true) : $RunBrokerProcess :$UnregHKCUTreatAs :$UpdateTreatAsKeyImpl :$jp2${8AD9C840-044E-11D1-B3E9-00805F499D93}
      • API String ID: 2302786040-2547355259
      • Opcode ID: a7c4b79a78cd6309a406e8ec7454cf7f526294e4723d885dc469ca973f3c2ff3
      • Instruction ID: 76b8c7d9a2305d0584cdcab09f9a99a6898f4ff7c923475caa87455ca11a8797
      • Opcode Fuzzy Hash: a7c4b79a78cd6309a406e8ec7454cf7f526294e4723d885dc469ca973f3c2ff3
      • Instruction Fuzzy Hash: E1518D51F0868351FB70AFA6A8633BA6291BF85784F451335EE8D4B6D6FE3DE5058300
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: a53ed83035f00e95007cc141f28e68cf8ca43ad3a5d6888f5ab7c229909a1036
      • Instruction ID: b020989856c9121001bd213258421f9267d6e9ab4ee24e8e90935789260217db
      • Opcode Fuzzy Hash: a53ed83035f00e95007cc141f28e68cf8ca43ad3a5d6888f5ab7c229909a1036
      • Instruction Fuzzy Hash: 14C1D323B087C691E671AFA595622BE6B60FB81B80F450331DACD07795EF7DE866C310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: NamePath$LongOpenShort
      • String ID: Java Plug-in$JavaHome$JavaSoft$SOFTWARE
      • API String ID: 697873569-2643011632
      • Opcode ID: 8de2dd2af544eeef23ae2ee1ce5d57f4ac55a02f762a55fc54fc450ef9421fcb
      • Instruction ID: eb8cda1f5955ed81742e47d5da662752b87dfa55a2147e5c28ae5183657074a1
      • Opcode Fuzzy Hash: 8de2dd2af544eeef23ae2ee1ce5d57f4ac55a02f762a55fc54fc450ef9421fcb
      • Instruction Fuzzy Hash: F5410F32F04A9698FB60DFE1A8966AD36A4BB44B88F540275DE4DA7B44FF38E445C340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Openlstrcmpiswprintf
      • String ID: .$1.3.1$SOFTWARE\JavaSoft\Java Runtime Environment
      • API String ID: 90554508-4254749399
      • Opcode ID: fee8fe5a8c5b91c043af0f75dfddfc78b27ba899f857913750c76daa784e1849
      • Instruction ID: 399376c8c0481e336043b35fd8082c2f22ad6f28bc997d8e49723cf006692576
      • Opcode Fuzzy Hash: fee8fe5a8c5b91c043af0f75dfddfc78b27ba899f857913750c76daa784e1849
      • Instruction Fuzzy Hash: F2417172B18AC686E7308F91E4A27AA6365FB85344F544339E6CD02A58EF3CD415CB10
      APIs
      Strings
      • Error:%08x in GetUserPathW(szPath), xrefs: 00007FFD9DF9B3C4
      • Error:%08x in SHGetFolderPathW(NULL, CSIDL_APPDATA, NULL, 0, pPath), xrefs: 00007FFD9DF9B2B2
      • Error:%08x in SHGetSpecialFolderPathW(NULL, pPath, CSIDL_APPDATA, TRUE), xrefs: 00007FFD9DF9B2CA
      • Error:%08x in SHGetFolderPathEx(FOLDERID_LocalAppDataLow, 0, hToken, pPath, MAX_PATH), xrefs: 00007FFD9DF9B29A
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AllocCloseHandleString_com_raise_error_scwprintf
      • String ID: Error:%08x in GetUserPathW(szPath)$Error:%08x in SHGetFolderPathEx(FOLDERID_LocalAppDataLow, 0, hToken, pPath, MAX_PATH)$Error:%08x in SHGetFolderPathW(NULL, CSIDL_APPDATA, NULL, 0, pPath)$Error:%08x in SHGetSpecialFolderPathW(NULL, pPath, CSIDL_APPDATA, TRUE)
      • API String ID: 1473104865-3996986905
      • Opcode ID: a8e8f4dfac669c0c2ac1caaf99ac525ac7ead6a54a2738dc189d2bc05b52d25e
      • Instruction ID: b1a9ee8ef8c975adbec729fbd447542cc4332548c48103f512f03cee223aa2d6
      • Opcode Fuzzy Hash: a8e8f4dfac669c0c2ac1caaf99ac525ac7ead6a54a2738dc189d2bc05b52d25e
      • Instruction Fuzzy Hash: 8121C822B09AC681E630DF96E8A256E6360FFC5B90F544331DEDD47795EE3CD8428300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: wsprintf
      • String ID: %1d%1d%1d$%s_%02d$113612$130_02
      • API String ID: 2111968516-2156791873
      • Opcode ID: 3617cbd6cf970955a92a83e4e6209b6aeda195db7be50e25f19c1fa2ef2c9bfe
      • Instruction ID: e185bcca6a90e0554d27954849b99ab41b519fafd8f3ab223885f78253a2d8b4
      • Opcode Fuzzy Hash: 3617cbd6cf970955a92a83e4e6209b6aeda195db7be50e25f19c1fa2ef2c9bfe
      • Instruction Fuzzy Hash: 6A319162F18AC691EF70AFA4E4624B87771EB50B88B844232C98D07774EF7DE599C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
      • String ID: CONOUT$
      • API String ID: 3230265001-3130406586
      • Opcode ID: 3eb01d0e2b0435434029c9a77e3a8e282013e36cfd9ffca44087d8506af55cbc
      • Instruction ID: b6cbff30b58a633a8bdc465524a46084302bbadf2350f1bb986babb1ec297b1d
      • Opcode Fuzzy Hash: 3eb01d0e2b0435434029c9a77e3a8e282013e36cfd9ffca44087d8506af55cbc
      • Instruction Fuzzy Hash: EE11B922B18B8286E3609FD2E96632973A0FB88FE8F040334D99D87794EF3CD5548700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: swprintf$EnvironmentVariable
      • String ID: %s\Sun\Java\Deployment\deployment.properties$%s\Sun\Java\Deployment\deployment.properties$USER_JPI_PROFILE
      • API String ID: 3931620965-1935347440
      • Opcode ID: 043f8c6b2e7a9821c5d04ddd62b2a4987ec9831c14e5369a65bd827613002068
      • Instruction ID: 3cd863288076443a8a8c10ec639c67560fdd8419ebe5aac9f56db48555cde3de
      • Opcode Fuzzy Hash: 043f8c6b2e7a9821c5d04ddd62b2a4987ec9831c14e5369a65bd827613002068
      • Instruction Fuzzy Hash: F7111261F086C641EA35EFA5F4723FA52A0AF88744F844331DACD86665EE3CD555C740
      APIs
      • lstrlenA.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?,00000000,?,00007FFD9DF96CEA), ref: 00007FFD9DF9C416
        • Part of subcall function 00007FFD9DFABF58: _invalid_parameter_noinfo.LIBCMT ref: 00007FFD9DFABF7D
      • lstrlenA.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00000000,00000000,?,00000000,?,00007FFD9DF96CEA), ref: 00007FFD9DF9C4B5
      • lstrlenA.KERNEL32(?,?,?,?,?,?,00000000), ref: 00007FFD9DF9C50D
      • lstrlenA.KERNEL32(?,?,?,?,?,?,00000000), ref: 00007FFD9DF9C519
      • lstrlenA.KERNEL32(?,?,?,?,?,?,00000000), ref: 00007FFD9DF9C571
      • lstrlenA.KERNEL32(?,?,?,?,?,?,00000000), ref: 00007FFD9DF9C57D
      • lstrlenA.KERNEL32(?,?,?,?,?,?,00000000), ref: 00007FFD9DF9C589
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: lstrlen$_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1432209211-0
      • Opcode ID: 811ab5e96930460deb0032f31359a025ac11f55678e2bad7e50002e09d833e80
      • Instruction ID: 276e6ecb99159f5bb4859630f8775228a98afcc68e6c52a75ff1d9abaca95208
      • Opcode Fuzzy Hash: 811ab5e96930460deb0032f31359a025ac11f55678e2bad7e50002e09d833e80
      • Instruction Fuzzy Hash: 01617E22F18AE299FB20EFF4D8661FC27A4AB44718F550635CE8E97699FE3C9545C300
      APIs
      • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,00000800,?,00007FFD9DF96DA4,00000000,?,00000104,?,?,00007FFD9DF9195C), ref: 00007FFD9DF9B473
      • GetModuleFileNameA.KERNEL32(00000000,?,?,?,?,00000800,?,00007FFD9DF96DA4,00000000,?,00000104,?,?,00007FFD9DF9195C), ref: 00007FFD9DF9B48A
      • GetShortPathNameA.KERNEL32 ref: 00007FFD9DF9B4A2
      • GetLongPathNameA.KERNEL32 ref: 00007FFD9DF9B4CF
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Name$ModulePath$FileHandleLongShort
      • String ID: /
      • API String ID: 1612199381-2043925204
      • Opcode ID: 9aa6524e85ef2779147517f97add29c122336ca2f9200db814c39198408c9b53
      • Instruction ID: f03bfa1266a6fb16f9bd175bd09e8dd76fa0eed9c9928cd17df3ec9cde3f3ebe
      • Opcode Fuzzy Hash: 9aa6524e85ef2779147517f97add29c122336ca2f9200db814c39198408c9b53
      • Instruction Fuzzy Hash: 3641E222F08AC245E6309FA6A8667F96790BF857D8F440731EE8D06B89FE3CD205C700
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CharNext
      • String ID:
      • API String ID: 3213498283-0
      • Opcode ID: 624dc7b04fca85f2beb19e05af5aed21a62d1b16892ccd58cc829dfa82eb3577
      • Instruction ID: 6f1cced34628a5cdcf7de81d2496e46f68a316c12b00a49026700924739a37b2
      • Opcode Fuzzy Hash: 624dc7b04fca85f2beb19e05af5aed21a62d1b16892ccd58cc829dfa82eb3577
      • Instruction Fuzzy Hash: 9041AF2AF19AD685EB715FE2942637837E19B59FC4F488130CBCE4B745EF2C946A8300
      APIs
        • Part of subcall function 00007FFD9DF9B0A0: GetCurrentProcess.KERNEL32 ref: 00007FFD9DF9B0BC
        • Part of subcall function 00007FFD9DF9B0A0: GetLastError.KERNEL32 ref: 00007FFD9DF9B104
        • Part of subcall function 00007FFD9DF9B0A0: GlobalAlloc.KERNEL32 ref: 00007FFD9DF9B115
        • Part of subcall function 00007FFD9DF9B0A0: LocalFree.KERNEL32 ref: 00007FFD9DF9B17D
        • Part of subcall function 00007FFD9DF9B0A0: GlobalFree.KERNEL32 ref: 00007FFD9DF9B186
        • Part of subcall function 00007FFD9DF9B0A0: CloseHandle.KERNEL32 ref: 00007FFD9DF9B190
      • CloseHandle.KERNEL32 ref: 00007FFD9DF9AD29
        • Part of subcall function 00007FFD9DF9C904: GetCurrentProcess.KERNEL32 ref: 00007FFD9DF9C932
      Strings
      • %s\Oracle\Java\java.settings.cfg, xrefs: 00007FFD9DF9B045
      • Error:%08x in SHGetFolderPathEx(FOLDERID_LocalAppDataLow, 0, hToken, szPath, MAX_PATH), xrefs: 00007FFD9DF9ADBB
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CloseCurrentFreeGlobalHandleProcess$AllocErrorLastLocal
      • String ID: %s\Oracle\Java\java.settings.cfg$Error:%08x in SHGetFolderPathEx(FOLDERID_LocalAppDataLow, 0, hToken, szPath, MAX_PATH)
      • API String ID: 3391735524-2415518075
      • Opcode ID: 1825dd289b13ec640a1ff01a933e1e46307a8a097cec32a4f395d284747f808e
      • Instruction ID: 9095542b40121a1915b86454d70ac7c5bd5842398f545a2193cbe3ee356d951b
      • Opcode Fuzzy Hash: 1825dd289b13ec640a1ff01a933e1e46307a8a097cec32a4f395d284747f808e
      • Instruction Fuzzy Hash: 9531D526F09AC642EA709FA695622B97290FF84BE0F444332DEDD57799FE3CE4058340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AllocFormatLocalMessageswprintf
      • String ID: IDispatch error #%d$Unknown error 0x%0lX
      • API String ID: 2125616379-2934499512
      • Opcode ID: 79334511777262f11a8f86ae1c88c95f18a68b0f15c8b542c025bdbfb4c39472
      • Instruction ID: 3b4c41257dd19c491b2fe953280bad2ed776077b33aca3168aa52e453937b079
      • Opcode Fuzzy Hash: 79334511777262f11a8f86ae1c88c95f18a68b0f15c8b542c025bdbfb4c39472
      • Instruction Fuzzy Hash: D8218122F08BD185EB208FA5A42667C77A0AB45F94F644236CA9D43794DE3CD8468340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AddressHandleModuleOpenProc
      • String ID: Advapi32.dll$RegOpenKeyTransactedA
      • API String ID: 1337834000-496252237
      • Opcode ID: 186bdd89a22db3c4ae1eed4f863b1769ca4a9d32116883050e78feaf6581c552
      • Instruction ID: 25171e18c8093a9c1a86260c76288e3bf6dfe60878a5a8ce4a21f484f24700eb
      • Opcode Fuzzy Hash: 186bdd89a22db3c4ae1eed4f863b1769ca4a9d32116883050e78feaf6581c552
      • Instruction Fuzzy Hash: 12113332B18B81C2EA208F96F45532963A0FB94BD4F184635EE8D47B68DF3CD455CB04
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_snwprintf_swcsftime
      • String ID: %b %d %H:%M:%S$.%03d$Error:%08x in SHGetFolderPathEx(FOLDERID_LocalAppDataLow, 0, hToken, szPath, MAX_PATH)
      • API String ID: 2458067793-971585045
      • Opcode ID: db03abb7b968ab3b626578f3a57982f5a7a29107f62aa36b36d6a6d931984b16
      • Instruction ID: ed1c7b544d3c64f610368f6f2fc7e42780dd6ec2191f911dd0dc86961b878719
      • Opcode Fuzzy Hash: db03abb7b968ab3b626578f3a57982f5a7a29107f62aa36b36d6a6d931984b16
      • Instruction Fuzzy Hash: 46015221B195C186EB20DF95E5221B96361EF84B94F944332EAED4A6D9FF3CD104C700
      APIs
      • GetModuleHandleA.KERNEL32(?,?,?,?,{8AD9C840-044E-11D1-B3E9-00805F499D93},00007FFD9DF93664), ref: 00007FFD9DF94195
      • GetProcAddress.KERNEL32(?,?,?,?,{8AD9C840-044E-11D1-B3E9-00805F499D93},00007FFD9DF93664), ref: 00007FFD9DF941AA
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: Advapi32.dll$RegDeleteKeyTransactedA${8AD9C840-044E-11D1-B3E9-00805F499D93}
      • API String ID: 1646373207-4167736386
      • Opcode ID: 7b09678b98334af524696f1cc1755e34ec2d0de2d906bc4f6fdd5f6a9ee53361
      • Instruction ID: b2f497643c8752af72129f00822a18234b48ad094439b7b20650aeaaef3b0dcd
      • Opcode Fuzzy Hash: 7b09678b98334af524696f1cc1755e34ec2d0de2d906bc4f6fdd5f6a9ee53361
      • Instruction Fuzzy Hash: 5A018429F0968191FA318F91E82677A6260BF65BC4F184235DD8D07B54EF3CD595C704
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AddressFreeHandleLibraryModuleProc
      • String ID: CorExitProcess$mscoree.dll
      • API String ID: 4061214504-1276376045
      • Opcode ID: d23c88e63288b16794083f3f5423ce9dde2bb3c03fb35aa56154aac9be0c08ef
      • Instruction ID: da818e3a96b0a249be8f5b96c02b1f35614f1c40a325c8935a042166164a359f
      • Opcode Fuzzy Hash: d23c88e63288b16794083f3f5423ce9dde2bb3c03fb35aa56154aac9be0c08ef
      • Instruction Fuzzy Hash: 22F05E62B196C291EF645FE1E4A637423A0AF84B84F04123AD98F46664FF3CD89CC310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AddressCurrentHandleModuleProcProcess
      • String ID: IsWow64Process$kernel32
      • API String ID: 4190356694-3789238822
      • Opcode ID: 98566bff98159421655fd32f30394f7f09c370aec43595054736029174951612
      • Instruction ID: 862d73945f28121d640601b56bef7f34b33ef8d903c72da65b608b6c0ddc494d
      • Opcode Fuzzy Hash: 98566bff98159421655fd32f30394f7f09c370aec43595054736029174951612
      • Instruction Fuzzy Hash: 69E09265F3968293EA21AFA0E8621B433A0FF48785F441234D98E42310FF2CE46CCB00
      APIs
      • _invalid_parameter_noinfo.LIBCMT ref: 00007FFD9DFBDF71
      • GetConsoleMode.KERNEL32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00007FFD9DFBDEEF,00000000,00000000,?,00007FFD9DFBB7F6), ref: 00007FFD9DFBE030
      • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00007FFD9DFBDEEF,00000000,00000000,?,00007FFD9DFBB7F6), ref: 00007FFD9DFBE0B0
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2210144848-0
      • Opcode ID: a90e44e88c4d9a674644eaa7b7cda9a14742cf59cc6bdbbc35a628357995ea9b
      • Instruction ID: a261efd4216b5f6b10c7ff5dc43b827409c0ddb6d050df13fa0488e1da3ef5ed
      • Opcode Fuzzy Hash: a90e44e88c4d9a674644eaa7b7cda9a14742cf59cc6bdbbc35a628357995ea9b
      • Instruction Fuzzy Hash: ED81C126F1869299F7B09FE598622BD2660BF44B84F544335DF8E53A91FF3CA441C321
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: String$memcpy_s$AllocByte
      • String ID:
      • API String ID: 915214016-0
      • Opcode ID: 9ff872592a5d6084319ac2249c89e249ae891a58e5682e4f480fb74bc431ec06
      • Instruction ID: 9dddf98649169447b4bee60c016708394308df9bd454308bc5c68c74b5bd6a19
      • Opcode Fuzzy Hash: 9ff872592a5d6084319ac2249c89e249ae891a58e5682e4f480fb74bc431ec06
      • Instruction Fuzzy Hash: 4131CD36F09B8686EA29CFD1A0612B873A1EF84FC4F044639DE8D17385EE3EE5448300
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Local$AllocCloseCurrentErrorFreeHandleLastProcess
      • String ID:
      • API String ID: 1388692885-0
      • Opcode ID: 5890fafe9f32a84c74863663f39093a5c98218e9f4203c58471230aae2e0a07b
      • Instruction ID: fb30c6eec22f95927e87d2c92773cd7bcb59a77cd6c7342f4826880f07c664df
      • Opcode Fuzzy Hash: 5890fafe9f32a84c74863663f39093a5c98218e9f4203c58471230aae2e0a07b
      • Instruction Fuzzy Hash: 81218332B08A8286EB209FA1E56216A73B0FB85BC5F544235DACD43758EF3CD459CB50
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID:
      • API String ID: 1156100317-0
      • Opcode ID: d1d10107198c09c3932fa6673c1dcca8ef673135442fdb47985b5f68ba886dfb
      • Instruction ID: 5c3f096512299c8c8709acd2d3c78d9d3fd48a9e511689acaa851d70ff5f42aa
      • Opcode Fuzzy Hash: d1d10107198c09c3932fa6673c1dcca8ef673135442fdb47985b5f68ba886dfb
      • Instruction Fuzzy Hash: F6112B67F18A8306F67C39B8F7773751140AF55370F440734EAEE166D6EE2CA8A28A44
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CloseHandle$AddressFreeLibraryLocalProcTimefwprintf
      • String ID: GetCurrentUserHandle2: DuplicateTokenEx failed.$GetCurrentUserHandle2: WTSGetActiveConsoleSessionId failed.$GetCurrentUserHandle2: WTSQueryUserToken failed.
      • API String ID: 3781070853-2600433152
      • Opcode ID: 977596058c97fc05b118fe11b939c105fb22c08ee82c49408a96df8b70e11eee
      • Instruction ID: ea6bfb91fe473c340c201d32b0c796fc755a166deee415128903a2bca1c81afc
      • Opcode Fuzzy Hash: 977596058c97fc05b118fe11b939c105fb22c08ee82c49408a96df8b70e11eee
      • Instruction Fuzzy Hash: 7C113062F1C9C282E6709FA5E8623792670EB84384F500231D6CD426E5FF2DE914CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: wsprintf
      • String ID: %s00%1d%1d-%04d-%04d%s$-ABCDEFFEDCBA}$3B3DB}${CAFEEFAC-
      • API String ID: 2111968516-2327481162
      • Opcode ID: 43a113160358d4ee5a31511d94a34a1d8de73e17938e40cb5bf61d742b316eaf
      • Instruction ID: 350adcb543556c06c639babf5ddd7e2a9aba12006165a89538689830a7738b9a
      • Opcode Fuzzy Hash: 43a113160358d4ee5a31511d94a34a1d8de73e17938e40cb5bf61d742b316eaf
      • Instruction Fuzzy Hash: 6D010065E1C7C186D7719FA8E8525B967E0FB68748F545331DDCC02731EB2DE1A68B00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: UTF-16LEUNICODE$UTF-8$ccs
      • API String ID: 3215553584-1196891531
      • Opcode ID: 7acd79f09f8a341cfffe7764835a28e8390265891b5eb0768f2cdec07252b9ce
      • Instruction ID: d8a69d48a4e5e0ee8e4baa48897f1064f120ec307f58678e622added97217fb0
      • Opcode Fuzzy Hash: 7acd79f09f8a341cfffe7764835a28e8390265891b5eb0768f2cdec07252b9ce
      • Instruction Fuzzy Hash: 0C81C331F0D2C3A5F7758EE886722382BA09F25748F596331CBCD47795FA2DA8018761
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: String$AllocFreeFromTask
      • String ID: CLSID$TreatAs
      • API String ID: 1419840921-2001043205
      • Opcode ID: f563eb98bab78795757106f00883932dc741e48089aad12a8c3329e0a29cdd41
      • Instruction ID: fe3a2c2856d616781ab72e798385bbc4402c6c4915877b4927ad532e862ca802
      • Opcode Fuzzy Hash: f563eb98bab78795757106f00883932dc741e48089aad12a8c3329e0a29cdd41
      • Instruction Fuzzy Hash: 73410D22F14A9289F720DFE1D8A23BD27B0EB44798F044235DA4D56599EF28D549C340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: swprintf
      • String ID: CLSID\%s\InProcServer32${DBC80044-A445-435b-BC74-9C25C1C588A9}
      • API String ID: 233258989-156410976
      • Opcode ID: 8f3d1ca228126cd71c3ba05d7230bb16f4512881606843d72c7709cb079b6b12
      • Instruction ID: 057a3b45a7f4cfd54bffa060eeb9be44d2ab3ee6d4460803f1136225bfef5f4e
      • Opcode Fuzzy Hash: 8f3d1ca228126cd71c3ba05d7230bb16f4512881606843d72c7709cb079b6b12
      • Instruction Fuzzy Hash: FB316022F18AC286E770DF95E4617BAA790FF88794F440632EACD46694EF7CD449CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: swprintf
      • String ID: JavaHome$SOFTWARE\JavaSoft\Java Plug-in\%s
      • API String ID: 233258989-2273268771
      • Opcode ID: 6565cf4e95469a8e50235f543ccf0fdbf5b177c3100a4c34dfaa0ff1a486cfd3
      • Instruction ID: 3dea1f6409ba2c6e18a99752f6edc33e6da6196a3ea0b2b6d984824525aae975
      • Opcode Fuzzy Hash: 6565cf4e95469a8e50235f543ccf0fdbf5b177c3100a4c34dfaa0ff1a486cfd3
      • Instruction Fuzzy Hash: FA318422F1CAC586E7709F95E4517AAA390FB84798F440631EECD47654EF7CE449CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: Advapi32.dll$RegCreateKeyTransactedA
      • API String ID: 1646373207-1184998024
      • Opcode ID: 023152c6bbba542695f3a81aa1c98f50176ac0a14ad094d9203144d3c9950427
      • Instruction ID: a106260b1112a9be59cc934cbe03bf04aca24bc279a6cf167a7712c13c4bb890
      • Opcode Fuzzy Hash: 023152c6bbba542695f3a81aa1c98f50176ac0a14ad094d9203144d3c9950427
      • Instruction Fuzzy Hash: C431E536A08B8086DA70CF56F4507AAB3A4FB98B84F144135EA9D43B68DF3DD485CB00
      APIs
      • GetModuleHandleA.KERNEL32 ref: 00007FFD9DF93676
      • GetProcAddress.KERNEL32 ref: 00007FFD9DF9368B
        • Part of subcall function 00007FFD9DF94170: GetModuleHandleA.KERNEL32(?,?,?,?,{8AD9C840-044E-11D1-B3E9-00805F499D93},00007FFD9DF93664), ref: 00007FFD9DF94195
        • Part of subcall function 00007FFD9DF94170: GetProcAddress.KERNEL32(?,?,?,?,{8AD9C840-044E-11D1-B3E9-00805F499D93},00007FFD9DF93664), ref: 00007FFD9DF941AA
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: Advapi32.dll$RegDeleteKeyExA
      • API String ID: 1646373207-1984814126
      • Opcode ID: c00687004fe57c26ff95247b460d3874ed84a843c0ace60b888fa94cbb2b459c
      • Instruction ID: e6b30696fc234392519249458ad84ec7d8598ea7f65c3bb96ff284de5a5a0648
      • Opcode Fuzzy Hash: c00687004fe57c26ff95247b460d3874ed84a843c0ace60b888fa94cbb2b459c
      • Instruction Fuzzy Hash: DF118222F0DAC285FE709FE1E56293823A0AF48BD4F184235CD8D073A4FE2CE4988310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: DirectoryLibraryLoadSystemwsprintf
      • String ID: %s\%s
      • API String ID: 2200240437-4073750446
      • Opcode ID: 57b8cd5ddd38695a10fe9e38ae9a0ed5f3dc9859d241bb1851465aaf929ba012
      • Instruction ID: dae9f356c8bf53ab399a09c9cdb4c3c8711456ba25fb05175b187af1455bb599
      • Opcode Fuzzy Hash: 57b8cd5ddd38695a10fe9e38ae9a0ed5f3dc9859d241bb1851465aaf929ba012
      • Instruction Fuzzy Hash: DB015666B1C8C282EB30AFA0E8A63E96360FBC8745F444131C6CD42654FE3CD249C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Library$AddressDirectoryFreeLoadProcSystemwsprintf
      • String ID: WTSQueryUserToken$Wtsapi32.dll
      • API String ID: 995386493-1085369751
      • Opcode ID: 56a124faba1d867944e62daa3371bb503b69030070880ed75652db35c4ac5c5a
      • Instruction ID: ec3e674febfac476130ddd73a2fc79315ef8c5f8005a80fee24609cd2c1170c2
      • Opcode Fuzzy Hash: 56a124faba1d867944e62daa3371bb503b69030070880ed75652db35c4ac5c5a
      • Instruction Fuzzy Hash: 4CF06221F097C181EA54EFA6B49612972A0BF4CBC0F488139EE8D4774AEE7CD455C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ExceptionThrow_com_error::_com_error_com_raise_error_scwprintf
      • String ID: Load failed in %s at function %s$Load failed in %s at function order:%d
      • API String ID: 1067671652-2536070861
      • Opcode ID: 15d2235f0d4388ba737710eca5f4d43e1f0d71b1b4d7abf47fbe8d9587c11aa0
      • Instruction ID: af66d81f092a734b6e951bed65fae129373be36e3cd7b83b5109a552fd197fa8
      • Opcode Fuzzy Hash: 15d2235f0d4388ba737710eca5f4d43e1f0d71b1b4d7abf47fbe8d9587c11aa0
      • Instruction Fuzzy Hash: 93E04FA5B0454696EB28AF61D8623A433A1FB48B45F808136DA4D43395EE2DD4D5C340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Library$AddressDirectoryFreeLoadProcSystemwsprintf
      • String ID: WTSGetActiveConsoleSessionId$kernel32.dll
      • API String ID: 995386493-2743965321
      • Opcode ID: a94e747d7c81912a55954bd98011f6884c53ad4c528de9e630d6b9588a24fab2
      • Instruction ID: 6a2c3c277b5aec92ee8fc87c587413514cc96c4e3062b06a7a8b41053f7b47d5
      • Opcode Fuzzy Hash: a94e747d7c81912a55954bd98011f6884c53ad4c528de9e630d6b9588a24fab2
      • Instruction Fuzzy Hash: 64F01C21F09AC291EA65EFE5A86737422A1AF89790F584234D9AD463D1FE3CE499C300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: swprintf
      • String ID: %1d.%1d.%1d$%1d.%1d.%1d_%02d
      • API String ID: 233258989-2687705156
      • Opcode ID: d38f45a04dd781e00efa26e9f721769a5302702e3773c97d2796854e050219bd
      • Instruction ID: f25e5be418ea40ccaa6b374e9c422379fdabd6c523aeba920ffe934c2eefe37b
      • Opcode Fuzzy Hash: d38f45a04dd781e00efa26e9f721769a5302702e3773c97d2796854e050219bd
      • Instruction Fuzzy Hash: 51F01DB5E1878186E7309F59A46245A6AA0FB883C4F501226EACC43B29DA3CD1518F04
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: swprintf
      • String ID: %s%03d%1d-%04d-%04d%s$-ABCDEFFEDCBA}${CAFEEFAC-
      • API String ID: 233258989-27275655
      • Opcode ID: e8d484ce73426202e45c0597ace0f08fcce4f8f8aeff4baaa71076ee6234996f
      • Instruction ID: bce6ba78453c7a9c32cf9f37852a11b80edb0aef45b045a6c1b470fbc825d8a6
      • Opcode Fuzzy Hash: e8d484ce73426202e45c0597ace0f08fcce4f8f8aeff4baaa71076ee6234996f
      • Instruction Fuzzy Hash: DBE0EDB6A18BC096D760EF51E4521997760F798790F804226E6CC42B14EF3CD164CF00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: swprintf
      • String ID: %s%03d%1d-%04d-%04d%s$-ABCDEFFEDCBB}${CAFEEFAC-
      • API String ID: 233258989-3161087305
      • Opcode ID: 59ec8b4a3f07a456298b38d44a096d68384cea9729b9f8436393625257be525c
      • Instruction ID: b06a24a8e0ede4be0085728e5f6cb1d89e4bc912e0dd12e2dbea4d74b15e8af6
      • Opcode Fuzzy Hash: 59ec8b4a3f07a456298b38d44a096d68384cea9729b9f8436393625257be525c
      • Instruction Fuzzy Hash: F4E0EDB6A18BC09AD760EF55E45119A7760F788740F804226E6CD42B24EF3CD129CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: swprintf
      • String ID: %s%03d%1d-%04d-%04d%s$-ABCDEFFEDCBC}${CAFEEFAC-
      • API String ID: 233258989-1643939020
      • Opcode ID: afcf1ac8efc390682bdf3cec92356d572c26cb90679838ce1602c9ecee2069ad
      • Instruction ID: afa765391c8ca85ec76edc1953f29027e99a140529d0e505e2b94bf673b4bbcc
      • Opcode Fuzzy Hash: afcf1ac8efc390682bdf3cec92356d572c26cb90679838ce1602c9ecee2069ad
      • Instruction Fuzzy Hash: 4DE0ED76A18BC0D6E760EF51E8511997760F788354F804226E6CC42B14EF3CD168CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: swprintf
      • String ID: %s%03d%1d-%04d-FFFF%s$-ABCDEFFEDCBA}${CAFEEFAC-
      • API String ID: 233258989-2785631815
      • Opcode ID: fa400c424c15a379298bde027df645991f69e04f7dfb4b70fce87bde1aafe805
      • Instruction ID: 55fabbd00d6db5645969e1ba1ab97ebf23e33d3d4eeab5a6a6f3c72f83eab414
      • Opcode Fuzzy Hash: fa400c424c15a379298bde027df645991f69e04f7dfb4b70fce87bde1aafe805
      • Instruction Fuzzy Hash: E2E04FB6E18781DAD620EF95B4514997760F788780F901226FA8C03724DB3CD125CF00
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _get_daylight$_isindst
      • String ID:
      • API String ID: 4170891091-0
      • Opcode ID: 8c21197ebf451818a87a6a1671b6c72751e7e127eecfbdf7a5003b133139db20
      • Instruction ID: 365ec4868d4396aef00765d24e83b7cd3452a202eda19ad1c4698c94efb90a19
      • Opcode Fuzzy Hash: 8c21197ebf451818a87a6a1671b6c72751e7e127eecfbdf7a5003b133139db20
      • Instruction Fuzzy Hash: 6951F972F046928AFB38DFA4D9621BC27A1AB5039CF540235DF9E57AD5EB3CA405C710
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo$_get_daylight
      • String ID:
      • API String ID: 72036449-0
      • Opcode ID: 36dd68caac5819a584dcc5a427269c16acca659e73494d6607d3d5c6ccf9d879
      • Instruction ID: d6b9947a4bcc2386563aa391adb878e45637d26a3a88835373233fc8280397eb
      • Opcode Fuzzy Hash: 36dd68caac5819a584dcc5a427269c16acca659e73494d6607d3d5c6ccf9d879
      • Instruction Fuzzy Hash: F651D33AF0828282F7794EB9D43337B6940AB84714F194235DB9D472C6FA3DE88096A1
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
      • String ID:
      • API String ID: 2780335769-0
      • Opcode ID: f30ade0f03a50c132336b7afa159b893474cd0cc8ed60f042931a914df3f30cf
      • Instruction ID: dd62486a425fe8c3ed0d2435f60bdaacbbc11674f2e903aedd35e644a25bfd11
      • Opcode Fuzzy Hash: f30ade0f03a50c132336b7afa159b893474cd0cc8ed60f042931a914df3f30cf
      • Instruction Fuzzy Hash: 0D416D26B086818AFB24DFF1D4623BD27A5BB84B88F148635DE8D47689FF3CE4458750
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7eea5e4ca9216b5edd6e5ac518cf1f1c46e715fe4631d5665a4416031606acd5
      • Instruction ID: a22cfb827117b5712778eec4ecb53e3cb7b58c61c7ad4b864ff741e31b885a9b
      • Opcode Fuzzy Hash: 7eea5e4ca9216b5edd6e5ac518cf1f1c46e715fe4631d5665a4416031606acd5
      • Instruction Fuzzy Hash: 9F413B32F49A8286EB618FDAD46223973E0AB54B84F544135DE8D47764EF3CE8998700
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ByteCharErrorLastMultiWide
      • String ID:
      • API String ID: 203985260-0
      • Opcode ID: c4213deb9bac3d3e14c7945674157e44c7cd54f6cc30e246dd36a8769fcdec33
      • Instruction ID: 536fdfac08072822df55c279ecc8bbcb77aad7f58434c745007601e77ff76371
      • Opcode Fuzzy Hash: c4213deb9bac3d3e14c7945674157e44c7cd54f6cc30e246dd36a8769fcdec33
      • Instruction Fuzzy Hash: 24316F32B087C682F7209FB5B52216A62D5BB84BA4F144734EAED57BE8EF3CD4118704
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CloseHandle$CurrentObjectProcessSingleWait
      • String ID:
      • API String ID: 497090408-0
      • Opcode ID: ada19465033a2224f591ce07138d733c438f472f490b515efa72db5a63188629
      • Instruction ID: 3c12895ea6a4266b871a29251a1ebe84e991ab8f4cab91de673ac9e98d6ef63d
      • Opcode Fuzzy Hash: ada19465033a2224f591ce07138d733c438f472f490b515efa72db5a63188629
      • Instruction Fuzzy Hash: 2F215033B14A828AE760DFA1E4516AE37B5F788B84F144235DE8D63B18EF38C515C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ByteCharMultiWide
      • String ID: '$REDIRECT_CLSID${8AD9C840-044E-11D1-B3E9-00805F499D93}
      • API String ID: 626452242-1822448160
      • Opcode ID: 19f02504811ec89557b2472d260cf67dd80cc59258ed5d678d55459eac6594d8
      • Instruction ID: 4b4123c804ec7a81f3ddd4ed2cc40b24d407a095c6b429a36be226d4d9839ae2
      • Opcode Fuzzy Hash: 19f02504811ec89557b2472d260cf67dd80cc59258ed5d678d55459eac6594d8
      • Instruction Fuzzy Hash: E0218C32B14BC1CAD720DFB1E8514A933A5FB48B88B588236EA8D43B58EF38D564C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: e+000$gfff
      • API String ID: 3215553584-3030954782
      • Opcode ID: 62df85511d8a5826e995e3b3d61e9029787f8bc09b4e30e67f465780871fa05e
      • Instruction ID: 4b5d6fa82c112f0793dd562ea71b7989e524b0e87e0cb5e3be1741b7811e326b
      • Opcode Fuzzy Hash: 62df85511d8a5826e995e3b3d61e9029787f8bc09b4e30e67f465780871fa05e
      • Instruction Fuzzy Hash: 0D510662B187C546EB358F69A8523696B91E791B90F4C9331CBDC8BAD6EE2CD080C710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: ErrorFileLastWrite
      • String ID: U
      • API String ID: 442123175-4171548499
      • Opcode ID: 6c7a1ad708f8f0c9c0f72e2b0a71fcdc561ff3141648a4997859de182e7a9bf6
      • Instruction ID: 6fee5c5ec95761dcd450441c46d6be9179adbb6ed1562f651bfbd41453573464
      • Opcode Fuzzy Hash: 6c7a1ad708f8f0c9c0f72e2b0a71fcdc561ff3141648a4997859de182e7a9bf6
      • Instruction Fuzzy Hash: C641B462B18A8181EB30DFA5E8563A967A0FB98784F444231EF8E87B58EF3CD441C750
      APIs
        • Part of subcall function 00007FFD9DF93B5C: CoTaskMemAlloc.OLE32(?,00000000,FFFFFFFF,00000000,?,00000000,?,00007FFD9DF942F5), ref: 00007FFD9DF93BCD
        • Part of subcall function 00007FFD9DF93B5C: CharNextA.USER32(?,00000000,?,00007FFD9DF942F5), ref: 00007FFD9DF93C33
        • Part of subcall function 00007FFD9DF93B5C: CharNextA.USER32(?,00000000,?,00007FFD9DF942F5), ref: 00007FFD9DF93C3F
        • Part of subcall function 00007FFD9DF93B5C: CharNextA.USER32(?,00000000,?,00007FFD9DF942F5), ref: 00007FFD9DF93C4B
        • Part of subcall function 00007FFD9DF93B5C: CharNextA.USER32(?,00000000,?,00007FFD9DF942F5), ref: 00007FFD9DF93C57
        • Part of subcall function 00007FFD9DF93B5C: CharNextA.USER32(?,00000000,?,00007FFD9DF942F5), ref: 00007FFD9DF93D1C
        • Part of subcall function 00007FFD9DF93B5C: CharNextA.USER32(?,00000000,?,00007FFD9DF942F5), ref: 00007FFD9DF93D31
      • CoTaskMemFree.OLE32 ref: 00007FFD9DF943E8
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF9398A
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF939AC
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF93A41
        • Part of subcall function 00007FFD9DF93848: lstrcmpiA.KERNEL32(00000000,00000000,?,00007FFD9DF94695), ref: 00007FFD9DF93871
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF939C3
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF939D9
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF939E8
        • Part of subcall function 00007FFD9DF93948: CharNextA.USER32(?,00000000,00000000,?), ref: 00007FFD9DF93A60
      • CharNextA.USER32 ref: 00007FFD9DF943CD
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CharNext$Task$AllocFreelstrcmpi
      • String ID: {
      • API String ID: 2690960928-366298937
      • Opcode ID: 8846d8366f11d7459cd9f6c29452fdd4c6590479ef6695464cedd4ce4a50f1a2
      • Instruction ID: 7f6629892286ba2ed62799d5fcac250c0aea1099896f35d9c587b82e47b301ab
      • Opcode Fuzzy Hash: 8846d8366f11d7459cd9f6c29452fdd4c6590479ef6695464cedd4ce4a50f1a2
      • Instruction Fuzzy Hash: D531CE62F0DAC656F7319FF1A4A27BA2690AB557C4F004231EBCD47A86EF6DE4848704
      APIs
      Strings
      • Error:%08x in SHGetFolderPathW(NULL, CSIDL_APPDATA, NULL, 0, szPath), xrefs: 00007FFD9DF9AEC5
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: AllocString_com_raise_error_scwprintf
      • String ID: Error:%08x in SHGetFolderPathW(NULL, CSIDL_APPDATA, NULL, 0, szPath)
      • API String ID: 827919080-3870703697
      • Opcode ID: c318dec832c13c245b0f30f5acf8950f7143c980dbfce15afb694e555154468b
      • Instruction ID: 07ade9cc1fc0a51e8f1c44fc4901b1f0050f73b42ef0adf47b9be475aff4b8bd
      • Opcode Fuzzy Hash: c318dec832c13c245b0f30f5acf8950f7143c980dbfce15afb694e555154468b
      • Instruction Fuzzy Hash: 0721E736B19A8282E6309FA2E4A266A7360FFC4B90F855735DEDD57795EE3CD4018300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: PathTemp
      • String ID: JAVA_REGDEPLOY_DEBUG$JavaDeployReg.log
      • API String ID: 2920410445-1067332915
      • Opcode ID: 4fba09d3f440f6a11246e6a6a15baab63b124866e92b420a574cd3da4e446252
      • Instruction ID: a18888398fa59933ed0ce016e32aa8493604351fcec4eed1c850e2059099268b
      • Opcode Fuzzy Hash: 4fba09d3f440f6a11246e6a6a15baab63b124866e92b420a574cd3da4e446252
      • Instruction Fuzzy Hash: 3C316422B08AC6A1FA30DFA1D8621A96361FF84794F544332DADD476A9FF3CE945C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CurrentDirectory
      • String ID: :
      • API String ID: 1611563598-336475711
      • Opcode ID: 42e73cfdbfa0298fd4cc1753c7508bff74325fbfcb5c536e4a4ac357275d2463
      • Instruction ID: 847779c80992a5056d51648f9a362a694efe61eea5fa13bd8dc3a67c5a9f15c0
      • Opcode Fuzzy Hash: 42e73cfdbfa0298fd4cc1753c7508bff74325fbfcb5c536e4a4ac357275d2463
      • Instruction Fuzzy Hash: 07219362B086C1C1EB309F95D46626E63F1FB84B84F494236D7CD43294EF7CE9898760
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Openswprintf
      • String ID: SOFTWARE\Classes\CLSID\%s\InprocServer32
      • API String ID: 212519323-450560693
      • Opcode ID: 5f020b7fbc2b99227d1ce3b9669fb4bfd149fcd2b6b8b9e68f63a1b8bdbd50de
      • Instruction ID: 8b2b76b3374edeb6af2c616df9ff1554b1068263e46c8514089727988906a243
      • Opcode Fuzzy Hash: 5f020b7fbc2b99227d1ce3b9669fb4bfd149fcd2b6b8b9e68f63a1b8bdbd50de
      • Instruction Fuzzy Hash: 71215862B18AC282EB309FA5E8627AA6350FF84784F444231EBCD47695FE3CD545C750
      APIs
      Strings
      • Error:%08x in ::SHGetFolderPathW(0, CSIDL_COMMON_APPDATA, NULL, SHGFP_TYPE_CURRENT, szPath), xrefs: 00007FFD9DF9AFD1
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _com_raise_error_scwprintf
      • String ID: Error:%08x in ::SHGetFolderPathW(0, CSIDL_COMMON_APPDATA, NULL, SHGFP_TYPE_CURRENT, szPath)
      • API String ID: 1921093638-1521067552
      • Opcode ID: 971415fc0a825820d3c65d972ec4c838904a484dc7f7173a9d697224bdd5ae40
      • Instruction ID: 8b80b7d928cc32b03b7849d46f6f6aa51ec49301f017c617f936d57f8a8a6878
      • Opcode Fuzzy Hash: 971415fc0a825820d3c65d972ec4c838904a484dc7f7173a9d697224bdd5ae40
      • Instruction Fuzzy Hash: B511C432718B8186E7309FA5E8A236A76A1FB88790F504331EADC477A8EF3CD105C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Stringtry_get_function
      • String ID: LCMapStringEx
      • API String ID: 2588686239-3893581201
      • Opcode ID: c4e603b82d67889a1c70983848a757e921d61e62c337ac2e4d87a4e5915a8ef1
      • Instruction ID: 13a4aded7c40e53ba734d7e90e3afcb64bae968a938b135a865ef08489b0a5c9
      • Opcode Fuzzy Hash: c4e603b82d67889a1c70983848a757e921d61e62c337ac2e4d87a4e5915a8ef1
      • Instruction Fuzzy Hash: 2A111832708BC586D6648F96B4512AAB7A4FB89B80F544236EFCD43B59EF3CD5548B00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CompareStringtry_get_function
      • String ID: CompareStringEx
      • API String ID: 3328479835-2590796910
      • Opcode ID: f0774f51d29aba7234412c419dc47bd46f743be26cdcc1ebd54c0ba50f04e7f2
      • Instruction ID: a783acc1d5ffac3c34a0ed8cc6686f8296ab0529ff5719543c368f04d6519cce
      • Opcode Fuzzy Hash: f0774f51d29aba7234412c419dc47bd46f743be26cdcc1ebd54c0ba50f04e7f2
      • Instruction Fuzzy Hash: 80112932708BC186D7708F96B4912AAB7A5FB89B80F544236EBCD83B59DF3CD5548B40
      APIs
      • try_get_function.LIBVCRUNTIME ref: 00007FFD9DFB0CA5
      • GetDateFormatW.KERNEL32(?,?,?,?,?,?,00007FFD9DF9F1BC,00007FFD9DFB77FD,?,?,?,?,?,?,?,00000000), ref: 00007FFD9DFB0D07
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: DateFormattry_get_function
      • String ID: GetDateFormatEx
      • API String ID: 595753042-159735388
      • Opcode ID: 31733b05f3cc27761168b133dab4df2ca6c59c5df8e43366d707602e91f94079
      • Instruction ID: c36e3292beb2ce5e7448a7100197b86d6196d53363effc011b827357ca6339c8
      • Opcode Fuzzy Hash: 31733b05f3cc27761168b133dab4df2ca6c59c5df8e43366d707602e91f94079
      • Instruction Fuzzy Hash: A7111C32B08BC186D6248F96B4511AAB7A0FB89BC0F184236EFCD53B69DF3CD5548B40
      APIs
      • try_get_function.LIBVCRUNTIME ref: 00007FFD9DFB0DA5
      • GetTimeFormatW.KERNEL32(?,?,?,?,?,?,00007FFD9DF9F1BC,00007FFD9DFB78AE,?,?,?,?,?,?,?,00000000), ref: 00007FFD9DFB0DFC
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: FormatTimetry_get_function
      • String ID: GetTimeFormatEx
      • API String ID: 3261793192-1692793031
      • Opcode ID: d36a8f6a1dcaa146301469bf1d677b8ff11f7097ecd1c12f5fbc57de4acc65f8
      • Instruction ID: a47c6c0ee26549dc4e4eb53b03c9be1834bfa96a866eb2a2179c7f5e2ea03118
      • Opcode Fuzzy Hash: d36a8f6a1dcaa146301469bf1d677b8ff11f7097ecd1c12f5fbc57de4acc65f8
      • Instruction Fuzzy Hash: 8F114F32B08BC586E620DF96E41105AB7A0FB89BD0F184235EF8D53B69EF3CD5548B40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: LocalTimefwprintf
      • String ID: [%04u/%02u/%02u %02u:%02u:%02u.%03u] %s
      • API String ID: 441805291-1649626469
      • Opcode ID: 55b3485242530323326d218c82dc0e7f797b73b2db1abb504ae5102256f2a25d
      • Instruction ID: 2d8788b3367375552f4ad8be3f2d2e579f855d0afed71d454e66ffbb219b5f4d
      • Opcode Fuzzy Hash: 55b3485242530323326d218c82dc0e7f797b73b2db1abb504ae5102256f2a25d
      • Instruction Fuzzy Hash: 41016D72A1C68186E7609F91B46203AF7A1FBC4791F140135FECD42A59EB7CD464CF10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: :
      • API String ID: 3215553584-336475711
      • Opcode ID: e50a3a46b8bf8e066275f0c88eba6bcc0385a513aefb00468e840bc58e03b9a9
      • Instruction ID: 6f876e552d8568b75cb100d3dab2f9baad68828db0bc6e7e756c96ba1729b8bf
      • Opcode Fuzzy Hash: e50a3a46b8bf8e066275f0c88eba6bcc0385a513aefb00468e840bc58e03b9a9
      • Instruction Fuzzy Hash: 41018451A1828286E730AFF0A46317E63A0EF44744F840635D6CD83651FF3CD5048A24
      APIs
      • try_get_function.LIBVCRUNTIME ref: 00007FFD9DFB0E49
      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00000264C8DFBB98,00007FFD9DFB4F66,?,?,00000000,00007FFD9DFB4E5E,?,?,00000080,00007FFD9DFAE155), ref: 00007FFD9DFB0E63
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: CountCriticalInitializeSectionSpintry_get_function
      • String ID: InitializeCriticalSectionEx
      • API String ID: 539475747-3084827643
      • Opcode ID: 7746fca0a66031e3dce0424f66ff0540fc0fa2c5e32d1bb82115370f96844a14
      • Instruction ID: c03492499418f3aea01723d22e02613dabf7959f04befd997f266cba404d37ce
      • Opcode Fuzzy Hash: 7746fca0a66031e3dce0424f66ff0540fc0fa2c5e32d1bb82115370f96844a14
      • Instruction Fuzzy Hash: 91F05E22F08AC191EB259FD2F5620A96361AF48BD0F484635EA8D03B58EF3CE599C750
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: DirectoryEnvironmentVariableWindows
      • String ID: USERPROFILE
      • API String ID: 3766865897-2419442777
      • Opcode ID: 3a6384c7b4ec03b78a38154110911184891072dc5d9a1f54a570a79498bfa020
      • Instruction ID: 0e62122c9910b22cb33847dc290e81782d7360c07d8df9950e487230017dc1cc
      • Opcode Fuzzy Hash: 3a6384c7b4ec03b78a38154110911184891072dc5d9a1f54a570a79498bfa020
      • Instruction Fuzzy Hash: 64F0EC20F186C141EB249FD7F45113552A0FF48BC0F448230DD9D83B24EE2CD8558700
      APIs
      • try_get_function.LIBVCRUNTIME ref: 00007FFD9DFA3CA5
      • TlsSetValue.KERNEL32(?,?,00000000,00007FFD9DFA2296,?,?,?,00007FFD9DFA205D,?,?,?,?,00007FFD9DF9F5F1), ref: 00007FFD9DFA3CBC
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Valuetry_get_function
      • String ID: FlsSetValue
      • API String ID: 738293619-3750699315
      • Opcode ID: a276f214a0d924f29beb7849d2e30e28c3e8559952a3ad7a94402a39f3daaa69
      • Instruction ID: 853e96e9c705490a525c395f206e7f2fc3134800e3821497a8232f99ab578fd5
      • Opcode Fuzzy Hash: a276f214a0d924f29beb7849d2e30e28c3e8559952a3ad7a94402a39f3daaa69
      • Instruction Fuzzy Hash: 76E06561B085C291EA255FD0F8220F823A1AF887C0F484335D58D06354FF3CD5598300
      APIs
      • try_get_function.LIBVCRUNTIME ref: 00007FFD9DFB0C41
      • TlsSetValue.KERNEL32(?,?,00006AC2EEAEFA12,00007FFD9DFB0606,?,?,00006AC2EEAEFA12,00007FFD9DFA41E9,?,?,?,?,00007FFD9DFB07BA,?,?,00000000), ref: 00007FFD9DFB0C58
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Valuetry_get_function
      • String ID: FlsSetValue
      • API String ID: 738293619-3750699315
      • Opcode ID: 52002a168d54e3afed8a5a8737d9f2f17b010ce75570c03359c1c3d1b34905de
      • Instruction ID: b8549d91fe4a779ad51643361613bb3dad9374aa8333dbd9bad215209485f408
      • Opcode Fuzzy Hash: 52002a168d54e3afed8a5a8737d9f2f17b010ce75570c03359c1c3d1b34905de
      • Instruction Fuzzy Hash: 51E06562B085C291EA245FD1E5230B52362AF487C0F484332D69D06694EF7DD99CC250
      APIs
      • std::bad_alloc::bad_alloc.LIBCMT ref: 00007FFD9DFA067D
      • _CxxThrowException.LIBVCRUNTIME ref: 00007FFD9DFA068E
        • Part of subcall function 00007FFD9DFA1640: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFD9DFA0693), ref: 00007FFD9DFA16B5
        • Part of subcall function 00007FFD9DFA1640: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FFD9DFA0693), ref: 00007FFD9DFA16E7
      Strings
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: Exception$FileHeaderRaiseThrowstd::bad_alloc::bad_alloc
      • String ID: Unknown exception
      • API String ID: 3561508498-410509341
      • Opcode ID: c385aaac0d19a417f3f757970ff93bdeace32e856440c56d563e64ac06e0d506
      • Instruction ID: 659f2f096898085166599d825005d586fae1c9d6a84e465f6693f39c1e974696
      • Opcode Fuzzy Hash: c385aaac0d19a417f3f757970ff93bdeace32e856440c56d563e64ac06e0d506
      • Instruction Fuzzy Hash: 17D06722B28AC695DE20DF84D9A63E96330FB94348F944631E18D825B9FF3CD65AC740
      APIs
      Memory Dump Source
      • Source File: 00000008.00000002.2499626950.00007FFD9DF91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFD9DF90000, based on PE: true
      • Associated: 00000008.00000002.2499613655.00007FFD9DF90000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499663761.00007FFD9DFC3000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499683431.00007FFD9DFE0000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000008.00000002.2499695324.00007FFD9DFE3000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_2_7ffd9df90000_rundll32.jbxd
      Similarity
      • API ID: lstrcmpi
      • String ID:
      • API String ID: 1586166983-0
      • Opcode ID: bd99baac100512fb61f305d0827342b58b7878181c82864482793c89fb3d0cc7
      • Instruction ID: 553ff6c404b98bf81efc9517a76925bc34185ab948abb1e7e647af25c66fc2de
      • Opcode Fuzzy Hash: bd99baac100512fb61f305d0827342b58b7878181c82864482793c89fb3d0cc7
      • Instruction Fuzzy Hash: 1C111222F0CAC681FB309FA5E5623796291AF54BC4F949231D98D87754FF6CE4588301